2017-10-19 05:48:23 +03:00
|
|
|
// SoftEther VPN Source Code - Developer Edition Master Branch
|
2014-01-04 17:00:08 +04:00
|
|
|
// Cedar Communication Module
|
|
|
|
//
|
|
|
|
// SoftEther VPN Server, Client and Bridge are free software under GPLv2.
|
|
|
|
//
|
2017-10-19 05:48:23 +03:00
|
|
|
// Copyright (c) Daiyuu Nobori.
|
2017-10-18 12:24:21 +03:00
|
|
|
// Copyright (c) SoftEther VPN Project, University of Tsukuba, Japan.
|
|
|
|
// Copyright (c) SoftEther Corporation.
|
2014-01-04 17:00:08 +04:00
|
|
|
//
|
|
|
|
// All Rights Reserved.
|
|
|
|
//
|
|
|
|
// http://www.softether.org/
|
|
|
|
//
|
2017-10-19 05:48:23 +03:00
|
|
|
// Author: Daiyuu Nobori, Ph.D.
|
2014-01-04 17:00:08 +04:00
|
|
|
// Comments: Tetsuo Sugiyama, Ph.D.
|
|
|
|
//
|
|
|
|
// This program is free software; you can redistribute it and/or
|
|
|
|
// modify it under the terms of the GNU General Public License
|
|
|
|
// version 2 as published by the Free Software Foundation.
|
|
|
|
//
|
|
|
|
// This program is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU General Public License version 2
|
|
|
|
// along with this program; if not, write to the Free Software
|
|
|
|
// Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
|
|
|
|
//
|
|
|
|
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
|
|
|
// EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
|
|
|
// MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
|
|
|
|
// IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
|
|
|
|
// CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
|
|
|
|
// TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
|
|
|
|
// SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
|
|
|
//
|
|
|
|
// THE LICENSE AGREEMENT IS ATTACHED ON THE SOURCE-CODE PACKAGE
|
|
|
|
// AS "LICENSE.TXT" FILE. READ THE TEXT FILE IN ADVANCE TO USE THE SOFTWARE.
|
|
|
|
//
|
|
|
|
//
|
|
|
|
// THIS SOFTWARE IS DEVELOPED IN JAPAN, AND DISTRIBUTED FROM JAPAN,
|
|
|
|
// UNDER JAPANESE LAWS. YOU MUST AGREE IN ADVANCE TO USE, COPY, MODIFY,
|
|
|
|
// MERGE, PUBLISH, DISTRIBUTE, SUBLICENSE, AND/OR SELL COPIES OF THIS
|
|
|
|
// SOFTWARE, THAT ANY JURIDICAL DISPUTES WHICH ARE CONCERNED TO THIS
|
|
|
|
// SOFTWARE OR ITS CONTENTS, AGAINST US (SOFTETHER PROJECT, SOFTETHER
|
|
|
|
// CORPORATION, DAIYUU NOBORI OR OTHER SUPPLIERS), OR ANY JURIDICAL
|
|
|
|
// DISPUTES AGAINST US WHICH ARE CAUSED BY ANY KIND OF USING, COPYING,
|
|
|
|
// MODIFYING, MERGING, PUBLISHING, DISTRIBUTING, SUBLICENSING, AND/OR
|
|
|
|
// SELLING COPIES OF THIS SOFTWARE SHALL BE REGARDED AS BE CONSTRUED AND
|
|
|
|
// CONTROLLED BY JAPANESE LAWS, AND YOU MUST FURTHER CONSENT TO
|
|
|
|
// EXCLUSIVE JURISDICTION AND VENUE IN THE COURTS SITTING IN TOKYO,
|
|
|
|
// JAPAN. YOU MUST WAIVE ALL DEFENSES OF LACK OF PERSONAL JURISDICTION
|
|
|
|
// AND FORUM NON CONVENIENS. PROCESS MAY BE SERVED ON EITHER PARTY IN
|
|
|
|
// THE MANNER AUTHORIZED BY APPLICABLE LAW OR COURT RULE.
|
|
|
|
//
|
2014-07-11 21:06:20 +04:00
|
|
|
// USE ONLY IN JAPAN. DO NOT USE THIS SOFTWARE IN ANOTHER COUNTRY UNLESS
|
|
|
|
// YOU HAVE A CONFIRMATION THAT THIS SOFTWARE DOES NOT VIOLATE ANY
|
|
|
|
// CRIMINAL LAWS OR CIVIL RIGHTS IN THAT PARTICULAR COUNTRY. USING THIS
|
|
|
|
// SOFTWARE IN OTHER COUNTRIES IS COMPLETELY AT YOUR OWN RISK. THE
|
|
|
|
// SOFTETHER VPN PROJECT HAS DEVELOPED AND DISTRIBUTED THIS SOFTWARE TO
|
|
|
|
// COMPLY ONLY WITH THE JAPANESE LAWS AND EXISTING CIVIL RIGHTS INCLUDING
|
|
|
|
// PATENTS WHICH ARE SUBJECTS APPLY IN JAPAN. OTHER COUNTRIES' LAWS OR
|
|
|
|
// CIVIL RIGHTS ARE NONE OF OUR CONCERNS NOR RESPONSIBILITIES. WE HAVE
|
|
|
|
// NEVER INVESTIGATED ANY CRIMINAL REGULATIONS, CIVIL LAWS OR
|
|
|
|
// INTELLECTUAL PROPERTY RIGHTS INCLUDING PATENTS IN ANY OF OTHER 200+
|
|
|
|
// COUNTRIES AND TERRITORIES. BY NATURE, THERE ARE 200+ REGIONS IN THE
|
|
|
|
// WORLD, WITH DIFFERENT LAWS. IT IS IMPOSSIBLE TO VERIFY EVERY
|
|
|
|
// COUNTRIES' LAWS, REGULATIONS AND CIVIL RIGHTS TO MAKE THE SOFTWARE
|
|
|
|
// COMPLY WITH ALL COUNTRIES' LAWS BY THE PROJECT. EVEN IF YOU WILL BE
|
|
|
|
// SUED BY A PRIVATE ENTITY OR BE DAMAGED BY A PUBLIC SERVANT IN YOUR
|
|
|
|
// COUNTRY, THE DEVELOPERS OF THIS SOFTWARE WILL NEVER BE LIABLE TO
|
|
|
|
// RECOVER OR COMPENSATE SUCH DAMAGES, CRIMINAL OR CIVIL
|
|
|
|
// RESPONSIBILITIES. NOTE THAT THIS LINE IS NOT LICENSE RESTRICTION BUT
|
|
|
|
// JUST A STATEMENT FOR WARNING AND DISCLAIMER.
|
2014-01-04 17:00:08 +04:00
|
|
|
//
|
2014-01-15 13:01:42 +04:00
|
|
|
//
|
|
|
|
// SOURCE CODE CONTRIBUTION
|
|
|
|
// ------------------------
|
|
|
|
//
|
|
|
|
// Your contribution to SoftEther VPN Project is much appreciated.
|
|
|
|
// Please send patches to us through GitHub.
|
|
|
|
// Read the SoftEther VPN Patch Acceptance Policy in advance:
|
|
|
|
// http://www.softether.org/5-download/src/9.patch
|
|
|
|
//
|
2014-01-04 17:00:08 +04:00
|
|
|
//
|
|
|
|
// DEAR SECURITY EXPERTS
|
|
|
|
// ---------------------
|
|
|
|
//
|
|
|
|
// If you find a bug or a security vulnerability please kindly inform us
|
|
|
|
// about the problem immediately so that we can fix the security problem
|
|
|
|
// to protect a lot of users around the world as soon as possible.
|
|
|
|
//
|
|
|
|
// Our e-mail address for security reports is:
|
|
|
|
// softether-vpn-security [at] softether.org
|
|
|
|
//
|
|
|
|
// Please note that the above e-mail address is not a technical support
|
|
|
|
// inquiry address. If you need technical assistance, please visit
|
|
|
|
// http://www.softether.org/ and ask your question on the users forum.
|
|
|
|
//
|
|
|
|
// Thank you for your cooperation.
|
2014-03-20 00:45:05 +04:00
|
|
|
//
|
|
|
|
//
|
|
|
|
// NO MEMORY OR RESOURCE LEAKS
|
|
|
|
// ---------------------------
|
|
|
|
//
|
|
|
|
// The memory-leaks and resource-leaks verification under the stress
|
|
|
|
// test has been passed before release this source code.
|
2014-01-04 17:00:08 +04:00
|
|
|
|
|
|
|
|
|
|
|
// Protocol.h
|
|
|
|
// Header of Protocol.c
|
|
|
|
|
|
|
|
#ifndef PROTOCOL_H
|
|
|
|
#define PROTOCOL_H
|
|
|
|
|
|
|
|
// The parameters that will be passed to the certificate confirmation thread
|
|
|
|
struct CHECK_CERT_THREAD_PROC
|
|
|
|
{
|
|
|
|
CONNECTION *Connection;
|
|
|
|
X *ServerX;
|
|
|
|
CHECK_CERT_PROC *CheckCertProc;
|
|
|
|
bool UserSelected;
|
2018-05-17 00:47:10 +03:00
|
|
|
bool Expired;
|
2014-01-04 17:00:08 +04:00
|
|
|
bool Ok;
|
|
|
|
};
|
|
|
|
|
|
|
|
// The parameters that will be passed to the secure device signature thread
|
|
|
|
struct SECURE_SIGN_THREAD_PROC
|
|
|
|
{
|
|
|
|
SECURE_SIGN_PROC *SecureSignProc;
|
|
|
|
CONNECTION *Connection;
|
|
|
|
SECURE_SIGN *SecureSign;
|
|
|
|
bool UserFinished;
|
|
|
|
bool Ok;
|
|
|
|
};
|
|
|
|
|
|
|
|
// Signature sending thread parameters
|
|
|
|
struct SEND_SIGNATURE_PARAM
|
|
|
|
{
|
|
|
|
char Hostname[MAX_PATH]; // Host name
|
|
|
|
UINT Port; // Port number
|
|
|
|
BUF *Buffer; // Packet contents
|
|
|
|
};
|
|
|
|
|
|
|
|
// Software update client callback
|
|
|
|
typedef void (UPDATE_NOTIFY_PROC)(UPDATE_CLIENT *c, UINT latest_build, UINT64 latest_date, char *latest_ver, char *url, volatile bool *halt_flag, void *param);
|
|
|
|
typedef bool (UPDATE_ISFOREGROUND_PROC)(UPDATE_CLIENT *c, void *param);
|
|
|
|
|
|
|
|
// Configure the software update client
|
|
|
|
struct UPDATE_CLIENT_SETTING
|
|
|
|
{
|
|
|
|
bool DisableCheck; // Disable the update check
|
|
|
|
UINT LatestIgnoreBuild; // Ignore for earlier or identical to this build number
|
|
|
|
};
|
|
|
|
|
|
|
|
// Software update client
|
|
|
|
struct UPDATE_CLIENT
|
|
|
|
{
|
|
|
|
char FamilyName[MAX_SIZE]; // Product family name
|
|
|
|
char SoftwareName[MAX_SIZE]; // Software Name
|
|
|
|
wchar_t SoftwareTitle[MAX_SIZE]; // Software display name
|
|
|
|
char ClientId[128]; // Client ID
|
|
|
|
UINT MyBuild; // Build number of myself
|
|
|
|
UINT64 MyDate; // Build date of myself
|
|
|
|
char MyLanguage[MAX_SIZE]; // My language
|
|
|
|
UPDATE_CLIENT_SETTING Setting; // Setting
|
|
|
|
UINT LatestBuild; // Latest build number that was successfully acquired
|
|
|
|
volatile bool HaltFlag; // Halting flag
|
|
|
|
EVENT *HaltEvent; // Halting event
|
|
|
|
void *Param; // Any parameters
|
|
|
|
THREAD *Thread; // Thread
|
|
|
|
UPDATE_NOTIFY_PROC *Callback; // Callback function
|
|
|
|
UPDATE_ISFOREGROUND_PROC *IsForegroundCb; // Callback function for retrieving whether foreground
|
|
|
|
};
|
|
|
|
|
|
|
|
//// Constant related to updating of the software
|
|
|
|
|
|
|
|
// Family
|
|
|
|
#define UPDATE_FAMILY_NAME _SS("PRODUCT_FAMILY_NAME")
|
|
|
|
|
|
|
|
// Software update server certificate hash
|
2016-11-27 11:43:14 +03:00
|
|
|
#define UPDATE_SERVER_CERT_HASH DDNS_CERT_HASH
|
2014-01-04 17:00:08 +04:00
|
|
|
|
|
|
|
// URL
|
|
|
|
#define UPDATE_SERVER_URL_GLOBAL "https://update-check.softether-network.net/update/update.aspx?family=%s&software=%s&mybuild=%u&lang=%s"
|
|
|
|
#define UPDATE_SERVER_URL_CHINA "https://update-check.uxcom.jp/update/update.aspx?family=%s&software=%s&mybuild=%u&lang=%s"
|
|
|
|
|
|
|
|
// Update check interval
|
|
|
|
#define UPDATE_CHECK_INTERVAL_MIN (12 * 3600 * 1000)
|
|
|
|
#define UPDATE_CHECK_INTERVAL_MAX (24 * 7200 * 1000)
|
|
|
|
|
|
|
|
// Connection parameters
|
|
|
|
#define UPDATE_CONNECT_TIMEOUT 5000
|
|
|
|
#define UPDATE_COMM_TIMEOUT 5000
|
|
|
|
|
2014-06-06 01:53:20 +04:00
|
|
|
// Dynamic root cert fetch function
|
|
|
|
#define CERT_HTTP_DOWNLOAD_MAXSIZE 65536
|
|
|
|
#define CERT_HTTP_DOWNLOAD_TIMEOUT (10 * 1000)
|
|
|
|
#define ROOT_CERTS_FILENAME "|root_certs.dat"
|
|
|
|
#define AUTO_DOWNLOAD_CERTS_PREFIX L".autodownload_"
|
|
|
|
#define FIND_CERT_CHAIN_MAX_DEPTH 16
|
2014-01-04 17:00:08 +04:00
|
|
|
|
2014-07-11 21:06:20 +04:00
|
|
|
#define PROTO_SUPPRESS_CLIENT_UPDATE_NOTIFICATION_REGKEY "Software\\" GC_REG_COMPANY_NAME "\\" CEDAR_PRODUCT_STR " VPN\\Client Update Notification"
|
|
|
|
#define PROTO_SUPPRESS_CLIENT_UPDATE_NOTIFICATION_REGVALUE "Suppress"
|
2014-01-04 17:00:08 +04:00
|
|
|
|
|
|
|
// Function prototype
|
|
|
|
UPDATE_CLIENT *NewUpdateClient(UPDATE_NOTIFY_PROC *cb, UPDATE_ISFOREGROUND_PROC *isforeground_cb, void *param, char *family_name, char *software_name, wchar_t *software_title, UINT my_build, UINT64 my_date, char *my_lang, UPDATE_CLIENT_SETTING *current_setting, char *client_id);
|
|
|
|
void FreeUpdateClient(UPDATE_CLIENT *c);
|
|
|
|
void UpdateClientThreadProc(THREAD *thread, void *param);
|
|
|
|
void UpdateClientThreadMain(UPDATE_CLIENT *c);
|
|
|
|
void UpdateClientThreadProcessResults(UPDATE_CLIENT *c, BUF *b);
|
|
|
|
void SetUpdateClientSetting(UPDATE_CLIENT *c, UPDATE_CLIENT_SETTING *s);
|
|
|
|
UINT64 ShortStrToDate64(char *str);
|
|
|
|
|
|
|
|
|
|
|
|
bool ServerAccept(CONNECTION *c);
|
|
|
|
bool ClientConnect(CONNECTION *c);
|
|
|
|
SOCK *ClientConnectToServer(CONNECTION *c);
|
2018-07-30 10:03:07 +03:00
|
|
|
SOCK *TcpIpConnect(char *hostname, UINT port, bool try_start_ssl);
|
|
|
|
SOCK *TcpIpConnectEx(char *hostname, UINT port, bool *cancel_flag, void *hWnd, UINT *nat_t_error_code, bool no_nat_t, bool try_start_ssl, IP *ret_ip);
|
2014-01-04 17:00:08 +04:00
|
|
|
bool ClientUploadSignature(SOCK *s);
|
|
|
|
bool ClientDownloadHello(CONNECTION *c, SOCK *s);
|
|
|
|
bool ServerDownloadSignature(CONNECTION *c, char **error_detail_str);
|
|
|
|
bool ServerUploadHello(CONNECTION *c);
|
|
|
|
bool ClientUploadAuth(CONNECTION *c);
|
2018-07-30 10:03:07 +03:00
|
|
|
SOCK *ClientConnectGetSocket(CONNECTION *c, bool additional_connect);
|
|
|
|
SOCK *TcpConnectEx2(char *hostname, UINT port, UINT timeout, bool *cancel_flag, void *hWnd, bool try_start_ssl);
|
|
|
|
SOCK *TcpConnectEx3(char *hostname, UINT port, UINT timeout, bool *cancel_flag, void *hWnd, bool no_nat_t, UINT *nat_t_error_code, bool try_start_ssl, IP *ret_ip);
|
2014-01-04 17:00:08 +04:00
|
|
|
|
|
|
|
void InitProtocol();
|
|
|
|
void FreeProtocol();
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
POLICY *PackGetPolicy(PACK *p);
|
|
|
|
void PackAddPolicy(PACK *p, POLICY *y);
|
|
|
|
PACK *PackWelcome(SESSION *s);
|
|
|
|
PACK *PackHello(void *random, UINT ver, UINT build, char *server_str);
|
|
|
|
bool GetHello(PACK *p, void *random, UINT *ver, UINT *build, char *server_str, UINT server_str_size);
|
|
|
|
PACK *PackLoginWithAnonymous(char *hubname, char *username);
|
|
|
|
PACK *PackLoginWithPassword(char *hubname, char *username, void *secure_password);
|
|
|
|
PACK *PackLoginWithPlainPassword(char *hubname, char *username, void *plain_password);
|
|
|
|
PACK *PackLoginWithCert(char *hubname, char *username, X *x, void *sign, UINT sign_size);
|
2018-04-06 00:04:58 +03:00
|
|
|
PACK *PackLoginWithOpenVPNCertificate(char *hubname, char *username, X *x);
|
2014-01-04 17:00:08 +04:00
|
|
|
bool GetMethodFromPack(PACK *p, char *method, UINT size);
|
|
|
|
bool GetHubnameAndUsernameFromPack(PACK *p, char *username, UINT username_size,
|
|
|
|
char *hubname, UINT hubname_size);
|
|
|
|
PACK *PackAdditionalConnect(UCHAR *session_key);
|
|
|
|
UINT GetAuthTypeFromPack(PACK *p);
|
|
|
|
UINT GetProtocolFromPack(PACK *p);
|
|
|
|
bool ParseWelcomeFromPack(PACK *p, char *session_name, UINT session_name_size,
|
|
|
|
char *connection_name, UINT connection_name_size,
|
|
|
|
POLICY **policy);
|
|
|
|
|
|
|
|
|
|
|
|
bool ClientAdditionalConnect(CONNECTION *c, THREAD *t);
|
|
|
|
SOCK *ClientAdditionalConnectToServer(CONNECTION *c);
|
|
|
|
bool ClientUploadAuth2(CONNECTION *c, SOCK *s);
|
|
|
|
bool GetSessionKeyFromPack(PACK *p, UCHAR *session_key, UINT *session_key_32);
|
|
|
|
|
|
|
|
SOCK *ProxyConnect(CONNECTION *c, char *proxy_host_name, UINT proxy_port,
|
|
|
|
char *server_host_name, UINT server_port,
|
|
|
|
char *username, char *password, bool additional_connect);
|
|
|
|
SOCK *ProxyConnectEx(CONNECTION *c, char *proxy_host_name, UINT proxy_port,
|
|
|
|
char *server_host_name, UINT server_port,
|
|
|
|
char *username, char *password, bool additional_connect,
|
|
|
|
bool *cancel_flag, void *hWnd);
|
|
|
|
SOCK *ProxyConnectEx2(CONNECTION *c, char *proxy_host_name, UINT proxy_port,
|
|
|
|
char *server_host_name, UINT server_port,
|
|
|
|
char *username, char *password, bool additional_connect,
|
|
|
|
bool *cancel_flag, void *hWnd, UINT timeout);
|
|
|
|
SOCK *SocksConnect(CONNECTION *c, char *proxy_host_name, UINT proxy_port,
|
|
|
|
char *server_host_name, UINT server_port,
|
|
|
|
char *username, bool additional_connect);
|
|
|
|
SOCK *SocksConnectEx(CONNECTION *c, char *proxy_host_name, UINT proxy_port,
|
|
|
|
char *server_host_name, UINT server_port,
|
|
|
|
char *username, bool additional_connect,
|
|
|
|
bool *cancel_flag, void *hWnd);
|
|
|
|
SOCK *SocksConnectEx2(CONNECTION *c, char *proxy_host_name, UINT proxy_port,
|
|
|
|
char *server_host_name, UINT server_port,
|
|
|
|
char *username, bool additional_connect,
|
2016-03-06 17:16:01 +03:00
|
|
|
bool *cancel_flag, void *hWnd, UINT timeout, IP *ret_ip);
|
2014-01-04 17:00:08 +04:00
|
|
|
bool SocksSendRequestPacket(CONNECTION *c, SOCK *s, UINT dest_port, IP *dest_ip, char *userid);
|
|
|
|
bool SocksRecvResponsePacket(CONNECTION *c, SOCK *s);
|
2018-10-30 17:11:16 +03:00
|
|
|
SOCK *Socks5Connect(CONNECTION *c, WPC_CONNECT *w, bool additional_connect, bool *cancel_flag, void *hWnd, UINT timeout, IP *ret_ip);
|
2014-01-04 17:00:08 +04:00
|
|
|
void CreateNodeInfo(NODE_INFO *info, CONNECTION *c);
|
|
|
|
UINT SecureSign(SECURE_SIGN *sign, UINT device_id, char *pin);
|
|
|
|
void ClientUploadNoop(CONNECTION *c);
|
|
|
|
bool ClientCheckServerCert(CONNECTION *c, bool *expired);
|
|
|
|
void ClientCheckServerCertThread(THREAD *thread, void *param);
|
|
|
|
bool ClientSecureSign(CONNECTION *c, UCHAR *sign, UCHAR *random, X **x);
|
|
|
|
void ClientSecureSignThread(THREAD *thread, void *param);
|
|
|
|
UINT SecureWrite(UINT device_id, char *cert_name, X *x, char *key_name, K *k, char *pin);
|
|
|
|
UINT SecureEnum(UINT device_id, char *pin, TOKEN_LIST **cert_list, TOKEN_LIST **key_list);
|
|
|
|
UINT SecureDelete(UINT device_id, char *pin, char *cert_name, char *key_name);
|
|
|
|
TOKEN_LIST *EnumHub(SESSION *s);
|
|
|
|
UINT ChangePasswordAccept(CONNECTION *c, PACK *p);
|
|
|
|
UINT ChangePassword(CEDAR *cedar, CLIENT_OPTION *o, char *hubname, char *username, char *old_pass, char *new_pass);
|
|
|
|
void PackAddClientVersion(PACK *p, CONNECTION *c);
|
|
|
|
void NodeInfoToStr(wchar_t *str, UINT size, NODE_INFO *info);
|
|
|
|
void GenerateMachineUniqueHash(void *data);
|
|
|
|
|
2014-06-06 01:53:20 +04:00
|
|
|
LIST *NewCertList(bool load_root_and_chain);
|
|
|
|
void FreeCertList(LIST *o);
|
|
|
|
bool IsXInCertList(LIST *o, X *x);
|
|
|
|
void AddXToCertList(LIST *o, X *x);
|
|
|
|
void AddAllRootCertsToCertList(LIST *o);
|
|
|
|
void AddAllChainCertsToCertList(LIST *o);
|
|
|
|
X *DownloadCert(char *url);
|
|
|
|
X *FindCertIssuerFromCertList(LIST *o, X *x);
|
|
|
|
bool TryGetRootCertChain(LIST *o, X *x, bool auto_save, X **found_root_x);
|
|
|
|
bool TryGetParentCertFromCertList(LIST *o, X *x, LIST *found_chain);
|
|
|
|
bool DownloadAndSaveIntermediateCertificatesIfNecessary(X *x);
|
|
|
|
|
2014-01-04 17:00:08 +04:00
|
|
|
|
|
|
|
#endif // PROTOCOL_H
|