tls_ocsp_process_response - Man Page

inspect an OCSP response

Synopsis

#include <tls.h>

int
tls_ocsp_process_response(struct tls *ctx, const unsigned char *response, size_t size);

const char *
tls_peer_ocsp_url(struct tls *ctx);

int
tls_peer_ocsp_response_status(struct tls *ctx);

int
tls_peer_ocsp_cert_status(struct tls *ctx);

int
tls_peer_ocsp_crl_reason(struct tls *ctx);

const char *
tls_peer_ocsp_result(struct tls *ctx);

time_t
tls_peer_ocsp_revocation_time(struct tls *ctx);

time_t
tls_peer_ocsp_this_update(struct tls *ctx);

time_t
tls_peer_ocsp_next_update(struct tls *ctx);

Description

tls_ocsp_process_response() processes a raw OCSP response in response of size size to check the revocation status of the peer certificate from ctx. A successful return code of 0 indicates that the certificate has not been revoked.

tls_peer_ocsp_url() returns the URL for OCSP validation of the peer certificate from ctx.

The following functions return information about the peer certificate from ctx that was obtained by validating a stapled OCSP response during the handshake, or via a previous call to tls_ocsp_process_response().

tls_peer_ocsp_response_status() returns the OCSP response status as per RFC 6960 section 2.3.

tls_peer_ocsp_cert_status() returns the OCSP certificate status code as per RFC 6960 section 2.2.

tls_peer_ocsp_crl_reason() returns the OCSP certificate revocation reason status code as per RFC 5280 section 5.3.1.

tls_peer_ocsp_result() returns a textual representation of the OCSP status code returned by one of the previous three functions. If the OCSP response was valid and the certificate was not revoked, the string indicates the OCSP certificate status. Otherwise, the string indicates the OCSP certificate revocation reason or the OCSP error.

tls_peer_ocsp_revocation_time() returns the OCSP revocation time.

tls_peer_ocsp_this_update() returns the OCSP this update time.

tls_peer_ocsp_next_update() returns the OCSP next update time.

Return Values

tls_ocsp_process_response() returns 0 on success or -1 on error.

tls_peer_ocsp_url() and tls_peer_ocsp_result() return NULL on error or an out of memory condition.

The tls_peer_ocsp_response_status() function returns one of TLS_OCSP_RESPONSE_SUCCESSFUL, TLS_OCSP_RESPONSE_MALFORMED, TLS_OCSP_RESPONSE_INTERNALERROR, TLS_OCSP_RESPONSE_TRYLATER, TLS_OCSP_RESPONSE_SIGREQUIRED, or TLS_OCSP_RESPONSE_UNAUTHORIZED on success or -1 on error.

The tls_peer_ocsp_cert_status() function returns one of TLS_OCSP_CERT_GOOD, TLS_OCSP_CERT_REVOKED, or TLS_OCSP_CERT_UNKNOWN on success, and -1 on error.

The tls_peer_ocsp_crl_reason() function returns one of TLS_CRL_REASON_UNSPECIFIED, TLS_CRL_REASON_KEY_COMPROMISE, TLS_CRL_REASON_CA_COMPROMISE, TLS_CRL_REASON_AFFILIATION_CHANGED, TLS_CRL_REASON_SUPERSEDED, TLS_CRL_REASON_CESSATION_OF_OPERATION, TLS_CRL_REASON_CERTIFICATE_HOLD, TLS_CRL_REASON_REMOVE_FROM_CRL, TLS_CRL_REASON_PRIVILEGE_WITHDRAWN, or TLS_CRL_REASON_AA_COMPROMISE on success or -1 on error.

tls_peer_ocsp_revocation_time(), tls_peer_ocsp_this_update(), and tls_peer_ocsp_next_update() return a time in epoch-seconds on success or -1 on error.

See Also

tls_client(3), tls_config_ocsp_require_stapling(3), tls_conn_version(3), tls_connect(3), tls_handshake(3), tls_init(3)

History

These functions appeared in OpenBSD 6.1.

Authors

Bob Beck <beck@openbsd.org>
Marko Kreen <markokr@gmail.com>

Referenced By

tls_config_ocsp_require_stapling(3), tls_conn_version(3), tls_init(3), tls_read(3).

The man pages tls_peer_ocsp_cert_status(3), tls_peer_ocsp_crl_reason(3), tls_peer_ocsp_next_update(3), tls_peer_ocsp_response_status(3), tls_peer_ocsp_result(3), tls_peer_ocsp_revocation_time(3), tls_peer_ocsp_this_update(3) and tls_peer_ocsp_url(3) are aliases of tls_ocsp_process_response(3).

July 24, 2018