📄 pkcs15.h
字号:
/****************************************************************************
* *
* PKCS #15 Definitions Header File *
* Copyright Peter Gutmann 1996-2006 *
* *
****************************************************************************/
#ifndef _PKCS15_DEFINED
#define _PKCS15_DEFINED
/* The format used to protect the private key components is a standard
cryptlib envelope, however for various reasons the required enveloping
functionality (which in practice is just minimal code to process a
PasswordRecipientInfo at the start of the data) is duplicated here
because:
1. It's somewhat inelegant to use the heavyweight enveloping routines to
wrap up 100 bytes of data.
2. The enveloping code is enormous and complex, especially when extra
sections like zlib and PGP and S/MIME support are factored in. This
makes it difficult to compile a stripped-down version of cryptlib,
since private key storage will require all of the enveloping code to
be included.
3. Since the enveloping code is general-purpose, it doesn't allow very
precise control over the data being processed. Specifically, it's
necessary to write the private key components to a buffer in plaintext
form, which isn't permitted by the cryptlib kernel.
For these reasons the PKCS #15 modules include the code to process minimal
(password-encrypted data) envelopes */
/****************************************************************************
* *
* PKCS #15 Constants *
* *
****************************************************************************/
/* Usually a PKCS #15 personality consists of a collection of related PKCS
#15 objects (typically a public and private key and a certificate), but
sometimes we have personalities that consist only of a certificate and
little other information (for example a trusted CA root certificate,
which contains no user-supplied information such as a label). The
following types of personality are handled for PKCS #15 files */
typedef enum {
PKCS15_SUBTYPE_NONE, /* Non-personality */
PKCS15_SUBTYPE_NORMAL, /* Standard personality, keys+optional cert */
PKCS15_SUBTYPE_CERT, /* Standalone certificate */
PKCS15_SUBTYPE_SECRETKEY, /* Secret key */
PKCS15_SUBTYPE_DATA, /* Pre-encoded cryptlib-specific data */
PKCS15_SUBTYPE_LAST
} PKCS15_SUBTYPE;
/* The types of object that we can find in a PKCS #15 file */
typedef enum { PKCS15_OBJECT_NONE, PKCS15_OBJECT_PUBKEY,
PKCS15_OBJECT_PRIVKEY, PKCS15_OBJECT_CERT,
PKCS15_OBJECT_SECRETKEY, PKCS15_OBJECT_DATA,
PKCS15_OBJECT_LAST } PKCS15_OBJECT_TYPE;
/* The types of key identifiers that we can find attached to an object */
enum { PKCS15_KEYID_NONE, PKCS15_KEYID_ISSUERANDSERIALNUMBER,
PKCS15_KEYID_SUBJECTKEYIDENTIFIER, PKCS15_KEYID_ISSUERANDSERIALNUMBERHASH,
PKCS15_KEYID_SUBJECTKEYHASH, PKCS15_KEYID_ISSUERKEYHASH,
PKCS15_KEYID_ISSUERNAMEHASH, PKCS15_KEYID_SUBJECTNAMEHASH,
PKCS15_KEYID_PGP2, PKCS15_KEYID_OPENPGP, PKCS15_KEYID_LAST };
/* PKCS #15 key usage flags, a complex mixture of PKCS #11 and some bits of
X.509 */
#define PKCS15_USAGE_ENCRYPT 0x0001
#define PKCS15_USAGE_DECRYPT 0x0002
#define PKCS15_USAGE_SIGN 0x0004
#define PKCS15_USAGE_SIGNRECOVER 0x0008
#define PKCS15_USAGE_WRAP 0x0010
#define PKCS15_USAGE_UNWRAP 0x0020
#define PKCS15_USAGE_VERIFY 0x0040
#define PKCS15_USAGE_VERIFYRECOVER 0x0080
#define PKCS15_USAGE_DERIVE 0x0100
#define PKCS15_USAGE_NONREPUDIATION 0x0200
/* Symbolic values for range checking of the usage flags */
#define PKSC15_USAGE_FLAG_NONE 0x0000
#define PKCS15_USAGE_FLAG_MAX 0x03FF
/* PKCS #15 flags that can't be set for public keys. We use this as a mask
to derive public-key flags from private key ones */
#define PUBKEY_USAGE_MASK ~( PKCS15_USAGE_DECRYPT | PKCS15_USAGE_SIGN | \
PKCS15_USAGE_SIGNRECOVER | PKCS15_USAGE_UNWRAP )
/* PKCS #15 usage types for encryption and signature keys. We use these when
looking specifically for signing or encryption keys */
#define ENCR_USAGE_MASK ( PKCS15_USAGE_ENCRYPT | PKCS15_USAGE_DECRYPT | \
PKCS15_USAGE_WRAP | PKCS15_USAGE_UNWRAP )
#define SIGN_USAGE_MASK ( PKCS15_USAGE_SIGN | PKCS15_USAGE_SIGNRECOVER | \
PKCS15_USAGE_VERIFY | PKCS15_USAGE_VERIFYRECOVER | \
PKCS15_USAGE_NONREPUDIATION )
/* The access flags for various types of key objects. For a public key we
set 'extractable', for a private key we set 'sensitive',
'alwaysSensitive', and 'neverExtractable' */
#define KEYATTR_ACCESS_PUBLIC 0x02 /* 00010b */
#define KEYATTR_ACCESS_PRIVATE 0x0D /* 01101b */
/* When adding a public key and/or certificate to a PKCS #15 collection we
have to be able to cleanly handle the addition of arbitrary collections of
potentially overlapping objects. Since a public key is a subset of the
data in a certificate, if we're adding a certificate + public key pair
the certificate data overrides the public key, which isn't added at all.
This leads to some rather convoluted logic for deciding what needs
updating and under which conditions. The actions taken are:
key only: if present
return( CRYPT_ERROR_DUPLICATE )
else
add key;
cert only: if present
return( CRYPT_ERROR_DUPLICATE );
elif( matching key present )
add, delete key data;
elif( trusted certificate )
add as trusted certificate;
else
error;
key+cert: if key present and certificate present
return( CRYPT_ERROR_DUPLICATE );
delete key;
if certificate present -> don't add certificate;
The following values specify the action to be taken when adding a
certificate */
typedef enum {
CERTADD_NONE, /* No certificate add action */
CERTADD_UPDATE_EXISTING,/* Update existing key info with a certificate */
CERTADD_NORMAL, /* Add a certificate for which no key info present */
CERTADD_STANDALONE_CERT,/* Add a standalone certificate not assoc'd with a key */
CERTADD_LAST /* Last valid certificate add action */
} CERTADD_TYPE;
/* Since PKCS #15 uses more key ID types than are used by the rest of
cryptlib, we extend the standard range with PKCS15-only types */
#define CRYPT_KEYIDEX_ID CRYPT_KEYID_LAST
#define CRYPT_KEYIDEX_SUBJECTNAMEID ( CRYPT_KEYID_LAST + 1 )
/* The minimum size of an object in a keyset, used for sanity-checking when
reading a keyset */
#define MIN_OBJECT_SIZE 16
/* When writing attributes it's useful to have a fixed-size buffer rather
than having to mess around with all sorts of variable-length structures,
the following value defines the maximum size of the attribute data that
we can write (that is, the I/O stream is opened with this size and
generates a CRYPT_ERROR_OVERFLOW if we go beyond this). The maximum-
length buffer contents are two CRYPT_MAX_TEXTSIZE strings and a few odd
bits and pieces so this is plenty */
#define KEYATTR_BUFFER_SIZE 256
/****************************************************************************
* *
* PKCS #15 Types and Structures *
* *
****************************************************************************/
/* The following structure contains the the information for one personality,
which covers one or more of a private key, public key, and certificate */
typedef struct {
/* General information on the personality: The subtype, a local unique
identifier which is easier to manage than the iD (this is used when
enumerating PKCS #15 items in a keyset, the last-read-item entry is
set to the index value), the PKCS #15 object label, and the PKCS #15
object ID and key ID (which is usually the same as the object ID) */
PKCS15_SUBTYPE type; /* Personality subtype */
int index; /* Unique value for this personality */
BUFFER( CRYPT_MAX_TEXTSIZE, labelLength ) \
char label[ CRYPT_MAX_TEXTSIZE + 8 ];/* PKCS #15 object label */
int labelLength;
BUFFER( CRYPT_MAX_HASHSIZE, iDlength ) \
BYTE iD[ CRYPT_MAX_HASHSIZE + 8 ];
BUFFER( CRYPT_MAX_HASHSIZE, keyIDlength ) \
BYTE keyID[ CRYPT_MAX_HASHSIZE + 8 ];
int iDlength, keyIDlength; /* PKCS #15 object ID and key ID */
/* Certificate-related ID information: Hash of the issuer name, subject
name, and issuerAndSerialNumber, and PGP key IDs */
BUFFER( KEYID_SIZE, iAndSIDlength ) \
BYTE iAndSID[ KEYID_SIZE + 8 ];
BUFFER( KEYID_SIZE, subjectNameIDlength ) \
BYTE subjectNameID[ KEYID_SIZE + 8 ];
BUFFER( KEYID_SIZE, issuerNameIDlength ) \
BYTE issuerNameID[ KEYID_SIZE + 8 ];
BUFFER( KEYID_SIZE, pgp2KeyIDlength ) \
BYTE pgp2KeyID[ PGP_KEYID_SIZE + 8 ];
BUFFER( KEYID_SIZE, openPGPKeyIDlength ) \
BYTE openPGPKeyID[ PGP_KEYID_SIZE + 8 ];
int iAndSIDlength, subjectNameIDlength, issuerNameIDlength;
int pgp2KeyIDlength, openPGPKeyIDlength;
/* Key/certificate object data */
BUFFER_OPT_FIXED( pubKeyDataSize ) \
void *pubKeyData;
BUFFER_OPT_FIXED( privKeyDataSize ) \
void *privKeyData;
BUFFER_OPT_FIXED( certDataSize ) \
void *certData; /* Encoded object data */
int pubKeyDataSize, privKeyDataSize, certDataSize;
int pubKeyOffset, privKeyOffset, certOffset;
/* Offset of payload in data */
int pubKeyUsage, privKeyUsage; /* Permitted usage for the key */
int trustedUsage; /* Usage which key is trusted for */
BOOLEAN implicitTrust; /* Whether certificate is implicitly trusted */
time_t validFrom, validTo; /* Key/certificate validity information */
/* Data object data */
CRYPT_ATTRIBUTE_TYPE dataType; /* Type of the encoded object data */
BUFFER_OPT_FIXED( dataDataSize ) \
void *dataData; /* Encoded object data */
int dataDataSize, dataOffset;
} PKCS15_INFO;
/****************************************************************************
* *
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -