KIO
kopenssl.h
Go to the documentation of this file.
00001 /* This file is part of the KDE libraries 00002 Copyright (C) 2001-2003 George Staikos <staikos@kde.org> 00003 00004 This library is free software; you can redistribute it and/or 00005 modify it under the terms of the GNU Library General Public 00006 License version 2 as published by the Free Software Foundation. 00007 00008 This library is distributed in the hope that it will be useful, 00009 but WITHOUT ANY WARRANTY; without even the implied warranty of 00010 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU 00011 Library General Public License for more details. 00012 00013 You should have received a copy of the GNU Library General Public License 00014 along with this library; see the file COPYING.LIB. If not, write to 00015 the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, 00016 Boston, MA 02110-1301, USA. 00017 */ 00018 00019 00020 // IF YOU ARE USING THIS CLASS, YOU ARE MAKING A MISTAKE. 00021 00022 #ifndef __KOPENSSLPROXY_H 00023 #define __KOPENSSLPROXY_H 00024 00025 #define KOSSL KOpenSSLProxy 00026 class KOpenSSLProxyPrivate; 00027 00028 #include <kio/kio_export.h> 00029 00030 #include <ksslconfig.h> 00031 00032 #ifdef KSSL_HAVE_SSL 00033 #define crypt _openssl_crypt 00034 #include <openssl/ssl.h> 00035 #include <openssl/x509.h> 00036 #include <openssl/x509v3.h> 00037 #include <openssl/pem.h> 00038 #include <openssl/bio.h> 00039 #include <openssl/rand.h> 00040 #include <openssl/asn1.h> 00041 #include <openssl/pkcs7.h> 00042 #include <openssl/pkcs12.h> 00043 #include <openssl/evp.h> 00044 #include <openssl/stack.h> 00045 #include <openssl/bn.h> 00046 #undef crypt 00047 #if OPENSSL_VERSION_NUMBER >= 0x10000000L 00048 #define STACK _STACK 00049 #define OSSL_SKVALUE_RTYPE void 00050 #define OSSL_MORECONST const 00051 #else 00052 #define OSSL_SKVALUE_RTYPE char 00053 #define OSSL_MORECONST 00054 #endif 00055 #endif 00056 00065 class KOpenSSLProxy { 00066 public: 00067 00072 static KOpenSSLProxy *self(); 00073 00077 bool hasLibCrypto() const; 00078 00082 bool hasLibSSL() const; 00083 00088 void destroy(); 00089 00090 // Here are the symbols that we need. 00091 #ifdef KSSL_HAVE_SSL 00092 00093 /* 00094 * SSL_connect - initiate the TLS/SSL handshake with an TLS/SSL server 00095 */ 00096 int SSL_connect(SSL *ssl); 00097 00098 /* 00099 * SSL_accept - initiate the TLS/SSL handshake with an TLS/SSL server 00100 */ 00101 int SSL_accept(SSL *ssl); 00102 00103 /* 00104 * SSL_get_error - get the error code 00105 */ 00106 int SSL_get_error(SSL *ssl, int rc); 00107 00108 /* 00109 * SSL_read - read bytes from a TLS/SSL connection. 00110 */ 00111 int SSL_read(SSL *ssl, void *buf, int num); 00112 00113 /* 00114 * SSL_write - write bytes to a TLS/SSL connection. 00115 */ 00116 int SSL_write(SSL *ssl, const void *buf, int num); 00117 00118 /* 00119 * SSL_new - create a new SSL structure for a connection 00120 */ 00121 SSL *SSL_new(SSL_CTX *ctx); 00122 00123 /* 00124 * SSL_free - free an allocated SSL structure 00125 */ 00126 void SSL_free(SSL *ssl); 00127 00128 /* 00129 * SSL_shutdown - shutdown an allocated SSL connection 00130 */ 00131 int SSL_shutdown(SSL *ssl); 00132 00133 /* 00134 * SSL_CTX_new - create a new SSL_CTX object as framework for TLS/SSL enabled functions 00135 */ 00136 SSL_CTX *SSL_CTX_new(SSL_METHOD *method); 00137 00138 /* 00139 * SSL_CTX_free - free an allocated SSL_CTX object 00140 */ 00141 void SSL_CTX_free(SSL_CTX *ctx); 00142 00143 /* 00144 * SSL_set_fd - connect the SSL object with a file descriptor 00145 */ 00146 int SSL_set_fd(SSL *ssl, int fd); 00147 00148 /* 00149 * SSL_pending - obtain number of readable bytes buffered in an SSL object 00150 */ 00151 int SSL_pending(SSL *ssl); 00152 00153 /* 00154 * SSL_peek - obtain bytes buffered in an SSL object 00155 */ 00156 int SSL_peek(SSL *ssl, void *buf, int num); 00157 00158 /* 00159 * SSL_CTX_set_cipher_list - choose list of available SSL_CIPHERs 00160 */ 00161 int SSL_CTX_set_cipher_list(SSL_CTX *ctx, const char *str); 00162 00163 /* 00164 * SSL_CTX_set_verify - set peer certificate verification parameters 00165 */ 00166 void SSL_CTX_set_verify(SSL_CTX *ctx, int mode, 00167 int (*verify_callback)(int, X509_STORE_CTX *)); 00168 00169 /* 00170 * SSL_use_certificate - load certificate 00171 */ 00172 int SSL_use_certificate(SSL *ssl, X509 *x); 00173 00174 /* 00175 * SSL_get_current_cipher - get SSL_CIPHER of a connection 00176 */ 00177 SSL_CIPHER *SSL_get_current_cipher(SSL *ssl); 00178 00179 /* 00180 * SSL_set_options - manipulate SSL engine options 00181 * Note: These are all mapped to SSL_ctrl so call them as the comment 00182 * specifies but know that they use SSL_ctrl. They are #define 00183 * so they will map to the one in this class if called as a 00184 * member function of this class. 00185 */ 00186 /* long SSL_set_options(SSL *ssl, long options); */ 00187 /* Returns 0 if not reused, 1 if session id is reused */ 00188 /* int SSL_session_reused(SSL *ssl); */ 00189 long SSL_ctrl(SSL *ssl,int cmd, long larg, char *parg); 00190 00191 /* 00192 * RAND_egd - set the path to the EGD 00193 */ 00194 int RAND_egd(const char *path); 00195 00196 00197 /* 00198 * RAND_file_name 00199 */ 00200 const char *RAND_file_name(char *buf, size_t num); 00201 00202 00203 /* 00204 * RAND_load_file 00205 */ 00206 int RAND_load_file(const char *filename, long max_bytes); 00207 00208 00209 /* 00210 * RAND_write_file 00211 */ 00212 int RAND_write_file(const char *filename); 00213 00214 00215 /* 00216 * TLSv1_client_method - return a TLSv1 client method object 00217 */ 00218 SSL_METHOD *TLSv1_client_method(); 00219 00220 00221 /* 00222 * SSLv23_client_method - return a SSLv23 client method object 00223 */ 00224 SSL_METHOD *SSLv23_client_method(); 00225 00226 00227 /* 00228 * SSL_get_peer_certificate - return the peer's certificate 00229 */ 00230 X509 *SSL_get_peer_certificate(SSL *s); 00231 00232 00233 /* 00234 * SSL_get_peer_cert_chain - get the peer's certificate chain 00235 */ 00236 STACK_OF(X509) *SSL_get_peer_cert_chain(SSL *s); 00237 00238 /* 00239 * SSL_CIPHER_get_bits - get the number of bits in this cipher 00240 */ 00241 int SSL_CIPHER_get_bits(SSL_CIPHER *c,int *alg_bits); 00242 00243 00244 /* 00245 * SSL_CIPHER_get_version - get the version of this cipher 00246 */ 00247 char *SSL_CIPHER_get_version(SSL_CIPHER *c); 00248 00249 00250 /* 00251 * SSL_CIPHER_get_name - get the name of this cipher 00252 */ 00253 const char *SSL_CIPHER_get_name(SSL_CIPHER *c); 00254 00255 00256 /* 00257 * SSL_CIPHER_description - get the description of this cipher 00258 */ 00259 char *SSL_CIPHER_description(SSL_CIPHER *,char *buf,int size); 00260 00261 00262 /* 00263 * SSL_CTX_use_PrivateKey - set the private key for the session. 00264 * - for use with client certificates 00265 */ 00266 int SSL_CTX_use_PrivateKey(SSL_CTX *ctx, EVP_PKEY *pkey); 00267 00268 00269 /* 00270 * SSL_CTX_use_certificate - set the client certificate for the session. 00271 */ 00272 int SSL_CTX_use_certificate(SSL_CTX *ctx, X509 *x); 00273 00274 00275 /* 00276 * d2i_X509 - Convert a text representation of X509 to an X509 object 00277 */ 00278 X509 * d2i_X509(X509 **a,unsigned char **pp,long length); 00279 00280 00281 /* 00282 * i2d_X509 - Convert an X509 object into a text representation 00283 */ 00284 int i2d_X509(X509 *a,unsigned char **pp); 00285 00286 00287 /* 00288 * X509_cmp - compare two X509 objects 00289 */ 00290 int X509_cmp(X509 *a, X509 *b); 00291 00292 00293 /* 00294 * X509_dup - duplicate an X509 object 00295 */ 00296 X509 *X509_dup(X509 *x509); 00297 00298 00299 /* 00300 * X509_STORE_CTX_new - create an X509 store context 00301 */ 00302 X509_STORE_CTX *X509_STORE_CTX_new(void); 00303 00304 00305 /* 00306 * X509_STORE_CTX_free - free up an X509 store context 00307 */ 00308 void X509_STORE_CTX_free(X509_STORE_CTX *v); 00309 00310 00311 /* 00312 * X509_STORE_CTX_set_chain - set the certificate chain 00313 */ 00314 void X509_STORE_CTX_set_chain(X509_STORE_CTX *v, STACK_OF(X509)* x); 00315 00316 /* 00317 * X509_STORE_CTX_set_purpose - set the purpose of the certificate 00318 */ 00319 void X509_STORE_CTX_set_purpose(X509_STORE_CTX *v, int purpose); 00320 00321 /* 00322 * X509_verify_cert - verify the certificate 00323 */ 00324 int X509_verify_cert(X509_STORE_CTX *v); 00325 00326 00327 /* 00328 * X509_STORE_new - create an X509 store 00329 */ 00330 X509_STORE *X509_STORE_new(void); 00331 00332 00333 /* 00334 * X509_STORE_free - free up an X509 store 00335 */ 00336 void X509_STORE_free(X509_STORE *v); 00337 00338 00339 /* 00340 * X509_free - free up an X509 00341 */ 00342 void X509_free(X509 *v); 00343 00344 00345 /* 00346 * X509_NAME_oneline - return the X509 data in a string 00347 */ 00348 char *X509_NAME_oneline(X509_NAME *a, char *buf, int size); 00349 00350 00351 /* 00352 * X509_get_subject_name - return the X509_NAME for the subject field 00353 */ 00354 X509_NAME *X509_get_subject_name(X509 *a); 00355 00356 00357 /* 00358 * X509_get_issuer_name - return the X509_NAME for the issuer field 00359 */ 00360 X509_NAME *X509_get_issuer_name(X509 *a); 00361 00362 00363 /* 00364 * X509_STORE_add_lookup - add a lookup file/method to an X509 store 00365 */ 00366 X509_LOOKUP *X509_STORE_add_lookup(X509_STORE *v, X509_LOOKUP_METHOD *m); 00367 00368 00369 /* 00370 * X509_LOOKUP_file - Definition of the LOOKUP_file method 00371 */ 00372 X509_LOOKUP_METHOD *X509_LOOKUP_file(void); 00373 00374 00375 /* 00376 * X509_LOOKUP_free - Free an X509_LOOKUP 00377 */ 00378 void X509_LOOKUP_free(X509_LOOKUP *x); 00379 00380 00381 /* 00382 * X509_LOOKUP_ctrl - This is not normally called directly (use macros) 00383 */ 00384 int X509_LOOKUP_ctrl(X509_LOOKUP *ctx, int cmd, const char *argc, long argl, char **ret); 00385 00386 00387 /* 00388 * X509_STORE_CTX_init - initialize an X509 STORE context 00389 */ 00390 void X509_STORE_CTX_init(X509_STORE_CTX *ctx, X509_STORE *store, X509 *x509, STACK_OF(X509) *chain); 00391 00392 00393 /* 00394 * CRYPTO_free - free up an internally allocated object 00395 */ 00396 void CRYPTO_free(void *x); 00397 00398 /* 00399 * BIO_new - create new BIO 00400 */ 00401 BIO *BIO_new(BIO_METHOD *type); 00402 00403 /* 00404 * BIO methods - only one defined here yet 00405 */ 00406 BIO_METHOD *BIO_s_mem(void); 00407 00408 /* 00409 * BIO_new_fp - nastiness called BIO - used to create BIO* from FILE* 00410 */ 00411 BIO *BIO_new_fp(FILE *stream, int close_flag); 00412 00413 /* 00414 * BIO_new_mem_buf - read only BIO from memory region 00415 */ 00416 BIO *BIO_new_mem_buf(void *buf, int len); 00417 00418 /* 00419 * BIO_free - nastiness called BIO - used to destroy BIO* 00420 */ 00421 int BIO_free(BIO *a); 00422 00423 /* 00424 * BIO_ctrl - BIO control method 00425 */ 00426 long BIO_ctrl(BIO *bp,int cmd,long larg,void *parg); 00427 00428 /* 00429 * BIO_write - equivalent to ::write for BIO 00430 */ 00431 int BIO_write(BIO *b, const void *data, int len); 00432 00433 /* 00434 * PEM_write_bio_X509 - write a PEM encoded cert to a BIO* 00435 */ 00436 int PEM_write_bio_X509(BIO *bp, X509 *x); 00437 00438 /* 00439 * ASN1_item_i2d_fp - used for netscape output 00440 */ 00441 int ASN1_item_i2d_fp(FILE *out, unsigned char *x); 00442 00443 00444 /* 00445 * ASN1_d2i_fp - read an X509 from a DER encoded file (buf can be NULL) 00446 */ 00447 X509 *X509_d2i_fp(FILE *out, X509** buf); 00448 00449 00450 /* 00451 * X509_print - print the text form of an X509 00452 */ 00453 int X509_print(FILE *fp, X509 *x); 00454 00455 00456 /* 00457 * Read a PKCS#12 cert from fp 00458 */ 00459 PKCS12 *d2i_PKCS12_fp(FILE *fp, PKCS12 **p12); 00460 00461 00462 /* 00463 * Change the password on a PKCS#12 cert 00464 */ 00465 int PKCS12_newpass(PKCS12 *p12, char *oldpass, char *newpass); 00466 00467 00468 /* 00469 * Write a PKCS#12 to mem 00470 */ 00471 int i2d_PKCS12(PKCS12 *p12, unsigned char **p); 00472 00473 00474 /* 00475 * Write a PKCS#12 to FILE* 00476 */ 00477 int i2d_PKCS12_fp(FILE *fp, PKCS12 *p12); 00478 00479 00480 /* 00481 * Create a new PKCS#12 object 00482 */ 00483 PKCS12 *PKCS12_new(void); 00484 00485 00486 /* 00487 * Destroy that PKCS#12 that you created! 00488 */ 00489 void PKCS12_free(PKCS12 *a); 00490 00491 00492 /* 00493 * Parse the PKCS#12 00494 */ 00495 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, 00496 X509 **cert, STACK_OF(X509) **ca); 00497 00498 00499 /* 00500 * Free the Private Key 00501 */ 00502 void EVP_PKEY_free(EVP_PKEY *x); 00503 00504 00505 /* 00506 * Pop off the stack 00507 */ 00508 char *sk_pop(STACK *s); 00509 00510 00511 /* 00512 * Free the stack 00513 */ 00514 void sk_free(STACK *s); 00515 00516 #if OPENSSL_VERSION_NUMBER >= 0x10000000L 00517 void sk_free(void *s) { return sk_free(reinterpret_cast<STACK*>(s)); } 00518 #endif 00519 00520 /* 00521 * Number of elements in the stack 00522 */ 00523 int sk_num(STACK *s); 00524 00525 00526 /* 00527 * Value of element n in the stack 00528 */ 00529 char *sk_value(STACK *s, int n); 00530 00531 #if OPENSSL_VERSION_NUMBER >= 0x10000000L 00532 char *sk_value(void *s, int n) { return sk_value(reinterpret_cast<STACK*>(s), n); } 00533 #endif 00534 00535 /* 00536 * Create a new stack 00537 */ 00538 STACK *sk_new(int (*cmp)()); 00539 00540 00541 /* 00542 * Add an element to the stack 00543 */ 00544 int sk_push(STACK *s, char *d); 00545 00546 #if OPENSSL_VERSION_NUMBER >= 0x10000000L 00547 int sk_push(void *s, void *d) { return sk_push(reinterpret_cast<STACK*>(s), reinterpret_cast<char*>(d)); } 00548 #endif 00549 00550 00551 /* 00552 * Duplicate the stack 00553 */ 00554 STACK *sk_dup(STACK *s); 00555 00556 00557 /* 00558 * Convert an ASN1_INTEGER to its text form 00559 */ 00560 char *i2s_ASN1_INTEGER(X509V3_EXT_METHOD *meth, ASN1_INTEGER *aint); 00561 00562 00563 /* 00564 * Get the certificate's serial number 00565 */ 00566 ASN1_INTEGER *X509_get_serialNumber(X509 *x); 00567 00568 00569 /* 00570 * Get the certificate's public key 00571 */ 00572 EVP_PKEY *X509_get_pubkey(X509 *x); 00573 00574 00575 /* 00576 * Convert the public key to a decimal form 00577 */ 00578 int i2d_PublicKey(EVP_PKEY *a, unsigned char **pp); 00579 00580 00581 /* 00582 * Check the private key of a PKCS bundle against the X509 00583 */ 00584 int X509_check_private_key(X509 *x, EVP_PKEY *p); 00585 00586 00587 /* 00588 * Convert a BIGNUM to a hex string 00589 */ 00590 char *BN_bn2hex(const BIGNUM *a); 00591 00592 00593 /* 00594 * Compute the digest of an X.509 00595 */ 00596 int X509_digest(const X509 *x,const EVP_MD *t, unsigned char *md, unsigned int *len); 00597 00598 00599 /* 00600 * EVP_md5 00601 */ 00602 EVP_MD *EVP_md5(); 00603 00604 00605 /* 00606 * ASN1_INTEGER free 00607 */ 00608 void ASN1_INTEGER_free(ASN1_INTEGER *x); 00609 00610 /* 00611 * ASN1_STRING_data 00612 */ 00613 unsigned char *ASN1_STRING_data(ASN1_STRING *x); 00614 00615 /* 00616 * ASN1_STRING_length 00617 */ 00618 int ASN1_STRING_length(ASN1_STRING *x); 00619 00620 /* 00621 * 00622 */ 00623 int OBJ_obj2nid(ASN1_OBJECT *o); 00624 00625 /* 00626 * 00627 */ 00628 const char * OBJ_nid2ln(int n); 00629 00630 /* 00631 * get the number of extensions 00632 */ 00633 int X509_get_ext_count(X509 *x); 00634 00635 /* 00636 * 00637 */ 00638 int X509_get_ext_by_NID(X509 *x, int nid, int lastpos); 00639 00640 /* 00641 * 00642 */ 00643 int X509_get_ext_by_OBJ(X509 *x,ASN1_OBJECT *obj,int lastpos); 00644 00645 /* 00646 * 00647 */ 00648 X509_EXTENSION *X509_get_ext(X509 *x, int loc); 00649 00650 /* 00651 * 00652 */ 00653 X509_EXTENSION *X509_delete_ext(X509 *x, int loc); 00654 00655 /* 00656 * 00657 */ 00658 int X509_add_ext(X509 *x, X509_EXTENSION *ex, int loc); 00659 00660 /* 00661 * 00662 */ 00663 void *X509_get_ext_d2i(X509 *x, int nid, int *crit, int *idx); 00664 00665 /* 00666 * 00667 */ 00668 char *i2s_ASN1_OCTET_STRING(X509V3_EXT_METHOD *method, ASN1_OCTET_STRING *ia5); 00669 00670 /* 00671 * 00672 */ 00673 int ASN1_BIT_STRING_get_bit(ASN1_BIT_STRING *a, int n); 00674 00675 /* 00676 * 00677 */ 00678 PKCS7 *PKCS7_new(void); 00679 00680 /* 00681 * 00682 */ 00683 void PKCS7_free(PKCS7 *a); 00684 00685 /* 00686 * 00687 */ 00688 void PKCS7_content_free(PKCS7 *a); 00689 00690 /* 00691 * 00692 */ 00693 int i2d_PKCS7(PKCS7 *a, unsigned char **pp); 00694 00695 /* 00696 * 00697 */ 00698 PKCS7 *d2i_PKCS7(PKCS7 **a, unsigned char **pp,long length); 00699 00700 /* 00701 * 00702 */ 00703 int i2d_PKCS7_fp(FILE *fp,PKCS7 *p7); 00704 00705 /* 00706 * 00707 */ 00708 PKCS7 *d2i_PKCS7_fp(FILE *fp,PKCS7 **p7); 00709 00710 /* 00711 * 00712 */ 00713 int i2d_PKCS7_bio(BIO *bp,PKCS7 *p7); 00714 00715 /* 00716 * 00717 */ 00718 PKCS7 *d2i_PKCS7_bio(BIO *bp,PKCS7 **p7); 00719 00720 /* 00721 * 00722 */ 00723 PKCS7 *PKCS7_dup(PKCS7 *p7); 00724 00725 /* 00726 * Create a PKCS7 signature / signed message 00727 */ 00728 PKCS7 *PKCS7_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs, 00729 BIO *data, int flags); 00730 00731 /* 00732 * Verify a PKCS7 signature. 00733 */ 00734 int PKCS7_verify(PKCS7 *p7, STACK_OF(X509) *certs, X509_STORE *store, 00735 BIO *indata, BIO *out, int flags); 00736 00737 /* 00738 * Get signers of a verified PKCS7 signature 00739 */ 00740 STACK_OF(X509) *PKCS7_get0_signers(PKCS7 *p7, STACK_OF(X509) *certs, int flags); 00741 00742 /* 00743 * PKCS7 encrypt message 00744 */ 00745 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, EVP_CIPHER *cipher, 00746 int flags); 00747 00748 /* 00749 * decrypt PKCS7 message 00750 */ 00751 int PKCS7_decrypt(PKCS7 *p7, EVP_PKEY *pkey, X509 *cert, BIO *data, int flags); 00752 00753 00754 /* 00755 * Load a CA list file. 00756 */ 00757 STACK_OF(X509_NAME) *SSL_load_client_CA_file(const char *file); 00758 00759 /* 00760 * Load a file of PEM encoded objects. 00761 */ 00762 STACK_OF(X509_INFO) *PEM_X509_INFO_read(FILE *fp, STACK_OF(X509_INFO) *sk, 00763 pem_password_cb *cb, void *u); 00764 00765 /* 00766 * Get the number of purposes available 00767 */ 00768 int X509_PURPOSE_get_count(); 00769 00770 00771 /* 00772 * Get the ID of a purpose 00773 */ 00774 int X509_PURPOSE_get_id(X509_PURPOSE *); 00775 00776 00777 /* 00778 * Check the existence of purpose id "id" in x. for CA, set ca = 1, else 0 00779 */ 00780 int X509_check_purpose(X509 *x, int id, int ca); 00781 00782 00783 /* 00784 * Get the purpose with index #idx 00785 */ 00786 X509_PURPOSE * X509_PURPOSE_get0(int idx); 00787 00788 00789 /* 00790 * Create a new Private KEY 00791 */ 00792 EVP_PKEY* EVP_PKEY_new(); 00793 00794 00795 /* 00796 * Assign a private key 00797 */ 00798 int EVP_PKEY_assign(EVP_PKEY *pkey, int type, char *key); 00799 00800 00801 /* 00802 * Generate a RSA key 00803 */ 00804 RSA *RSA_generate_key(int bits, unsigned long e, void 00805 (*callback)(int,int,void *), void *cb_arg); 00806 00807 00808 /* 00809 * Create/destroy a certificate request 00810 */ 00811 X509_REQ *X509_REQ_new(); 00812 void X509_REQ_free(X509_REQ *a); 00813 00814 00815 /* 00816 * Set the public key in the REQ object 00817 */ 00818 int X509_REQ_set_pubkey(X509_REQ *x, EVP_PKEY *pkey); 00819 00820 /* for testing */ 00821 int i2d_X509_REQ_fp(FILE *fp, X509_REQ *x); 00822 00823 /* SMime support */ 00824 STACK *X509_get1_email(X509 *x); 00825 void X509_email_free(STACK *sk); 00826 00827 /* Ciphers needed for SMime */ 00828 EVP_CIPHER *EVP_des_ede3_cbc(); 00829 EVP_CIPHER *EVP_des_cbc(); 00830 EVP_CIPHER *EVP_rc2_cbc(); 00831 EVP_CIPHER *EVP_rc2_64_cbc(); 00832 EVP_CIPHER *EVP_rc2_40_cbc(); 00833 00834 /* clear the current error - use this often*/ 00835 void ERR_clear_error(); 00836 00837 /* retrieve the latest error */ 00838 unsigned long ERR_get_error(); 00839 00840 /* Print the errors to this stream */ 00841 void ERR_print_errors_fp(FILE *fp); 00842 00843 /* Get a pointer to the SSL session id (reference counted) */ 00844 SSL_SESSION *SSL_get1_session(SSL *ssl); 00845 00846 /* Frees a pointer to the SSL session id (reference decremented if needed) */ 00847 void SSL_SESSION_free(SSL_SESSION *session); 00848 00849 /* Set the SSL session to reuse. */ 00850 int SSL_set_session(SSL *ssl, SSL_SESSION *session); 00851 00852 /* Decode ASN.1 to SSL_SESSION */ 00853 SSL_SESSION *d2i_SSL_SESSION(SSL_SESSION **a, unsigned char **pp, long length); 00854 /* Encode SSL_SESSION to ASN.1 */ 00855 int i2d_SSL_SESSION(SSL_SESSION *in, unsigned char **pp); 00856 00857 /* Write privatekey to FILE stream */ 00858 int i2d_PrivateKey_fp(FILE*, EVP_PKEY*); 00859 00860 /* Write PKCS#8privatekey to FILE stream */ 00861 int i2d_PKCS8PrivateKey_fp(FILE*, EVP_PKEY*, const EVP_CIPHER*, char*, int, pem_password_cb*, void*); 00862 00863 /* Free RSA structure */ 00864 void RSA_free(RSA*); 00865 00866 /* Get a blowfish CBC pointer */ 00867 EVP_CIPHER *EVP_bf_cbc(); 00868 00869 /* Sign a CSR */ 00870 int X509_REQ_sign(X509_REQ*, EVP_PKEY*, const EVP_MD*); 00871 00872 /* add a name entry */ 00873 int X509_NAME_add_entry_by_txt(X509_NAME*, char*, int, unsigned char*, int, int, int); 00874 00875 /* Create a name */ 00876 X509_NAME *X509_NAME_new(); 00877 00878 /* Set the subject */ 00879 int X509_REQ_set_subject_name(X509_REQ*,X509_NAME*); 00880 00881 /* get list of available SSL_CIPHER's sorted by preference */ 00882 STACK_OF(SSL_CIPHER) *SSL_get_ciphers(const SSL* ssl); 00883 00884 #endif 00885 00886 private: 00887 friend class KOpenSSLProxyPrivate; 00888 KOpenSSLProxy(); 00889 ~KOpenSSLProxy(); 00890 KOpenSSLProxyPrivate * const d; 00891 }; 00892 00893 #endif
KDE 4.6 API Reference