⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 certattr.h

📁 老外写的加密库cryptlib(版本3.1)
💻 H
字号:
/****************************************************************************
*																			*
*			Certificate Attribute Handling Structures and Prototypes 		*
*						Copyright Peter Gutmann 1997-2003					*
*																			*
****************************************************************************/

#ifndef _CERTATTR_DEFINED

#define _CERTATTR_DEFINED

/* The attribute type information.  This is used to both check the validity
   of encoded attribute data and to describe the structure of an attribute
   when encoding it.  The following flags are applied for each entry.  The 
   first set contains general-purpose flags that apply to the field, the 
   second set the sequence control flags, and the last set general-purpose 
   flags.
   
   The FL_CRITICAL and FL_VALID_xxx flags are only set for an attribute as a
   whole.
   
   The FL_SEQEND flags are only used for encoding, for decoding the decoder 
   maintains a parse state stack driver by the encoded data (actually that's 
   not quite correct, when skipping to the end of some SEQUENCEs containing 
   type-and-value pairs we also use the flags to locate the end of the 
   SEQUENCE encoding/start of the next type-and-value entry).  The rule for 
   the FL_SEQEND values is that the last one must return the nesting depth 
   to 1, with the outer SEQUENCE being implicit.  In other words a SEQUENCE 
   OF SEQUENCE {} would have a FL_SEQEND value of 1; a SEQUENCE OF
   GeneralName would have no FL_SEQEND value 
   
   Some fields are of the type:

	SEQUENCE {
		identifier	OBJECT IDENTIFIER
		data		ANY DEFINED BY identifier
		}

   For these types the field named with CRYPT_CERTINFO_xxx is the data field,
   and the encapsulating sequence is flagged with FL_IDENTIFIER to indicate
   that it should only be encoded if the data field is present.  If the data
   field isn't present, the entire SEQUENCE is skipped, so the FL_IDENTIFIER
   is a kind of linked FL_OPTIONAL in that the field is omitted if the data
   field is omitted.

   Fields of the type SET OF x or SEQUENCE OF x, where x is not a fixed
   value (for example DNs) are flagged with FL_SETOF in the encapsulating 
   SEQUENCE to indicate that one or more inner fields may be present.  The 
   FL_SETOF field is bookmarked, if all the sequence data isn't read the 
   first time through the read is restarted from the bookmark until the 
   SEQUENCE data is exhausted.

   If a field is part of a variable-type SET OF x/SEQUENCE OF x then if it's
   a named field it must have the FL_MULTIVALUED flag set to indicate that 
   more than one of these can exist at the same time.  If this flag isn't 
   set, cryptlib will detect that a field of that name already exists and 
   refuse to allow a second instance to be added.

   Some fields aren't used for encoding user-supplied data but must be read
   and written when processing an attribute (for example version numbers).
   These are flagged with FL_NONENCODING which means they're read and written
   but not associated with any user data.
   
   Some attributes are regarded as sensitive in some manner and therefore 
   aren't copied from source to destination (e.g. from a cert request into
   a cert) when the other attributes are copied, these are marked with
   FL_NOCOPY */

#define FL_OPTIONAL			0x000001	/* Field is optional */
#define FL_DEFAULT			0x000002	/* Field has default value */
#define FL_EXPLICIT			0x000004	/* Field is explicitly tagged */
#define FL_IDENTIFIER		0x000008	/* Following field contains selection OID */
#define FL_SETOF			0x000010	/* Start of SET/SEQ OF values */
#define FL_NONENCODING		0x000020	/* Field is a non-encoding value */
#define FL_MULTIVALUED		0x000040	/* Field can occur multiple times */
#define FL_NOCOPY			0x000080	/* Attr.isn't copied when attrs.copied*/

#define FL_SEQEND			0x000100	/* End of constructed object */
#define FL_SEQEND_1			0x000100	/*  End of cons.obj, one nesting lvl.*/
#define FL_SEQEND_2			0x000200	/*  End of cons.obj, two nesting lvl.*/
#define FL_SEQEND_3			0x000300	/*  End of cons.obj, three nesting lvls.*/
#define FL_SEQEND_MASK		0x000300	/* Mask for sequence control value */

#define FL_LEVEL_OBLIVIOUS	0x000000	/* Process at oblivious compliance level */
#define FL_LEVEL_REDUCED	0x001000	/* Process at reduced compliance level */
#define FL_LEVEL_STANDARD	0x002000	/* Process at standard compliance level */
#define FL_LEVEL_PKIX_PARTIAL 0x003000	/* Process at partial PKIX compliance level */
#define FL_LEVEL_PKIX_FULL	0x004000	/* Process at full PKIX compliance level */
#define FL_LEVEL_MASK		0x007000	/* Mask for compliance level value */

#define FL_VALID_CERT		0x010000	/* Valid in a cert */
#define FL_VALID_ATTRCERT	0x020000	/* Valid in an attrib.cert */
#define FL_VALID_CRL		0x040000	/* Valid in a CRL */
#define FL_VALID_CERTREQ	0x080000	/* Valid in a cert.request */
#define FL_VALID_REVREQ		0x100000	/* Valid in a rev.request */
#define FL_VALID_OCSPREQ	0x200000	/* Valid in an OCSP request */
#define FL_VALID_OCSPRESP	0x200000	/* Valid in an OCSP response */

#define FL_CRITICAL			0x400000	/* Extension is marked critical */
#define FL_MORE				0x800000	/* Further entries follow */

/* CRLs actually contain two sets of extensions, one for the entire CRL
   (crlExtensions) and the other for each entry in the CRL
   (crlEntryExtension).  Sorting out whether we're adding a CRL extension or 
   per-entry extension is handled by the higher-level code, which references 
   the CRL attribute list or per-entry attribute list as appropriate.

   If a constructed field is nested (for example a SEQUENCE OF SEQUENCE), the
   FL_SEQEND may need to denote multiple levels of unnesting.  This is done
   by using FL_SEQEND_n, the following macro can be used to extract the
   actual level of nesting */

#define decodeNestingLevel( value ) \
		( ( ( int ) ( value ) >> 8 ) & ( FL_SEQEND_MASK >> 8 ) )

/* In order to be able to process broken certs, we allow for processing them 
   at various levels of standards compliance.  If the current processing 
   level is below that required for the extension, we skip it and treat it as
   a blob extension */

#define decodeComplianceLevel( value ) \
		( ( ( int ) ( value ) >> 12 ) & ( FL_LEVEL_MASK >> 12 ) )

/* Some fields have an intrinsic value but no explicitly set value (that is,
   their presence communicates the information they are intended to convey,
   but the fields themselves contain no actual data).  This applies for
   fields that contain OIDs that denote certain things (for example cert.
   policies or key usage).  To denote these identifier fields, the field type
   is set to FIELDTYPE_IDENTIFIER (note that we start at -2 rather than -1,
   which is the CRYPT_ERROR value).  When a field of this type is
   encountered, no data value is recorded, but the OID for the field is
   written to the cert when the field is encoded */

#define FIELDTYPE_IDENTIFIER	-2

/* Some fields have no set value (these arise from ANY DEFINED BY
   definitions) or an opaque value (typically fixed parameters for type-and-
   value pairs).  To denote these fields, the field type is set to
   FIELDTYPE_BLOB */

#define FIELDTYPE_BLOB			-3

/* When a field contains a CHOICE, it can contain any one of the CHOICE
   fields, as opposed to a FL_SETOF which can contain any of the fields that
   follow it.  Currently the only CHOICE fields contain OIDs as choices, the
   CHOICE fieldtype indicates that the value is stored in the field itself
   but the encoding is handled via a separate encoding table pointed to by
   extraData that maps the value to an OID */

#define FIELDTYPE_CHOICE		-4

/* Some fields are composite fields that contain complete certificate data
   structures.  To denote these fields, the field type is a special code
   that specifies the type, and the value member contains the handle or the
   data member contains a pointer to the composite object */

#define FIELDTYPE_DN			-5

/* As an extension of the above, some fields are complex enough to require
   complete alternative encoding tables.  The most obvious one is
   GeneralName, but this is also used for some CHOICE types where the value
   selects a particular OID or entry from an alternative encoding table.  In
   this case the extraData member is a pointer to the alternative encoding
   table */

#define FIELDTYPE_SUBTYPED		-6

/* Usually the field ID for the first field in an entry (the one containing
   the OID) is the overall attribute ID, however there are one or two
   exceptions in which the attribute ID and field ID are the same but are
   given in separate fields (examples of this are the altNames, which have
   a single field ID SUBJECT/ISSUERALTNAME that applies to the attribute as
   a whole, but also to the one and only field in it.

   If this happens, the field ID for the attribute as a whole is given the
   value FIELDID_FOLLOWS to indicate that the actual ID is present at a later
   point (the first field that isn't a FIELDID_FOLLOWS code is treated as
   the attribute ID) */

#define FIELDID_FOLLOWS			-7

typedef struct {
	/* Information on the overall attribute.  These fields are only set
	   for overall attribute definitions */
	const BYTE FAR_BSS *oid;		/* OID for this attribute */

	/* Information on this particular field in the attribute.  The fieldType
	   is the field as defined (e.g. SEQUENCE, INTEGER), the 
	   fieldEncodingType is the field as encoded: 0 if it's the same as the 
	   field type, or the tag if it's a tagged field.  The default tagging 
	   is to use implicit tags (e.g. [ 0 ] IMPLICIT SEQUENCE) with a field of 
	   type fieldType and encoding of type fieldEncodedType.  If FL_EXPLICIT 
	   is set, it's an explicitly tagged field and both fields are used for 
	   the encoding */
	const CRYPT_ATTRIBUTE_TYPE fieldID;	/* Magic ID for this field */
#ifndef NDEBUG
	const char *description;		/* Text description */
#endif /* NDEBUG */
	const int fieldType;			/* ASN.1 tag/type for this field */
	const int fieldEncodedType;		/* ASN.1 tag for field as encoded */

	/* General status information */
	const long flags;				/* Status and information flags */

	/* Information to allow validity checking for this field */
	const int lowRange;				/* Min/max allowed if numeric/boolean */
	const int highRange;			/* Min/max length if string */
	const long defaultValue;		/* Default value if FL_DEFAULT set */

	/* Extra data needed to process this field, either a pointer to an
	   alternative encoding table or a pointer to the validation function to
	   allow extended validity checking */
	const void *extraData;
	} ATTRIBUTE_INFO;

/* When using a debugger that isn't capable of displaying the symbolic name
   for an enumerated type we allocate a text string describing the field 
   which is being processed, this makes it easier to track down the point in
   a certificate where cryptlib finds a problem */

#ifndef NDEBUG
  #define MKDESC( text )		text,
#else
  #define MKDESC( text )
#endif /* NDEBUG */

/* The validation function used to perform additional validation on fields */

typedef int ( *VALIDATION_FUNCTION )( const ATTRIBUTE_LIST *attributeListPtr );

/* Look up an ATTRIBUTE_INFO entry based on an OID */

const ATTRIBUTE_INFO *oidToAttribute( const ATTRIBUTE_TYPE attributeType,
									  const BYTE *oid );

/* Select the appropriate attribute info table for encoding/type checking */

const ATTRIBUTE_INFO *selectAttributeInfo( const ATTRIBUTE_TYPE attributeType );

/* Write an attribute field */

int writeAttributeField( STREAM *stream, ATTRIBUTE_LIST *attributeListPtr );

#endif /* _CERTATTR_DEFINED */

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -