Sophie

Sophie

distrib > Mageia > 4 > x86_64 > by-pkgid > 9e72f3e7ecf68cce016a7c5c59e863d3 > files > 1218

lib64polarssl-devel-1.3.8-1.mga4.x86_64.rpm

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/xhtml;charset=UTF-8"/>
<meta http-equiv="X-UA-Compatible" content="IE=9"/>
<meta name="generator" content="Doxygen 1.8.5"/>
<title>PolarSSL v1.3.8: x509_crt.h File Reference</title>
<link href="tabs.css" rel="stylesheet" type="text/css"/>
<script type="text/javascript" src="jquery.js"></script>
<script type="text/javascript" src="dynsections.js"></script>
<link href="doxygen.css" rel="stylesheet" type="text/css" />
</head>
<body>
<div id="top"><!-- do not remove this div, it is closed by doxygen! -->
<div id="titlearea">
<table cellspacing="0" cellpadding="0">
 <tbody>
 <tr style="height: 56px;">
  <td style="padding-left: 0.5em;">
   <div id="projectname">PolarSSL v1.3.8
   </div>
  </td>
 </tr>
 </tbody>
</table>
</div>
<!-- end header part -->
<!-- Generated by Doxygen 1.8.5 -->
  <div id="navrow1" class="tabs">
    <ul class="tablist">
      <li><a href="index.html"><span>Main&#160;Page</span></a></li>
      <li><a href="modules.html"><span>Modules</span></a></li>
      <li><a href="annotated.html"><span>Data&#160;Structures</span></a></li>
      <li class="current"><a href="files.html"><span>Files</span></a></li>
    </ul>
  </div>
  <div id="navrow2" class="tabs2">
    <ul class="tablist">
      <li><a href="files.html"><span>File&#160;List</span></a></li>
      <li><a href="globals.html"><span>Globals</span></a></li>
    </ul>
  </div>
<div id="nav-path" class="navpath">
  <ul>
<li class="navelem"><a class="el" href="dir_6a9bbd12bf4e19a18c45e270f8fae3fd.html">include</a></li><li class="navelem"><a class="el" href="dir_04272d44da4745cf8b8bfc767d6c6523.html">polarssl</a></li>  </ul>
</div>
</div><!-- top -->
<div class="header">
  <div class="summary">
<a href="#nested-classes">Data Structures</a> &#124;
<a href="#func-members">Functions</a>  </div>
  <div class="headertitle">
<div class="title">x509_crt.h File Reference</div>  </div>
</div><!--header-->
<div class="contents">

<p>X.509 certificate parsing and writing.  
<a href="#details">More...</a></p>
<div class="textblock"><code>#include &quot;<a class="el" href="config_8h_source.html">config.h</a>&quot;</code><br/>
<code>#include &quot;<a class="el" href="x509_8h_source.html">x509.h</a>&quot;</code><br/>
<code>#include &quot;<a class="el" href="x509__crl_8h_source.html">x509_crl.h</a>&quot;</code><br/>
</div><div class="textblock"><div class="dynheader">
Include dependency graph for x509_crt.h:</div>
<div class="dyncontent">
<div class="center"><img src="x509__crt_8h__incl.png" border="0" usemap="#x509__crt_8h" alt=""/></div>
<map name="x509__crt_8h" id="x509__crt_8h">
</map>
</div>
</div><div class="textblock"><div class="dynheader">
This graph shows which files directly or indirectly include this file:</div>
<div class="dyncontent">
<div class="center"><img src="x509__crt_8h__dep__incl.png" border="0" usemap="#x509__crt_8hdep" alt=""/></div>
<map name="x509__crt_8hdep" id="x509__crt_8hdep">
</map>
</div>
</div>
<p><a href="x509__crt_8h_source.html">Go to the source code of this file.</a></p>
<table class="memberdecls">
<tr class="heading"><td colspan="2"><h2 class="groupheader"><a name="nested-classes"></a>
Data Structures</h2></td></tr>
<tr class="memitem:"><td class="memItemLeft" align="right" valign="top">struct &#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="struct__x509__crt.html">_x509_crt</a></td></tr>
<tr class="memdesc:"><td class="mdescLeft">&#160;</td><td class="mdescRight">Container for an X.509 certificate.  <a href="struct__x509__crt.html#details">More...</a><br/></td></tr>
<tr class="separator:"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:"><td class="memItemLeft" align="right" valign="top">struct &#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="struct__x509write__cert.html">_x509write_cert</a></td></tr>
<tr class="memdesc:"><td class="mdescLeft">&#160;</td><td class="mdescRight">Container for writing a certificate (CRT)  <a href="struct__x509write__cert.html#details">More...</a><br/></td></tr>
<tr class="separator:"><td class="memSeparator" colspan="2">&#160;</td></tr>
</table><table class="memberdecls">
<tr class="heading"><td colspan="2"><h2 class="groupheader"><a name="func-members"></a>
Functions</h2></td></tr>
<tr class="memitem:a00d51bcf5acb9b8ffd43dc2cd9c91bf0"><td class="memItemLeft" align="right" valign="top">void&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="x509__crt_8h.html#a00d51bcf5acb9b8ffd43dc2cd9c91bf0">x509write_crt_init</a> (<a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *ctx)</td></tr>
<tr class="memdesc:a00d51bcf5acb9b8ffd43dc2cd9c91bf0"><td class="mdescLeft">&#160;</td><td class="mdescRight">Initialize a CRT writing context.  <a href="#a00d51bcf5acb9b8ffd43dc2cd9c91bf0">More...</a><br/></td></tr>
<tr class="separator:a00d51bcf5acb9b8ffd43dc2cd9c91bf0"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a40e28129171de7c02f41999be09f1225"><td class="memItemLeft" align="right" valign="top">void&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="x509__crt_8h.html#a40e28129171de7c02f41999be09f1225">x509write_crt_set_version</a> (<a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *ctx, int version)</td></tr>
<tr class="memdesc:a40e28129171de7c02f41999be09f1225"><td class="mdescLeft">&#160;</td><td class="mdescRight">Set the verion for a Certificate Default: X509_CRT_VERSION_3.  <a href="#a40e28129171de7c02f41999be09f1225">More...</a><br/></td></tr>
<tr class="separator:a40e28129171de7c02f41999be09f1225"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a74bafc1a3cfa1044bdfb33f6d31f1b21"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="x509__crt_8h.html#a74bafc1a3cfa1044bdfb33f6d31f1b21">x509write_crt_set_serial</a> (<a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *ctx, const <a class="el" href="structmpi.html">mpi</a> *serial)</td></tr>
<tr class="memdesc:a74bafc1a3cfa1044bdfb33f6d31f1b21"><td class="mdescLeft">&#160;</td><td class="mdescRight">Set the serial number for a Certificate.  <a href="#a74bafc1a3cfa1044bdfb33f6d31f1b21">More...</a><br/></td></tr>
<tr class="separator:a74bafc1a3cfa1044bdfb33f6d31f1b21"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a2aae935adeb9aed5abc72eafe31701da"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="x509__crt_8h.html#a2aae935adeb9aed5abc72eafe31701da">x509write_crt_set_validity</a> (<a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *ctx, const char *not_before, const char *not_after)</td></tr>
<tr class="memdesc:a2aae935adeb9aed5abc72eafe31701da"><td class="mdescLeft">&#160;</td><td class="mdescRight">Set the validity period for a Certificate Timestamps should be in string format for UTC timezone i.e.  <a href="#a2aae935adeb9aed5abc72eafe31701da">More...</a><br/></td></tr>
<tr class="separator:a2aae935adeb9aed5abc72eafe31701da"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a470b8fd3056f61183351189fff62a2dd"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="x509__crt_8h.html#a470b8fd3056f61183351189fff62a2dd">x509write_crt_set_issuer_name</a> (<a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *ctx, const char *issuer_name)</td></tr>
<tr class="memdesc:a470b8fd3056f61183351189fff62a2dd"><td class="mdescLeft">&#160;</td><td class="mdescRight">Set the issuer name for a Certificate Issuer names should contain a comma-separated list of OID types and values: e.g.  <a href="#a470b8fd3056f61183351189fff62a2dd">More...</a><br/></td></tr>
<tr class="separator:a470b8fd3056f61183351189fff62a2dd"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a3e99cbb5deaac1854a5f2dd5523bf501"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="x509__crt_8h.html#a3e99cbb5deaac1854a5f2dd5523bf501">x509write_crt_set_subject_name</a> (<a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *ctx, const char *subject_name)</td></tr>
<tr class="memdesc:a3e99cbb5deaac1854a5f2dd5523bf501"><td class="mdescLeft">&#160;</td><td class="mdescRight">Set the subject name for a Certificate Subject names should contain a comma-separated list of OID types and values: e.g.  <a href="#a3e99cbb5deaac1854a5f2dd5523bf501">More...</a><br/></td></tr>
<tr class="separator:a3e99cbb5deaac1854a5f2dd5523bf501"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a6dea2b3a87be62a618d66ef8a18c8920"><td class="memItemLeft" align="right" valign="top">void&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="x509__crt_8h.html#a6dea2b3a87be62a618d66ef8a18c8920">x509write_crt_set_subject_key</a> (<a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *ctx, <a class="el" href="structpk__context.html">pk_context</a> *key)</td></tr>
<tr class="memdesc:a6dea2b3a87be62a618d66ef8a18c8920"><td class="mdescLeft">&#160;</td><td class="mdescRight">Set the subject public key for the certificate.  <a href="#a6dea2b3a87be62a618d66ef8a18c8920">More...</a><br/></td></tr>
<tr class="separator:a6dea2b3a87be62a618d66ef8a18c8920"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:ae4d75450c4b979b19adc3c4fec8202bf"><td class="memItemLeft" align="right" valign="top">void&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="x509__crt_8h.html#ae4d75450c4b979b19adc3c4fec8202bf">x509write_crt_set_issuer_key</a> (<a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *ctx, <a class="el" href="structpk__context.html">pk_context</a> *key)</td></tr>
<tr class="memdesc:ae4d75450c4b979b19adc3c4fec8202bf"><td class="mdescLeft">&#160;</td><td class="mdescRight">Set the issuer key used for signing the certificate.  <a href="#ae4d75450c4b979b19adc3c4fec8202bf">More...</a><br/></td></tr>
<tr class="separator:ae4d75450c4b979b19adc3c4fec8202bf"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:aceba04da0ec2a3530c7d3befeb022052"><td class="memItemLeft" align="right" valign="top">void&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="x509__crt_8h.html#aceba04da0ec2a3530c7d3befeb022052">x509write_crt_set_md_alg</a> (<a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *ctx, <a class="el" href="md_8h.html#af1fbbb67afa0daee4090cde8864e0b68">md_type_t</a> md_alg)</td></tr>
<tr class="memdesc:aceba04da0ec2a3530c7d3befeb022052"><td class="mdescLeft">&#160;</td><td class="mdescRight">Set the MD algorithm to use for the signature (e.g.  <a href="#aceba04da0ec2a3530c7d3befeb022052">More...</a><br/></td></tr>
<tr class="separator:aceba04da0ec2a3530c7d3befeb022052"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a86d4318af644578d56d2fc30111b552a"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="x509__crt_8h.html#a86d4318af644578d56d2fc30111b552a">x509write_crt_set_extension</a> (<a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *ctx, const char *oid, size_t oid_len, int critical, const unsigned char *val, size_t val_len)</td></tr>
<tr class="memdesc:a86d4318af644578d56d2fc30111b552a"><td class="mdescLeft">&#160;</td><td class="mdescRight">Generic function to add to or replace an extension in the CRT.  <a href="#a86d4318af644578d56d2fc30111b552a">More...</a><br/></td></tr>
<tr class="separator:a86d4318af644578d56d2fc30111b552a"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a61a8cb196cce7f6b239be8e3e659d630"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="x509__crt_8h.html#a61a8cb196cce7f6b239be8e3e659d630">x509write_crt_set_basic_constraints</a> (<a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *ctx, int is_ca, int max_pathlen)</td></tr>
<tr class="memdesc:a61a8cb196cce7f6b239be8e3e659d630"><td class="mdescLeft">&#160;</td><td class="mdescRight">Set the basicConstraints extension for a CRT.  <a href="#a61a8cb196cce7f6b239be8e3e659d630">More...</a><br/></td></tr>
<tr class="separator:a61a8cb196cce7f6b239be8e3e659d630"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a8f1fbf2b803612f4fbf6497ef10cdd9b"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="x509__crt_8h.html#a8f1fbf2b803612f4fbf6497ef10cdd9b">x509write_crt_set_subject_key_identifier</a> (<a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *ctx)</td></tr>
<tr class="memdesc:a8f1fbf2b803612f4fbf6497ef10cdd9b"><td class="mdescLeft">&#160;</td><td class="mdescRight">Set the subjectKeyIdentifier extension for a CRT Requires that <a class="el" href="x509__crt_8h.html#a6dea2b3a87be62a618d66ef8a18c8920" title="Set the subject public key for the certificate. ">x509write_crt_set_subject_key()</a> has been called before.  <a href="#a8f1fbf2b803612f4fbf6497ef10cdd9b">More...</a><br/></td></tr>
<tr class="separator:a8f1fbf2b803612f4fbf6497ef10cdd9b"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:ad59ee28b4bdee43a8579bdb0d9487a0f"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="x509__crt_8h.html#ad59ee28b4bdee43a8579bdb0d9487a0f">x509write_crt_set_authority_key_identifier</a> (<a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *ctx)</td></tr>
<tr class="memdesc:ad59ee28b4bdee43a8579bdb0d9487a0f"><td class="mdescLeft">&#160;</td><td class="mdescRight">Set the authorityKeyIdentifier extension for a CRT Requires that <a class="el" href="x509__crt_8h.html#ae4d75450c4b979b19adc3c4fec8202bf" title="Set the issuer key used for signing the certificate. ">x509write_crt_set_issuer_key()</a> has been called before.  <a href="#ad59ee28b4bdee43a8579bdb0d9487a0f">More...</a><br/></td></tr>
<tr class="separator:ad59ee28b4bdee43a8579bdb0d9487a0f"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a91cb154550fe39cfd578856633a87db0"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="x509__crt_8h.html#a91cb154550fe39cfd578856633a87db0">x509write_crt_set_key_usage</a> (<a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *ctx, unsigned char key_usage)</td></tr>
<tr class="memdesc:a91cb154550fe39cfd578856633a87db0"><td class="mdescLeft">&#160;</td><td class="mdescRight">Set the Key Usage Extension flags (e.g.  <a href="#a91cb154550fe39cfd578856633a87db0">More...</a><br/></td></tr>
<tr class="separator:a91cb154550fe39cfd578856633a87db0"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a1957691b91b68abcb8685fa348c77234"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="x509__crt_8h.html#a1957691b91b68abcb8685fa348c77234">x509write_crt_set_ns_cert_type</a> (<a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *ctx, unsigned char ns_cert_type)</td></tr>
<tr class="memdesc:a1957691b91b68abcb8685fa348c77234"><td class="mdescLeft">&#160;</td><td class="mdescRight">Set the Netscape Cert Type flags (e.g.  <a href="#a1957691b91b68abcb8685fa348c77234">More...</a><br/></td></tr>
<tr class="separator:a1957691b91b68abcb8685fa348c77234"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:ac1e8ce08e2b45dc92105b589b34b2b27"><td class="memItemLeft" align="right" valign="top">void&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="x509__crt_8h.html#ac1e8ce08e2b45dc92105b589b34b2b27">x509write_crt_free</a> (<a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *ctx)</td></tr>
<tr class="memdesc:ac1e8ce08e2b45dc92105b589b34b2b27"><td class="mdescLeft">&#160;</td><td class="mdescRight">Free the contents of a CRT write context.  <a href="#ac1e8ce08e2b45dc92105b589b34b2b27">More...</a><br/></td></tr>
<tr class="separator:ac1e8ce08e2b45dc92105b589b34b2b27"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a7300897079a27c5fa424c9653081b286"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="x509__crt_8h.html#a7300897079a27c5fa424c9653081b286">x509write_crt_der</a> (<a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *ctx, unsigned char *buf, size_t size, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng)</td></tr>
<tr class="memdesc:a7300897079a27c5fa424c9653081b286"><td class="mdescLeft">&#160;</td><td class="mdescRight">Write a built up certificate to a X509 DER structure Note: data is written at the end of the buffer! Use the return value to determine where you should start using the buffer.  <a href="#a7300897079a27c5fa424c9653081b286">More...</a><br/></td></tr>
<tr class="separator:a7300897079a27c5fa424c9653081b286"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a65d982a2325fff3f0c6806a512ef25cd"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="x509__crt_8h.html#a65d982a2325fff3f0c6806a512ef25cd">x509write_crt_pem</a> (<a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *ctx, unsigned char *buf, size_t size, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng)</td></tr>
<tr class="memdesc:a65d982a2325fff3f0c6806a512ef25cd"><td class="mdescLeft">&#160;</td><td class="mdescRight">Write a built up certificate to a X509 PEM string.  <a href="#a65d982a2325fff3f0c6806a512ef25cd">More...</a><br/></td></tr>
<tr class="separator:a65d982a2325fff3f0c6806a512ef25cd"><td class="memSeparator" colspan="2">&#160;</td></tr>
</table><table class="memberdecls">
<tr class="heading"><td colspan="2"><h2 class="groupheader"><a name="member-group"></a>
Structures and functions for parsing and writing X.509 certificates</h2></td></tr>
<tr class="memitem:ga803eb771dce23b32e873b94fa42ae3eb"><td class="memItemLeft" align="right" valign="top">#define&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="group__x509__module.html#ga803eb771dce23b32e873b94fa42ae3eb">X509_CRT_VERSION_1</a>&#160;&#160;&#160;0</td></tr>
<tr class="separator:ga803eb771dce23b32e873b94fa42ae3eb"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:gaff0395a0a007c3515967f958879926cf"><td class="memItemLeft" align="right" valign="top">#define&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="group__x509__module.html#gaff0395a0a007c3515967f958879926cf">X509_CRT_VERSION_2</a>&#160;&#160;&#160;1</td></tr>
<tr class="separator:gaff0395a0a007c3515967f958879926cf"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:ga5aa7c22740f9d1271b76fe9dffe5ce18"><td class="memItemLeft" align="right" valign="top">#define&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="group__x509__module.html#ga5aa7c22740f9d1271b76fe9dffe5ce18">X509_CRT_VERSION_3</a>&#160;&#160;&#160;2</td></tr>
<tr class="separator:ga5aa7c22740f9d1271b76fe9dffe5ce18"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:ga8099883128d3a26dc00e33814def210b"><td class="memItemLeft" align="right" valign="top">#define&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="group__x509__module.html#ga8099883128d3a26dc00e33814def210b">X509_RFC5280_MAX_SERIAL_LEN</a>&#160;&#160;&#160;32</td></tr>
<tr class="separator:ga8099883128d3a26dc00e33814def210b"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:gabc0cae2aafa220212a00ae64dffa49b4"><td class="memItemLeft" align="right" valign="top">#define&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="group__x509__module.html#gabc0cae2aafa220212a00ae64dffa49b4">X509_RFC5280_UTC_TIME_LEN</a>&#160;&#160;&#160;15</td></tr>
<tr class="separator:gabc0cae2aafa220212a00ae64dffa49b4"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:gabc08a73588a59be2dd8943ebfc29ec9a"><td class="memItemLeft" align="right" valign="top">typedef struct <a class="el" href="struct__x509__crt.html">_x509_crt</a>&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="group__x509__module.html#gabc08a73588a59be2dd8943ebfc29ec9a">x509_crt</a></td></tr>
<tr class="memdesc:gabc08a73588a59be2dd8943ebfc29ec9a"><td class="mdescLeft">&#160;</td><td class="mdescRight">Container for an X.509 certificate.  <a href="group__x509__module.html#gabc08a73588a59be2dd8943ebfc29ec9a">More...</a><br/></td></tr>
<tr class="separator:gabc08a73588a59be2dd8943ebfc29ec9a"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:ga5d89c77a8179fb09753045b8ce8f4076"><td class="memItemLeft" align="right" valign="top">typedef struct <a class="el" href="struct__x509write__cert.html">_x509write_cert</a>&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a></td></tr>
<tr class="memdesc:ga5d89c77a8179fb09753045b8ce8f4076"><td class="mdescLeft">&#160;</td><td class="mdescRight">Container for writing a certificate (CRT)  <a href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">More...</a><br/></td></tr>
<tr class="separator:ga5d89c77a8179fb09753045b8ce8f4076"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:ga2d8d1c87fa24f176a160041f11ad3c72"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="group__x509__module.html#ga2d8d1c87fa24f176a160041f11ad3c72">x509_crt_parse_der</a> (<a class="el" href="group__x509__module.html#gabc08a73588a59be2dd8943ebfc29ec9a">x509_crt</a> *chain, const unsigned char *buf, size_t buflen)</td></tr>
<tr class="memdesc:ga2d8d1c87fa24f176a160041f11ad3c72"><td class="mdescLeft">&#160;</td><td class="mdescRight">Parse a single DER formatted certificate and add it to the chained list.  <a href="group__x509__module.html#ga2d8d1c87fa24f176a160041f11ad3c72">More...</a><br/></td></tr>
<tr class="separator:ga2d8d1c87fa24f176a160041f11ad3c72"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:gafc724dee6827c47fed1eec64bb13727b"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="group__x509__module.html#gafc724dee6827c47fed1eec64bb13727b">x509_crt_parse</a> (<a class="el" href="group__x509__module.html#gabc08a73588a59be2dd8943ebfc29ec9a">x509_crt</a> *chain, const unsigned char *buf, size_t buflen)</td></tr>
<tr class="memdesc:gafc724dee6827c47fed1eec64bb13727b"><td class="mdescLeft">&#160;</td><td class="mdescRight">Parse one or more certificates and add them to the chained list.  <a href="group__x509__module.html#gafc724dee6827c47fed1eec64bb13727b">More...</a><br/></td></tr>
<tr class="separator:gafc724dee6827c47fed1eec64bb13727b"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:ga2f937df6c64b400210dbeb5ad26cc8c2"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="group__x509__module.html#ga2f937df6c64b400210dbeb5ad26cc8c2">x509_crt_parse_file</a> (<a class="el" href="group__x509__module.html#gabc08a73588a59be2dd8943ebfc29ec9a">x509_crt</a> *chain, const char *path)</td></tr>
<tr class="memdesc:ga2f937df6c64b400210dbeb5ad26cc8c2"><td class="mdescLeft">&#160;</td><td class="mdescRight">Load one or more certificates and add them to the chained list.  <a href="group__x509__module.html#ga2f937df6c64b400210dbeb5ad26cc8c2">More...</a><br/></td></tr>
<tr class="separator:ga2f937df6c64b400210dbeb5ad26cc8c2"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:ga34939a983156816784e3d1a64fe0bac9"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="group__x509__module.html#ga34939a983156816784e3d1a64fe0bac9">x509_crt_parse_path</a> (<a class="el" href="group__x509__module.html#gabc08a73588a59be2dd8943ebfc29ec9a">x509_crt</a> *chain, const char *path)</td></tr>
<tr class="memdesc:ga34939a983156816784e3d1a64fe0bac9"><td class="mdescLeft">&#160;</td><td class="mdescRight">Load one or more certificate files from a path and add them to the chained list.  <a href="group__x509__module.html#ga34939a983156816784e3d1a64fe0bac9">More...</a><br/></td></tr>
<tr class="separator:ga34939a983156816784e3d1a64fe0bac9"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:ga81299c99c393f6f58eff0471efb65ef7"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="group__x509__module.html#ga81299c99c393f6f58eff0471efb65ef7">x509_crt_info</a> (char *buf, size_t size, const char *prefix, const <a class="el" href="group__x509__module.html#gabc08a73588a59be2dd8943ebfc29ec9a">x509_crt</a> *crt)</td></tr>
<tr class="memdesc:ga81299c99c393f6f58eff0471efb65ef7"><td class="mdescLeft">&#160;</td><td class="mdescRight">Returns an informational string about the certificate.  <a href="group__x509__module.html#ga81299c99c393f6f58eff0471efb65ef7">More...</a><br/></td></tr>
<tr class="separator:ga81299c99c393f6f58eff0471efb65ef7"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:gaceaeaa6cd00a5c20e71a9a11122d58df"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="group__x509__module.html#gaceaeaa6cd00a5c20e71a9a11122d58df">x509_crt_verify</a> (<a class="el" href="group__x509__module.html#gabc08a73588a59be2dd8943ebfc29ec9a">x509_crt</a> *crt, <a class="el" href="group__x509__module.html#gabc08a73588a59be2dd8943ebfc29ec9a">x509_crt</a> *trust_ca, <a class="el" href="group__x509__module.html#ga6d6714f926c6cc578e0f983aa6ddaf2a">x509_crl</a> *ca_crl, const char *cn, int *flags, int(*f_vrfy)(void *, <a class="el" href="group__x509__module.html#gabc08a73588a59be2dd8943ebfc29ec9a">x509_crt</a> *, int, int *), void *p_vrfy)</td></tr>
<tr class="memdesc:gaceaeaa6cd00a5c20e71a9a11122d58df"><td class="mdescLeft">&#160;</td><td class="mdescRight">Verify the certificate signature.  <a href="group__x509__module.html#gaceaeaa6cd00a5c20e71a9a11122d58df">More...</a><br/></td></tr>
<tr class="separator:gaceaeaa6cd00a5c20e71a9a11122d58df"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:ga166632ed129cf4900d1d911adaa8ae74"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="group__x509__module.html#ga166632ed129cf4900d1d911adaa8ae74">x509_crt_check_key_usage</a> (const <a class="el" href="group__x509__module.html#gabc08a73588a59be2dd8943ebfc29ec9a">x509_crt</a> *crt, int usage)</td></tr>
<tr class="memdesc:ga166632ed129cf4900d1d911adaa8ae74"><td class="mdescLeft">&#160;</td><td class="mdescRight">Check usage of certificate against keyUsage extension.  <a href="group__x509__module.html#ga166632ed129cf4900d1d911adaa8ae74">More...</a><br/></td></tr>
<tr class="separator:ga166632ed129cf4900d1d911adaa8ae74"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:gad0a4670e68ac4ce67dd163907880b513"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="group__x509__module.html#gad0a4670e68ac4ce67dd163907880b513">x509_crt_check_extended_key_usage</a> (const <a class="el" href="group__x509__module.html#gabc08a73588a59be2dd8943ebfc29ec9a">x509_crt</a> *crt, const char *usage_oid, size_t usage_len)</td></tr>
<tr class="memdesc:gad0a4670e68ac4ce67dd163907880b513"><td class="mdescLeft">&#160;</td><td class="mdescRight">Check usage of certificate against extentedJeyUsage.  <a href="group__x509__module.html#gad0a4670e68ac4ce67dd163907880b513">More...</a><br/></td></tr>
<tr class="separator:gad0a4670e68ac4ce67dd163907880b513"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:ga4479c58d8c7274c50d940d2ea2dfd765"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="group__x509__module.html#ga4479c58d8c7274c50d940d2ea2dfd765">x509_crt_revoked</a> (const <a class="el" href="group__x509__module.html#gabc08a73588a59be2dd8943ebfc29ec9a">x509_crt</a> *crt, const <a class="el" href="group__x509__module.html#ga6d6714f926c6cc578e0f983aa6ddaf2a">x509_crl</a> *crl)</td></tr>
<tr class="memdesc:ga4479c58d8c7274c50d940d2ea2dfd765"><td class="mdescLeft">&#160;</td><td class="mdescRight">Verify the certificate revocation status.  <a href="group__x509__module.html#ga4479c58d8c7274c50d940d2ea2dfd765">More...</a><br/></td></tr>
<tr class="separator:ga4479c58d8c7274c50d940d2ea2dfd765"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:ga27ba872627e98561bd04b0fd3aca1297"><td class="memItemLeft" align="right" valign="top">void&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="group__x509__module.html#ga27ba872627e98561bd04b0fd3aca1297">x509_crt_init</a> (<a class="el" href="group__x509__module.html#gabc08a73588a59be2dd8943ebfc29ec9a">x509_crt</a> *crt)</td></tr>
<tr class="memdesc:ga27ba872627e98561bd04b0fd3aca1297"><td class="mdescLeft">&#160;</td><td class="mdescRight">Initialize a certificate (chain)  <a href="group__x509__module.html#ga27ba872627e98561bd04b0fd3aca1297">More...</a><br/></td></tr>
<tr class="separator:ga27ba872627e98561bd04b0fd3aca1297"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:ga63b4c873caf7b95bd4b081e476a60f1a"><td class="memItemLeft" align="right" valign="top">void&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="group__x509__module.html#ga63b4c873caf7b95bd4b081e476a60f1a">x509_crt_free</a> (<a class="el" href="group__x509__module.html#gabc08a73588a59be2dd8943ebfc29ec9a">x509_crt</a> *crt)</td></tr>
<tr class="memdesc:ga63b4c873caf7b95bd4b081e476a60f1a"><td class="mdescLeft">&#160;</td><td class="mdescRight">Unallocate all certificate data.  <a href="group__x509__module.html#ga63b4c873caf7b95bd4b081e476a60f1a">More...</a><br/></td></tr>
<tr class="separator:ga63b4c873caf7b95bd4b081e476a60f1a"><td class="memSeparator" colspan="2">&#160;</td></tr>
</table>
<a name="details" id="details"></a><h2 class="groupheader">Detailed Description</h2>
<div class="textblock"><p>X.509 certificate parsing and writing. </p>
<p>Copyright (C) 2006-2013, Brainspark B.V.</p>
<p>This file is part of PolarSSL (<a href="http://www.polarssl.org">http://www.polarssl.org</a>) Lead Maintainer: Paul Bakker &lt;polarssl_maintainer at polarssl.org&gt;</p>
<p>All rights reserved.</p>
<p>This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version.</p>
<p>This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.</p>
<p>You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. </p>

<p>Definition in file <a class="el" href="x509__crt_8h_source.html">x509_crt.h</a>.</p>
</div><h2 class="groupheader">Function Documentation</h2>
<a class="anchor" id="a7300897079a27c5fa424c9653081b286"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">int x509write_crt_der </td>
          <td>(</td>
          <td class="paramtype"><a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *&#160;</td>
          <td class="paramname"><em>ctx</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">unsigned char *&#160;</td>
          <td class="paramname"><em>buf</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">size_t&#160;</td>
          <td class="paramname"><em>size</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">int(*)(void *, unsigned char *, size_t)&#160;</td>
          <td class="paramname"><em>f_rng</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">void *&#160;</td>
          <td class="paramname"><em>p_rng</em>&#160;</td>
        </tr>
        <tr>
          <td></td>
          <td>)</td>
          <td></td><td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Write a built up certificate to a X509 DER structure Note: data is written at the end of the buffer! Use the return value to determine where you should start using the buffer. </p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">ctx</td><td>certificate to write away </td></tr>
    <tr><td class="paramname">buf</td><td>buffer to write to </td></tr>
    <tr><td class="paramname">size</td><td>size of the buffer </td></tr>
    <tr><td class="paramname">f_rng</td><td>RNG function (for signature, see note) </td></tr>
    <tr><td class="paramname">p_rng</td><td>RNG parameter</td></tr>
  </table>
  </dd>
</dl>
<dl class="section return"><dt>Returns</dt><dd>length of data written if successful, or a specific error code</dd></dl>
<dl class="section note"><dt>Note</dt><dd>f_rng may be NULL if RSA is used for signature and the signature is made offline (otherwise f_rng is desirable for countermeasures against timing attacks). ECDSA signatures always require a non-NULL f_rng. </dd></dl>

</div>
</div>
<a class="anchor" id="ac1e8ce08e2b45dc92105b589b34b2b27"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">void x509write_crt_free </td>
          <td>(</td>
          <td class="paramtype"><a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *&#160;</td>
          <td class="paramname"><em>ctx</em></td><td>)</td>
          <td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Free the contents of a CRT write context. </p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">ctx</td><td>CRT context to free </td></tr>
  </table>
  </dd>
</dl>

</div>
</div>
<a class="anchor" id="a00d51bcf5acb9b8ffd43dc2cd9c91bf0"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">void x509write_crt_init </td>
          <td>(</td>
          <td class="paramtype"><a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *&#160;</td>
          <td class="paramname"><em>ctx</em></td><td>)</td>
          <td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Initialize a CRT writing context. </p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">ctx</td><td>CRT context to initialize </td></tr>
  </table>
  </dd>
</dl>

</div>
</div>
<a class="anchor" id="a65d982a2325fff3f0c6806a512ef25cd"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">int x509write_crt_pem </td>
          <td>(</td>
          <td class="paramtype"><a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *&#160;</td>
          <td class="paramname"><em>ctx</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">unsigned char *&#160;</td>
          <td class="paramname"><em>buf</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">size_t&#160;</td>
          <td class="paramname"><em>size</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">int(*)(void *, unsigned char *, size_t)&#160;</td>
          <td class="paramname"><em>f_rng</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">void *&#160;</td>
          <td class="paramname"><em>p_rng</em>&#160;</td>
        </tr>
        <tr>
          <td></td>
          <td>)</td>
          <td></td><td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Write a built up certificate to a X509 PEM string. </p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">ctx</td><td>certificate to write away </td></tr>
    <tr><td class="paramname">buf</td><td>buffer to write to </td></tr>
    <tr><td class="paramname">size</td><td>size of the buffer </td></tr>
    <tr><td class="paramname">f_rng</td><td>RNG function (for signature, see note) </td></tr>
    <tr><td class="paramname">p_rng</td><td>RNG parameter</td></tr>
  </table>
  </dd>
</dl>
<dl class="section return"><dt>Returns</dt><dd>0 successful, or a specific error code</dd></dl>
<dl class="section note"><dt>Note</dt><dd>f_rng may be NULL if RSA is used for signature and the signature is made offline (otherwise f_rng is desirable for countermeasures against timing attacks). ECDSA signatures always require a non-NULL f_rng. </dd></dl>

</div>
</div>
<a class="anchor" id="ad59ee28b4bdee43a8579bdb0d9487a0f"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">int x509write_crt_set_authority_key_identifier </td>
          <td>(</td>
          <td class="paramtype"><a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *&#160;</td>
          <td class="paramname"><em>ctx</em></td><td>)</td>
          <td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Set the authorityKeyIdentifier extension for a CRT Requires that <a class="el" href="x509__crt_8h.html#ae4d75450c4b979b19adc3c4fec8202bf" title="Set the issuer key used for signing the certificate. ">x509write_crt_set_issuer_key()</a> has been called before. </p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">ctx</td><td>CRT context to use</td></tr>
  </table>
  </dd>
</dl>
<dl class="section return"><dt>Returns</dt><dd>0 if successful, or a POLARSSL_ERR_X509WRITE_MALLOC_FAILED </dd></dl>

</div>
</div>
<a class="anchor" id="a61a8cb196cce7f6b239be8e3e659d630"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">int x509write_crt_set_basic_constraints </td>
          <td>(</td>
          <td class="paramtype"><a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *&#160;</td>
          <td class="paramname"><em>ctx</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">int&#160;</td>
          <td class="paramname"><em>is_ca</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">int&#160;</td>
          <td class="paramname"><em>max_pathlen</em>&#160;</td>
        </tr>
        <tr>
          <td></td>
          <td>)</td>
          <td></td><td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Set the basicConstraints extension for a CRT. </p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">ctx</td><td>CRT context to use </td></tr>
    <tr><td class="paramname">is_ca</td><td>is this a CA certificate </td></tr>
    <tr><td class="paramname">max_pathlen</td><td>maximum length of certificate chains below this certificate (only for CA certificates, -1 is inlimited)</td></tr>
  </table>
  </dd>
</dl>
<dl class="section return"><dt>Returns</dt><dd>0 if successful, or a POLARSSL_ERR_X509WRITE_MALLOC_FAILED </dd></dl>

</div>
</div>
<a class="anchor" id="a86d4318af644578d56d2fc30111b552a"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">int x509write_crt_set_extension </td>
          <td>(</td>
          <td class="paramtype"><a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *&#160;</td>
          <td class="paramname"><em>ctx</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">const char *&#160;</td>
          <td class="paramname"><em>oid</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">size_t&#160;</td>
          <td class="paramname"><em>oid_len</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">int&#160;</td>
          <td class="paramname"><em>critical</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">const unsigned char *&#160;</td>
          <td class="paramname"><em>val</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">size_t&#160;</td>
          <td class="paramname"><em>val_len</em>&#160;</td>
        </tr>
        <tr>
          <td></td>
          <td>)</td>
          <td></td><td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Generic function to add to or replace an extension in the CRT. </p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">ctx</td><td>CRT context to use </td></tr>
    <tr><td class="paramname">oid</td><td>OID of the extension </td></tr>
    <tr><td class="paramname">oid_len</td><td>length of the OID </td></tr>
    <tr><td class="paramname">critical</td><td>if the extension is critical (per the RFC's definition) </td></tr>
    <tr><td class="paramname">val</td><td>value of the extension OCTET STRING </td></tr>
    <tr><td class="paramname">val_len</td><td>length of the value data</td></tr>
  </table>
  </dd>
</dl>
<dl class="section return"><dt>Returns</dt><dd>0 if successful, or a POLARSSL_ERR_X509WRITE_MALLOC_FAILED </dd></dl>

</div>
</div>
<a class="anchor" id="ae4d75450c4b979b19adc3c4fec8202bf"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">void x509write_crt_set_issuer_key </td>
          <td>(</td>
          <td class="paramtype"><a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *&#160;</td>
          <td class="paramname"><em>ctx</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype"><a class="el" href="structpk__context.html">pk_context</a> *&#160;</td>
          <td class="paramname"><em>key</em>&#160;</td>
        </tr>
        <tr>
          <td></td>
          <td>)</td>
          <td></td><td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Set the issuer key used for signing the certificate. </p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">ctx</td><td>CRT context to use </td></tr>
    <tr><td class="paramname">key</td><td>private key to sign with </td></tr>
  </table>
  </dd>
</dl>

</div>
</div>
<a class="anchor" id="a470b8fd3056f61183351189fff62a2dd"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">int x509write_crt_set_issuer_name </td>
          <td>(</td>
          <td class="paramtype"><a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *&#160;</td>
          <td class="paramname"><em>ctx</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">const char *&#160;</td>
          <td class="paramname"><em>issuer_name</em>&#160;</td>
        </tr>
        <tr>
          <td></td>
          <td>)</td>
          <td></td><td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Set the issuer name for a Certificate Issuer names should contain a comma-separated list of OID types and values: e.g. </p>
<p>"C=NL,O=Offspark,CN=PolarSSL CA"</p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">ctx</td><td>CRT context to use </td></tr>
    <tr><td class="paramname">issuer_name</td><td>issuer name to set</td></tr>
  </table>
  </dd>
</dl>
<dl class="section return"><dt>Returns</dt><dd>0 if issuer name was parsed successfully, or a specific error code </dd></dl>

</div>
</div>
<a class="anchor" id="a91cb154550fe39cfd578856633a87db0"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">int x509write_crt_set_key_usage </td>
          <td>(</td>
          <td class="paramtype"><a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *&#160;</td>
          <td class="paramname"><em>ctx</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">unsigned char&#160;</td>
          <td class="paramname"><em>key_usage</em>&#160;</td>
        </tr>
        <tr>
          <td></td>
          <td>)</td>
          <td></td><td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Set the Key Usage Extension flags (e.g. </p>
<p>KU_DIGITAL_SIGNATURE | KU_KEY_CERT_SIGN)</p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">ctx</td><td>CRT context to use </td></tr>
    <tr><td class="paramname">key_usage</td><td>key usage flags to set</td></tr>
  </table>
  </dd>
</dl>
<dl class="section return"><dt>Returns</dt><dd>0 if successful, or POLARSSL_ERR_X509WRITE_MALLOC_FAILED </dd></dl>

</div>
</div>
<a class="anchor" id="aceba04da0ec2a3530c7d3befeb022052"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">void x509write_crt_set_md_alg </td>
          <td>(</td>
          <td class="paramtype"><a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *&#160;</td>
          <td class="paramname"><em>ctx</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype"><a class="el" href="md_8h.html#af1fbbb67afa0daee4090cde8864e0b68">md_type_t</a>&#160;</td>
          <td class="paramname"><em>md_alg</em>&#160;</td>
        </tr>
        <tr>
          <td></td>
          <td>)</td>
          <td></td><td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Set the MD algorithm to use for the signature (e.g. </p>
<p>POLARSSL_MD_SHA1)</p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">ctx</td><td>CRT context to use </td></tr>
    <tr><td class="paramname">md_alg</td><td>MD algorithm to use </td></tr>
  </table>
  </dd>
</dl>

</div>
</div>
<a class="anchor" id="a1957691b91b68abcb8685fa348c77234"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">int x509write_crt_set_ns_cert_type </td>
          <td>(</td>
          <td class="paramtype"><a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *&#160;</td>
          <td class="paramname"><em>ctx</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">unsigned char&#160;</td>
          <td class="paramname"><em>ns_cert_type</em>&#160;</td>
        </tr>
        <tr>
          <td></td>
          <td>)</td>
          <td></td><td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Set the Netscape Cert Type flags (e.g. </p>
<p>NS_CERT_TYPE_SSL_CLIENT | NS_CERT_TYPE_EMAIL)</p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">ctx</td><td>CRT context to use </td></tr>
    <tr><td class="paramname">ns_cert_type</td><td>Netscape Cert Type flags to set</td></tr>
  </table>
  </dd>
</dl>
<dl class="section return"><dt>Returns</dt><dd>0 if successful, or POLARSSL_ERR_X509WRITE_MALLOC_FAILED </dd></dl>

</div>
</div>
<a class="anchor" id="a74bafc1a3cfa1044bdfb33f6d31f1b21"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">int x509write_crt_set_serial </td>
          <td>(</td>
          <td class="paramtype"><a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *&#160;</td>
          <td class="paramname"><em>ctx</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">const <a class="el" href="structmpi.html">mpi</a> *&#160;</td>
          <td class="paramname"><em>serial</em>&#160;</td>
        </tr>
        <tr>
          <td></td>
          <td>)</td>
          <td></td><td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Set the serial number for a Certificate. </p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">ctx</td><td>CRT context to use </td></tr>
    <tr><td class="paramname">serial</td><td>serial number to set</td></tr>
  </table>
  </dd>
</dl>
<dl class="section return"><dt>Returns</dt><dd>0 if successful </dd></dl>

</div>
</div>
<a class="anchor" id="a6dea2b3a87be62a618d66ef8a18c8920"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">void x509write_crt_set_subject_key </td>
          <td>(</td>
          <td class="paramtype"><a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *&#160;</td>
          <td class="paramname"><em>ctx</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype"><a class="el" href="structpk__context.html">pk_context</a> *&#160;</td>
          <td class="paramname"><em>key</em>&#160;</td>
        </tr>
        <tr>
          <td></td>
          <td>)</td>
          <td></td><td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Set the subject public key for the certificate. </p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">ctx</td><td>CRT context to use </td></tr>
    <tr><td class="paramname">key</td><td>public key to include </td></tr>
  </table>
  </dd>
</dl>

</div>
</div>
<a class="anchor" id="a8f1fbf2b803612f4fbf6497ef10cdd9b"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">int x509write_crt_set_subject_key_identifier </td>
          <td>(</td>
          <td class="paramtype"><a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *&#160;</td>
          <td class="paramname"><em>ctx</em></td><td>)</td>
          <td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Set the subjectKeyIdentifier extension for a CRT Requires that <a class="el" href="x509__crt_8h.html#a6dea2b3a87be62a618d66ef8a18c8920" title="Set the subject public key for the certificate. ">x509write_crt_set_subject_key()</a> has been called before. </p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">ctx</td><td>CRT context to use</td></tr>
  </table>
  </dd>
</dl>
<dl class="section return"><dt>Returns</dt><dd>0 if successful, or a POLARSSL_ERR_X509WRITE_MALLOC_FAILED </dd></dl>

</div>
</div>
<a class="anchor" id="a3e99cbb5deaac1854a5f2dd5523bf501"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">int x509write_crt_set_subject_name </td>
          <td>(</td>
          <td class="paramtype"><a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *&#160;</td>
          <td class="paramname"><em>ctx</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">const char *&#160;</td>
          <td class="paramname"><em>subject_name</em>&#160;</td>
        </tr>
        <tr>
          <td></td>
          <td>)</td>
          <td></td><td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Set the subject name for a Certificate Subject names should contain a comma-separated list of OID types and values: e.g. </p>
<p>"C=NL,O=Offspark,CN=PolarSSL Server 1"</p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">ctx</td><td>CRT context to use </td></tr>
    <tr><td class="paramname">subject_name</td><td>subject name to set</td></tr>
  </table>
  </dd>
</dl>
<dl class="section return"><dt>Returns</dt><dd>0 if subject name was parsed successfully, or a specific error code </dd></dl>

</div>
</div>
<a class="anchor" id="a2aae935adeb9aed5abc72eafe31701da"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">int x509write_crt_set_validity </td>
          <td>(</td>
          <td class="paramtype"><a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *&#160;</td>
          <td class="paramname"><em>ctx</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">const char *&#160;</td>
          <td class="paramname"><em>not_before</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">const char *&#160;</td>
          <td class="paramname"><em>not_after</em>&#160;</td>
        </tr>
        <tr>
          <td></td>
          <td>)</td>
          <td></td><td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Set the validity period for a Certificate Timestamps should be in string format for UTC timezone i.e. </p>
<p>"YYYYMMDDhhmmss" e.g. "20131231235959" for December 31st 2013 at 23:59:59</p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">ctx</td><td>CRT context to use </td></tr>
    <tr><td class="paramname">not_before</td><td>not_before timestamp </td></tr>
    <tr><td class="paramname">not_after</td><td>not_after timestamp</td></tr>
  </table>
  </dd>
</dl>
<dl class="section return"><dt>Returns</dt><dd>0 if timestamp was parsed successfully, or a specific error code </dd></dl>

</div>
</div>
<a class="anchor" id="a40e28129171de7c02f41999be09f1225"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">void x509write_crt_set_version </td>
          <td>(</td>
          <td class="paramtype"><a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *&#160;</td>
          <td class="paramname"><em>ctx</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">int&#160;</td>
          <td class="paramname"><em>version</em>&#160;</td>
        </tr>
        <tr>
          <td></td>
          <td>)</td>
          <td></td><td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Set the verion for a Certificate Default: X509_CRT_VERSION_3. </p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">ctx</td><td>CRT context to use </td></tr>
    <tr><td class="paramname">version</td><td>version to set (X509_CRT_VERSION_1, X509_CRT_VERSION_2 or X509_CRT_VERSION_3) </td></tr>
  </table>
  </dd>
</dl>

</div>
</div>
</div><!-- contents -->
<!-- start footer part -->
<hr class="footer"/><address class="footer"><small>
Generated on Thu Jul 31 2014 11:35:56 for PolarSSL v1.3.8 by &#160;<a href="http://www.doxygen.org/index.html">
<img class="footer" src="doxygen.png" alt="doxygen"/>
</a> 1.8.5
</small></address>
</body>
</html>