[OpenBSD]

Manual Page Search Parameters

TLS_OCSP_PROCESS_RESPONSE(3) Library Functions Manual TLS_OCSP_PROCESS_RESPONSE(3)

NAME

tls_ocsp_process_response, tls_peer_ocsp_cert_status, tls_peer_ocsp_crl_reason, tls_peer_ocsp_next_update, tls_peer_ocsp_response_status, tls_peer_ocsp_result_msg, tls_peer_ocsp_revocation_time, tls_peer_ocsp_this_update, tls_peer_ocsp_urlinspect an OCSP response

SYNOPSIS

#include <tls.h>
int
tls_ocsp_process_response(struct tls *ctx, const unsigned char *response, size_t size);
int
tls_peer_ocsp_cert_status(struct tls *ctx);
int
tls_peer_ocsp_crl_reason(struct tls *ctx);
time_t
tls_peer_ocsp_next_update(struct tls *ctx);
int
tls_peer_ocsp_response_status(struct tls *ctx);
const char *
tls_peer_ocsp_result_msg(struct tls *ctx);
time_t
tls_peer_ocsp_revocation_time(struct tls *ctx);
time_t
tls_peer_ocsp_this_update(struct tls *ctx);
const char *
tls_peer_ocsp_url(struct tls *ctx);

DESCRIPTION

tls_ocsp_process_response() processes a raw OCSP response in response of size size to check the revocation status of the peer certificate from ctx. A successful return code of 0 indicates that the certificate has not been revoked.
tls_peer_ocsp_url() returns the URL for OCSP validation of the peer certificate from ctx.
The following functions return information about the peer certificate from ctx that was obtained by validating a stapled OCSP response during the handshake, or via a previous call to tls_ocsp_process_response().
tls_peer_ocsp_cert_status() returns the OCSP certificate status code as per RFC 6960 section 2.2.
tls_peer_ocsp_crl_reason() returns the OCSP certificate revocation reason status code as per RFC 5280 section 5.3.1.
tls_peer_ocsp_next_update() returns the OCSP next update time.
tls_peer_ocsp_response_status() returns the OCSP response status as per RFC 6960 section 2.3.
tls_peer_ocsp_revocation_time() returns the OCSP revocation time.
tls_peer_ocsp_this_update() returns the OCSP this update time.

RETURN VALUES

tls_ocsp_process_response() returns 0 on success or -1 on error.
The tls_peer_ocsp_response_status() function returns one of TLS_OCSP_RESPONSE_SUCCESSFUL, TLS_OCSP_RESPONSE_MALFORMED, TLS_OCSP_RESPONSE_INTERNALERROR, TLS_OCSP_RESPONSE_TRYLATER, TLS_OCSP_RESPONSE_SIGREQUIRED, or TLS_OCSP_RESPONSE_UNAUTHORIZED on success or -1 on error.
The tls_peer_ocsp_cert_status() function returns one of TLS_OCSP_CERT_GOOD, TLS_OCSP_CERT_REVOKED, or TLS_OCSP_CERT_UNKNOWN on success, and -1 on error.
The tls_peer_ocsp_crl_reason() function returns one of TLS_CRL_REASON_UNSPECIFIED, TLS_CRL_REASON_KEY_COMPROMISE, TLS_CRL_REASON_CA_COMPROMISE, TLS_CRL_REASON_AFFILIATION_CHANGED, TLS_CRL_REASON_SUPERSEDED, TLS_CRL_REASON_CESSATION_OF_OPERATION, TLS_CRL_REASON_CERTIFICATE_HOLD, TLS_CRL_REASON_REMOVE_FROM_CRL, TLS_CRL_REASON_PRIVILEGE_WITHDRAWN, or TLS_CRL_REASON_AA_COMPROMISE on success or -1 on error.
tls_peer_ocsp_next_update(), tls_peer_ocsp_revocation_time(), and tls_peer_ocsp_this_update() return a time in epoch-seconds on success or -1 on error.
tls_peer_ocsp_result_msg() and tls_peer_ocsp_url() return NULL on error or an out of memory condition.

SEE ALSO

tls_client(3), tls_config_ocsp_require_stapling(3), tls_conn_version(3), tls_connect(3), tls_handshake(3), tls_init(3)

HISTORY

These functions appeared in OpenBSD 6.1.

AUTHORS

Bob Beck <beck@openbsd.org>
Marko Kreen <markokr@gmail.com>
January 29, 2017 OpenBSD-current