📄 pkcsreq.c
字号:
/*******************************************************************
*
* This file was generated by TIS/ASN1COMP Ver. 4.0, an ASN.1 compiler.
* TIS/ASN1COMP is Copyright (c) 1998, TIS Labs at Network Associates, Inc.
*
* This file was AUTOMATICALLY GENERATED on Fri Jan 15 15:22:21 1999
*
******************************************************************/
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include "pkcsreq_asn.h"
/*******************************************************************
*
* Code for internal routines
*
* DropInPlaceXXX: drops the contents of a block, in place
*
* _PackXXX: packs up a structure into an ASN.1 block
*
* UnpkInPlaceXXX: unpacks an ASN.1 block into a structure in place
*
* _unPackXXX: carves a structure block and unpacks into it
*
******************************************************************/
/******************************************************************
* Routines for CertRep
******************************************************************/
size_t PKISizeofCertRepInternal(
PKICertRep *asnstruct,
int outerSizeFlag,
int expTaggedFlag)
{
size_t body_size = 0;
if (asnstruct == NULL)
return 0;
body_size =
PKISizeofContentInfoInternal(asnstruct->certs, PKITRUE, PKIFALSE)
+ PKISizeofOCTET_STRINGInternal(&asnstruct->rspInfo, PKITRUE, PKIFALSE) ;
if (outerSizeFlag == PKITRUE)
body_size = PKITagged(body_size, 1);
if (expTaggedFlag == PKITRUE)
body_size = PKITagged(body_size, 1); /* this is seq like */
return body_size;
} /* PKISizeofCertRepInternal */
void PKIDropInPlaceCertRep(
PKICONTEXT *ctx,
PKICertRep *f)
{
if (ctx == NULL)
return;
if (f == NULL) return ;
PKIFreeContentInfo(ctx, f->certs);
f->certs = NULL;
PKIDropInPlaceOCTET_STRING(ctx, &(f->rspInfo));
} /* PKIDropInPlaceCertRep */
size_t PKIPackCertRepInternal(
PKICONTEXT *ctx,
unsigned char *buf,
size_t buflen,
PKICertRep *asnstruct,
unsigned char tag,
int *erret)
{
size_t bytesused;
size_t tagsize;
size_t datasize;
if (erret == NULL) return 0; /* can't report errors */
if (ctx == NULL) {
PKIERR(PKIErrBadContext);
return 0;
}
if (asnstruct == NULL) return 0;
/* lth of the block body */
datasize = PKISizeofCertRep(ctx, asnstruct, PKIFALSE);
tagsize = 1 + PKILengthSize(datasize);
if (datasize+tagsize > buflen) {
PKIERR(PKIErrPackBufferTooShort);
return 0;
}
/* this is a SEQUENCE */
bytesused = PKIPutTag(buf, (unsigned char)(tag|0x20), datasize);
if (bytesused != tagsize) {
PKIERR(PKIErrPackOverrun);
return bytesused;
}
datasize += tagsize;
do {
/* field certs of CertRep */
if (asnstruct->certs != NULL) { /* optional */
bytesused += PKIPackContentInfoInternal(ctx, buf+bytesused, buflen-bytesused,
asnstruct->certs, PKIID_ContentInfo, erret );
if (bytesused > datasize || *erret != 0)
break;
}
/* field rspInfo of CertRep */
bytesused += PKIPackOCTET_STRINGInternal(ctx, buf+bytesused, buflen-bytesused,
&(asnstruct->rspInfo), PKIID_OCTET_STRING, erret);
if (bytesused > datasize || *erret != 0)
break;
} while(0);
if (bytesused < datasize && *erret == 0)
PKIERR(PKIErrPackUnderrun)
else if (bytesused > datasize && *erret == 0)
PKIERR(PKIErrPackOverrun)
return bytesused;
} /* PKIPackCertRepInternal */
size_t PKIUnpkInPlaceCertRep(
PKICONTEXT *ctx,
PKICertRep *asnstruct,
const unsigned char *buf,
size_t buflen,
unsigned char tag,
int *erret)
{
size_t bytesused = 0;
size_t datasize;
size_t localsize;
int indef = 0;
PKITRACE_PRINT_FN((tag|0x20), 0x30, "SEQUENCE", "CertRep" );
if (erret == NULL) return 0; /* can't report errors */
*erret = 0;
if (ctx == NULL) {
PKIERR(PKIErrBadContext);
return 0;
}
if (asnstruct == NULL) {
PKIERR(PKIErrUnpackNoStructure);
return 0;
}
if (buf == NULL) {
PKIERR(PKIErrUnpackNoBlockPtr);
return 0;
}
if (buflen <= 0) return 0; /* no error -- no block */
if ( (*buf & 0xDF) != (tag & 0xDF) )
return 0; /* no error code, just no block */
if ( (*buf & 0x20) != 0x20) {
PKIERR(PKIErrUnpackInvalidEncoding);
return 0;
}
/* accept the tag byte */
bytesused++;
/* get the block length */
bytesused += PKIGetLength(buf+bytesused, &datasize);
if ((int)datasize == -1) {
localsize = buflen;
indef = 1;
}
else {
localsize = bytesused + datasize;
if (localsize > buflen) {
PKIERR(PKIErrUnpackOverrun);
return 0;
}
}
PKITRACE_INCR_LEVEL;
do {
/* field certs of CertRep */
if (asnstruct->certs != NULL)
PKIFreeContentInfo(ctx, asnstruct->certs);
bytesused += PKIUnpackContentInfoInternal(ctx, &(asnstruct->certs),
buf+bytesused, localsize-bytesused, PKIID_ContentInfo, erret);
if (bytesused > localsize || *erret != 0)
break;
/* field rspInfo of CertRep */
bytesused += PKIUnpkInPlaceOCTET_STRING(ctx, &(asnstruct->rspInfo), buf+bytesused,
localsize-bytesused, PKIID_OCTET_STRING, erret);
if (bytesused > localsize || *erret != 0)
break;
if (indef) {
if ( *(buf+bytesused) != 0x00 &&
*(buf+bytesused+1) != 0x00 ) {
PKIERR(PKIErrUnpackInvalidEncoding);
break;
}
bytesused += 2;
}
} while(0);
PKITRACE_DECR_LEVEL;
if (bytesused > localsize && *erret == 0)
PKIERR(PKIErrUnpackOverrun);
if (!indef && bytesused < localsize && *erret == 0)
PKIERR(PKIErrUnpackUnderrun);
return bytesused;
} /* PKIUnpkInPlaceCertRep */
size_t PKIUnpackCertRepInternal(
PKICONTEXT *ctx,
PKICertRep **asnstruct,
const unsigned char *buf,
size_t buflen,
unsigned char tag,
int *erret)
{
size_t bytesused;
PKICertRep *local = NULL;
if (erret == NULL) return 0;
*erret = 0;
if (ctx == NULL) {
PKIERR(PKIErrBadContext);
return 0;
}
if (asnstruct == NULL) {
PKIERR(PKIErrUnpackNoStructure);
return 0;
}
*asnstruct = NULL;
if (buflen <= 0) return 0; /* no bytes left */
if ( (*buf & 0xDF) != (tag & 0xDF) )
return 0; /* not correct tag */
local = PKINewCertRep(ctx); /* carve a block for it */
bytesused = PKIUnpkInPlaceCertRep(ctx, local, buf, buflen, tag, erret);
if (*erret != 0) {
if (local != NULL) PKIFreeCertRep(ctx, local);
return 0;
}
*asnstruct = local;
return bytesused;
} /* PKIUnpackCertRepInternal */
/******************************************************************
* Routines for GetCRL
******************************************************************/
size_t PKISizeofGetCRLInternal(
PKIGetCRL *asnstruct,
int outerSizeFlag,
int expTaggedFlag)
{
size_t body_size = 0;
if (asnstruct == NULL)
return 0;
body_size =
PKISizeofNameInternal(&asnstruct->issuerName, PKITRUE, PKIFALSE)
+ PKISizeofGeneralNameInternal(asnstruct->crlName, PKITRUE, PKIFALSE)
+ PKISizeofGeneralizedTimeInternal(asnstruct->time, PKITRUE, PKIFALSE)
+ PKISizeofReasonFlagsInternal(asnstruct->reason, PKITRUE, PKIFALSE) ;
if (outerSizeFlag == PKITRUE)
body_size = PKITagged(body_size, 1);
if (expTaggedFlag == PKITRUE)
body_size = PKITagged(body_size, 1); /* this is seq like */
return body_size;
} /* PKISizeofGetCRLInternal */
void PKIDropInPlaceGetCRL(
PKICONTEXT *ctx,
PKIGetCRL *f)
{
if (ctx == NULL)
return;
if (f == NULL) return ;
PKIDropInPlaceName(ctx, &(f->issuerName));
PKIFreeGeneralName(ctx, f->crlName);
f->crlName = NULL;
PKIFreeGeneralizedTime(ctx, f->time);
f->time = NULL;
PKIFreeReasonFlags(ctx, f->reason);
f->reason = NULL;
} /* PKIDropInPlaceGetCRL */
size_t PKIPackGetCRLInternal(
PKICONTEXT *ctx,
unsigned char *buf,
size_t buflen,
PKIGetCRL *asnstruct,
unsigned char tag,
int *erret)
{
size_t bytesused;
size_t tagsize;
size_t datasize;
if (erret == NULL) return 0; /* can't report errors */
if (ctx == NULL) {
PKIERR(PKIErrBadContext);
return 0;
}
if (asnstruct == NULL) return 0;
/* lth of the block body */
datasize = PKISizeofGetCRL(ctx, asnstruct, PKIFALSE);
tagsize = 1 + PKILengthSize(datasize);
if (datasize+tagsize > buflen) {
PKIERR(PKIErrPackBufferTooShort);
return 0;
}
/* this is a SEQUENCE */
bytesused = PKIPutTag(buf, (unsigned char)(tag|0x20), datasize);
if (bytesused != tagsize) {
PKIERR(PKIErrPackOverrun);
return bytesused;
}
datasize += tagsize;
do {
/* field issuerName of GetCRL */
bytesused += PKIPackNameInternal(ctx, buf+bytesused, buflen-bytesused,
&(asnstruct->issuerName), PKIID_Name, erret);
if (bytesused > datasize || *erret != 0)
break;
/* field crlName of GetCRL */
if (asnstruct->crlName != NULL) { /* optional */
bytesused += PKIPackGeneralNameInternal(ctx, buf+bytesused, buflen-bytesused,
asnstruct->crlName, PKIID_GeneralName, erret );
if (bytesused > datasize || *erret != 0)
break;
}
/* field time of GetCRL */
if (asnstruct->time != NULL) { /* optional */
bytesused += PKIPackGeneralizedTimeInternal(ctx, buf+bytesused, buflen-bytesused,
asnstruct->time, PKIID_GeneralizedTime, erret );
if (bytesused > datasize || *erret != 0)
break;
}
/* field reason of GetCRL */
if (asnstruct->reason != NULL) { /* optional */
bytesused += PKIPackReasonFlagsInternal(ctx, buf+bytesused, buflen-bytesused,
asnstruct->reason, PKIID_ReasonFlags, erret );
if (bytesused > datasize || *erret != 0)
break;
}
} while(0);
if (bytesused < datasize && *erret == 0)
PKIERR(PKIErrPackUnderrun)
else if (bytesused > datasize && *erret == 0)
PKIERR(PKIErrPackOverrun)
return bytesused;
} /* PKIPackGetCRLInternal */
size_t PKIUnpkInPlaceGetCRL(
PKICONTEXT *ctx,
PKIGetCRL *asnstruct,
const unsigned char *buf,
size_t buflen,
unsigned char tag,
int *erret)
{
size_t bytesused = 0;
size_t datasize;
size_t localsize;
int indef = 0;
PKITRACE_PRINT_FN((tag|0x20), 0x30, "SEQUENCE", "GetCRL" );
if (erret == NULL) return 0; /* can't report errors */
*erret = 0;
if (ctx == NULL) {
PKIERR(PKIErrBadContext);
return 0;
}
if (asnstruct == NULL) {
PKIERR(PKIErrUnpackNoStructure);
return 0;
}
if (buf == NULL) {
PKIERR(PKIErrUnpackNoBlockPtr);
return 0;
}
if (buflen <= 0) return 0; /* no error -- no block */
if ( (*buf & 0xDF) != (tag & 0xDF) )
return 0; /* no error code, just no block */
if ( (*buf & 0x20) != 0x20) {
PKIERR(PKIErrUnpackInvalidEncoding);
return 0;
}
/* accept the tag byte */
bytesused++;
/* get the block length */
bytesused += PKIGetLength(buf+bytesused, &datasize);
if ((int)datasize == -1) {
localsize = buflen;
indef = 1;
}
else {
localsize = bytesused + datasize;
if (localsize > buflen) {
PKIERR(PKIErrUnpackOverrun);
return 0;
}
}
PKITRACE_INCR_LEVEL;
do {
/* field issuerName of GetCRL */
bytesused += PKIUnpkInPlaceName(ctx, &(asnstruct->issuerName), buf+bytesused,
localsize-bytesused, PKIID_Name, erret);
if (bytesused > localsize || *erret != 0)
break;
/* field crlName of GetCRL */
if (!indef && bytesused >= localsize) {
PKITRACE_DECR_LEVEL;
return bytesused;
}
if (indef && *(buf+bytesused) == 0x00 &&
*(buf+bytesused+1) == 0x00) {
PKITRACE_DECR_LEVEL;
bytesused += 2;
return bytesused;
}
if (asnstruct->crlName != NULL)
PKIFreeGeneralName(ctx, asnstruct->crlName);
bytesused += PKIUnpackGeneralNameInternal(ctx, &(asnstruct->crlName),
buf+bytesused, localsize-bytesused, PKIID_GeneralName, erret);
if (bytesused > localsize || *erret != 0)
break;
/* field time of GetCRL */
if (!indef && bytesused >= localsize) {
PKITRACE_DECR_LEVEL;
return bytesused;
}
if (indef && *(buf+bytesused) == 0x00 &&
*(buf+bytesused+1) == 0x00) {
PKITRACE_DECR_LEVEL;
bytesused += 2;
return bytesused;
}
if (asnstruct->time != NULL)
PKIFreeGeneralizedTime(ctx, asnstruct->time);
bytesused += PKIUnpackGeneralizedTimeInternal(ctx, &(asnstruct->time),
buf+bytesused, localsize-bytesused, PKIID_GeneralizedTime, erret);
if (bytesused > localsize || *erret != 0)
break;
/* field reason of GetCRL */
if (!indef && bytesused >= localsize) {
PKITRACE_DECR_LEVEL;
return bytesused;
}
if (indef && *(buf+bytesused) == 0x00 &&
*(buf+bytesused+1) == 0x00) {
PKITRACE_DECR_LEVEL;
bytesused += 2;
return bytesused;
}
if (asnstruct->reason != NULL)
PKIFreeReasonFlags(ctx, asnstruct->reason);
bytesused += PKIUnpackReasonFlagsInternal(ctx, &(asnstruct->reason),
buf+bytesused, localsize-bytesused, PKIID_ReasonFlags, erret);
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -