mirror of
				https://git.haproxy.org/git/haproxy.git/
				synced 2025-11-04 02:21:03 +01:00 
			
		
		
		
	
		
			
				
	
	
		
			64 lines
		
	
	
		
			2.9 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			64 lines
		
	
	
		
			2.9 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
/*
 | 
						|
 * include/proto/ssl_ckch.h
 | 
						|
 * ckch function prototypes
 | 
						|
 *
 | 
						|
 * Copyright (C) 2020 HAProxy Technologies, William Lallemand <wlallemand@haproxy.com>
 | 
						|
 *
 | 
						|
 * This library is free software; you can redistribute it and/or
 | 
						|
 * modify it under the terms of the GNU Lesser General Public
 | 
						|
 * License as published by the Free Software Foundation, version 2.1
 | 
						|
 * exclusively.
 | 
						|
 *
 | 
						|
 * This library is distributed in the hope that it will be useful,
 | 
						|
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 | 
						|
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 | 
						|
 * Lesser General Public License for more details.
 | 
						|
 *
 | 
						|
 * You should have received a copy of the GNU Lesser General Public
 | 
						|
 * License along with this library; if not, write to the Free Software
 | 
						|
 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA  02110-1301  USA
 | 
						|
 */
 | 
						|
 | 
						|
#ifndef _PROTO_SSL_CKCH_H
 | 
						|
#define _PROTO_SSL_CKCH_H
 | 
						|
#ifdef USE_OPENSSL
 | 
						|
 | 
						|
/* cert_key_and_chain functions */
 | 
						|
 | 
						|
int ssl_sock_load_files_into_ckch(const char *path, struct cert_key_and_chain *ckch, char **err);
 | 
						|
int ssl_sock_load_pem_into_ckch(const char *path, char *buf, struct cert_key_and_chain *ckch , char **err);
 | 
						|
void ssl_sock_free_cert_key_and_chain_contents(struct cert_key_and_chain *ckch);
 | 
						|
 | 
						|
int ssl_sock_load_key_into_ckch(const char *path, char *buf, struct cert_key_and_chain *ckch , char **err);
 | 
						|
int ssl_sock_load_ocsp_response_from_file(const char *ocsp_path, char *buf, struct cert_key_and_chain *ckch, char **err);
 | 
						|
int ssl_sock_load_sctl_from_file(const char *sctl_path, char *buf, struct cert_key_and_chain *ckch, char **err);
 | 
						|
int ssl_sock_load_issuer_file_into_ckch(const char *path, char *buf, struct cert_key_and_chain *ckch, char **err);
 | 
						|
 | 
						|
/* checks if a key and cert exists in the ckch */
 | 
						|
#if HA_OPENSSL_VERSION_NUMBER >= 0x1000200fL
 | 
						|
static inline int ssl_sock_is_ckch_valid(struct cert_key_and_chain *ckch)
 | 
						|
{
 | 
						|
	return (ckch->cert != NULL && ckch->key != NULL);
 | 
						|
}
 | 
						|
#endif
 | 
						|
 | 
						|
/* ckch_store functions */
 | 
						|
struct ckch_store *ckchs_load_cert_file(char *path, int multi, char **err);
 | 
						|
struct ckch_store *ckchs_lookup(char *path);
 | 
						|
struct ckch_store *ckchs_dup(const struct ckch_store *src);
 | 
						|
struct ckch_store *ckch_store_new(const char *filename, int nmemb);
 | 
						|
void ckch_store_free(struct ckch_store *store);
 | 
						|
 | 
						|
 | 
						|
/* ckch_inst functions */
 | 
						|
void ckch_inst_free(struct ckch_inst *inst);
 | 
						|
struct ckch_inst *ckch_inst_new();
 | 
						|
int ckch_inst_new_load_multi_store(const char *path, struct ckch_store *ckchs,
 | 
						|
                                   struct bind_conf *bind_conf, struct ssl_bind_conf *ssl_conf,
 | 
						|
                                   char **sni_filter, int fcount, struct ckch_inst **ckchi, char **err);
 | 
						|
int ckch_inst_new_load_store(const char *path, struct ckch_store *ckchs, struct bind_conf *bind_conf,
 | 
						|
                             struct ssl_bind_conf *ssl_conf, char **sni_filter, int fcount, struct ckch_inst **ckchi, char **err);
 | 
						|
 | 
						|
#endif /* USE_OPENSSL */
 | 
						|
#endif /* _PROTO_SSL_CRTLIST_H */
 |