xconst.c

来自「支持SSL v2/v3, TLS, PKCS #5, PKCS #7, PKCS」· C语言 代码 · 共 254 行

C
254
字号
/* * The contents of this file are subject to the Mozilla Public * License Version 1.1 (the "License"); you may not use this file * except in compliance with the License. You may obtain a copy of * the License at http://www.mozilla.org/MPL/ *  * Software distributed under the License is distributed on an "AS * IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or * implied. See the License for the specific language governing * rights and limitations under the License. *  * The Original Code is the Netscape security libraries. *  * The Initial Developer of the Original Code is Netscape * Communications Corporation.  Portions created by Netscape are  * Copyright (C) 1994-2000 Netscape Communications Corporation.  All * Rights Reserved. *  * Contributor(s): *  * Alternatively, the contents of this file may be used under the * terms of the GNU General Public License Version 2 or later (the * "GPL"), in which case the provisions of the GPL are applicable  * instead of those above.  If you wish to allow use of your  * version of this file only under the terms of the GPL and not to * allow others to use your version of this file under the MPL, * indicate your decision by deleting the provisions above and * replace them with the notice and other provisions required by * the GPL.  If you do not delete the provisions above, a recipient * may use your version of this file under either the MPL or the * GPL. *//* * X.509 Extension Encoding   */#include "prtypes.h"#include "mcom_db.h"#include "seccomon.h"#include "secdert.h"#include "secoidt.h"#include "secasn1t.h"#include "secasn1.h"#include "certt.h"#include "secder.h"#include "prprf.h"#include "xconst.h"#include "genname.h"#include "secasn1.h"static const SEC_ASN1Template CERTSubjectKeyIDTemplate[] = {{ SEC_ASN1_OCTET_STRING }};static const SEC_ASN1Template CERTIA5TypeTemplate[] = {{ SEC_ASN1_IA5_STRING }};static const SEC_ASN1Template CERTPrivateKeyUsagePeriodTemplate[] = {    { SEC_ASN1_SEQUENCE,      0, NULL, sizeof(PKUPEncodedContext) },    { SEC_ASN1_OPTIONAL | SEC_ASN1_CONTEXT_SPECIFIC  | 0,		  offsetof(PKUPEncodedContext, notBefore), SEC_GeneralizedTimeTemplate},    { SEC_ASN1_OPTIONAL | SEC_ASN1_CONTEXT_SPECIFIC  | 1,	  offsetof(PKUPEncodedContext, notAfter), SEC_GeneralizedTimeTemplate},    { 0, } };const SEC_ASN1Template CERTAltNameTemplate[] = {    { SEC_ASN1_CONSTRUCTED, offsetof(AltNameEncodedContext, encodedGenName),       CERT_GeneralNamesTemplate}};const SEC_ASN1Template CERTAuthInfoAccessItemTemplate[] = {    { SEC_ASN1_SEQUENCE,      0, NULL, sizeof(CERTAuthInfoAccess) },    { SEC_ASN1_OBJECT_ID,      offsetof(CERTAuthInfoAccess, method) },    { SEC_ASN1_ANY,      offsetof(CERTAuthInfoAccess, derLocation) },    { 0, }};const SEC_ASN1Template CERTAuthInfoAccessTemplate[] = {    { SEC_ASN1_SEQUENCE_OF, 0, CERTAuthInfoAccessItemTemplate }};SECStatus CERT_EncodeSubjectKeyID(PRArenaPool *arena, char *value, int len, SECItem *encodedValue){    SECItem encodeContext;    SECStatus rv = SECSuccess;    PORT_Memset (&encodeContext, 0, sizeof (encodeContext));        if (value != NULL) {	encodeContext.data = (unsigned char *)value;	encodeContext.len = len;    }    if (SEC_ASN1EncodeItem (arena, encodedValue, &encodeContext,			    CERTSubjectKeyIDTemplate) == NULL) {	rv = SECFailure;    }        return(rv);}SECStatusCERT_EncodePublicKeyUsagePeriod(PRArenaPool *arena, PKUPEncodedContext *pkup, SECItem *encodedValue){    SECStatus rv = SECSuccess;    if (SEC_ASN1EncodeItem (arena, encodedValue, pkup,			    CERTPrivateKeyUsagePeriodTemplate) == NULL) {	rv = SECFailure;    }    return(rv);}SECStatus CERT_EncodeIA5TypeExtension(PRArenaPool *arena, char *value, SECItem *encodedValue){    SECItem encodeContext;    SECStatus rv = SECSuccess;    PORT_Memset (&encodeContext, 0, sizeof (encodeContext));        if (value != NULL) {	encodeContext.data = (unsigned char *)value;	encodeContext.len = strlen(value);    }    if (SEC_ASN1EncodeItem (arena, encodedValue, &encodeContext,			    CERTIA5TypeTemplate) == NULL) {	rv = SECFailure;    }        return(rv);}SECStatusCERT_EncodeAltNameExtension(PRArenaPool *arena,  CERTGeneralName  *value, SECItem *encodedValue){    SECItem                **encodedGenName;    SECStatus              rv = SECSuccess;    encodedGenName = cert_EncodeGeneralNames(arena, value);    if (SEC_ASN1EncodeItem (arena, encodedValue, &encodedGenName,			    CERT_GeneralNamesTemplate) == NULL) {	rv = SECFailure;    }    return rv;}CERTGeneralName *CERT_DecodeAltNameExtension(PRArenaPool *arena, SECItem *EncodedAltName){    SECStatus              rv = SECSuccess;    AltNameEncodedContext  encodedContext;    encodedContext.encodedGenName = NULL;    PORT_Memset(&encodedContext, 0, sizeof(AltNameEncodedContext));    rv = SEC_ASN1DecodeItem (arena, &encodedContext, CERT_GeneralNamesTemplate,			     EncodedAltName);    if (rv == SECFailure) {	goto loser;    }    return cert_DecodeGeneralNames(arena, encodedContext.encodedGenName);loser:    return NULL;}SECStatusCERT_EncodeNameConstraintsExtension(PRArenaPool          *arena, 				    CERTNameConstraints  *value,				    SECItem              *encodedValue){    SECStatus     rv = SECSuccess;        rv = cert_EncodeNameConstraints(value, arena, encodedValue);    return rv;}CERTNameConstraints *CERT_DecodeNameConstraintsExtension(PRArenaPool          *arena,				    SECItem              *encodedConstraints){    return  cert_DecodeNameConstraints(arena, encodedConstraints);}CERTAuthInfoAccess **cert_DecodeAuthInfoAccessExtension(PRArenaPool *arena,				   SECItem     *encodedExtension){    CERTAuthInfoAccess **info = NULL;    SECStatus rv;    int i;    rv = SEC_ASN1DecodeItem(arena, &info, CERTAuthInfoAccessTemplate, 			    encodedExtension);    if (rv != SECSuccess || info == NULL) {	return NULL;    }    for (i = 0; info[i] != NULL; i++) {	info[i]->location = cert_DecodeGeneralName(arena,						   &(info[i]->derLocation),						   NULL);    }    return info;}SECStatuscert_EncodeAuthInfoAccessExtension(PRArenaPool *arena,				   CERTAuthInfoAccess **info,				   SECItem *dest){    SECItem *dummy;    int i;    PORT_Assert(info != NULL);    PORT_Assert(dest != NULL);    if (info == NULL || dest == NULL) {	return SECFailure;    }    for (i = 0; info[i] != NULL; i++) {	if (cert_EncodeGeneralName(info[i]->location, &(info[i]->derLocation),				   arena) == NULL)	    /* Note that this may leave some of the locations filled in. */	    return SECFailure;    }    dummy = SEC_ASN1EncodeItem(arena, dest, &info,			       CERTAuthInfoAccessTemplate);    if (dummy == NULL) {	return SECFailure;    }    return SECSuccess;}

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?