003 File Manager
Current Path:
/usr/src/crypto/heimdal/lib/asn1
usr
/
src
/
crypto
/
heimdal
/
lib
/
asn1
/
📁
..
📄
ChangeLog
(44.84 KB)
📄
Makefile.am
(7.72 KB)
📄
Makefile.in
(51.46 KB)
📄
asn1-common.h
(2.06 KB)
📄
asn1-template.h
(3.97 KB)
📄
asn1_err.et
(1.27 KB)
📄
asn1_gen.c
(4.8 KB)
📄
asn1_print.c
(9.23 KB)
📄
asn1_queue.h
(6.52 KB)
📄
asn1parse.c
(81.78 KB)
📄
asn1parse.h
(6.44 KB)
📄
asn1parse.y
(20.85 KB)
📄
canthandle.asn1
(793 B)
📄
check-common.c
(10.03 KB)
📄
check-common.h
(2.87 KB)
📄
check-der.c
(26.7 KB)
📄
check-gen.c
(35.1 KB)
📄
check-timegm.c
(2.28 KB)
📄
cms.asn1
(4.16 KB)
📄
cms.opt
(55 B)
📄
der-private.h
(1.29 KB)
📄
der-protos.h
(10.5 KB)
📄
der.c
(3.69 KB)
📄
der.h
(3.08 KB)
📄
der_cmp.c
(3.48 KB)
📄
der_copy.c
(4.75 KB)
📄
der_format.c
(3.93 KB)
📄
der_free.c
(3.01 KB)
📄
der_get.c
(14.56 KB)
📄
der_length.c
(4.67 KB)
📄
der_locl.h
(2.15 KB)
📄
der_put.c
(10.02 KB)
📄
digest.asn1
(4.86 KB)
📄
extra.c
(3.69 KB)
📄
gen.c
(25.75 KB)
📄
gen_copy.c
(6.68 KB)
📄
gen_decode.c
(17.89 KB)
📄
gen_encode.c
(13.23 KB)
📄
gen_free.c
(5.01 KB)
📄
gen_glue.c
(4.13 KB)
📄
gen_length.c
(7.54 KB)
📄
gen_locl.h
(3.26 KB)
📄
gen_seq.c
(3.89 KB)
📄
gen_template.c
(22.2 KB)
📄
hash.c
(4.57 KB)
📄
hash.h
(2.92 KB)
📄
heim_asn1.h
(2.33 KB)
📄
krb5.asn1
(20.53 KB)
📄
krb5.opt
(147 B)
📄
kx509.asn1
(662 B)
📄
lex.c
(73.99 KB)
📄
lex.h
(1.76 KB)
📄
lex.l
(7.74 KB)
📄
main.c
(4.78 KB)
📄
pkcs12.asn1
(2.29 KB)
📄
pkcs8.asn1
(629 B)
📄
pkcs9.asn1
(809 B)
📄
pkinit.asn1
(5.47 KB)
📄
rfc2459.asn1
(16.79 KB)
📄
setchgpw2.asn1
(3.82 KB)
📄
symbol.c
(2.68 KB)
📄
symbol.h
(3.57 KB)
📄
template.c
(24.54 KB)
📄
test.asn1
(3.1 KB)
📄
test.gen
(290 B)
📄
timegm.c
(3.83 KB)
📄
version-script.map
(135 B)
Editing: pkinit.asn1
-- $Id$ -- PKINIT DEFINITIONS ::= BEGIN IMPORTS EncryptionKey, PrincipalName, Realm, KerberosTime, Checksum, Ticket FROM krb5 IssuerAndSerialNumber, ContentInfo FROM cms SubjectPublicKeyInfo, AlgorithmIdentifier FROM rfc2459 heim_any FROM heim; id-pkinit OBJECT IDENTIFIER ::= { iso (1) org (3) dod (6) internet (1) security (5) kerberosv5 (2) pkinit (3) } id-pkauthdata OBJECT IDENTIFIER ::= { id-pkinit 1 } id-pkdhkeydata OBJECT IDENTIFIER ::= { id-pkinit 2 } id-pkrkeydata OBJECT IDENTIFIER ::= { id-pkinit 3 } id-pkekuoid OBJECT IDENTIFIER ::= { id-pkinit 4 } id-pkkdcekuoid OBJECT IDENTIFIER ::= { id-pkinit 5 } id-pkinit-kdf OBJECT IDENTIFIER ::= { id-pkinit 6 } id-pkinit-kdf-ah-sha1 OBJECT IDENTIFIER ::= { id-pkinit-kdf 1 } id-pkinit-kdf-ah-sha256 OBJECT IDENTIFIER ::= { id-pkinit-kdf 2 } id-pkinit-kdf-ah-sha512 OBJECT IDENTIFIER ::= { id-pkinit-kdf 3 } id-pkinit-san OBJECT IDENTIFIER ::= { iso(1) org(3) dod(6) internet(1) security(5) kerberosv5(2) x509-sanan(2) } id-pkinit-ms-eku OBJECT IDENTIFIER ::= { iso(1) org(3) dod(6) internet(1) private(4) enterprise(1) microsoft(311) 20 2 2 } id-pkinit-ms-san OBJECT IDENTIFIER ::= { iso(1) org(3) dod(6) internet(1) private(4) enterprise(1) microsoft(311) 20 2 3 } MS-UPN-SAN ::= UTF8String pa-pk-as-req INTEGER ::= 16 pa-pk-as-rep INTEGER ::= 17 td-trusted-certifiers INTEGER ::= 104 td-invalid-certificates INTEGER ::= 105 td-dh-parameters INTEGER ::= 109 DHNonce ::= OCTET STRING KDFAlgorithmId ::= SEQUENCE { kdf-id [0] OBJECT IDENTIFIER, ... } TrustedCA ::= SEQUENCE { caName [0] IMPLICIT OCTET STRING, certificateSerialNumber [1] INTEGER OPTIONAL, subjectKeyIdentifier [2] OCTET STRING OPTIONAL, ... } ExternalPrincipalIdentifier ::= SEQUENCE { subjectName [0] IMPLICIT OCTET STRING OPTIONAL, issuerAndSerialNumber [1] IMPLICIT OCTET STRING OPTIONAL, subjectKeyIdentifier [2] IMPLICIT OCTET STRING OPTIONAL, ... } ExternalPrincipalIdentifiers ::= SEQUENCE OF ExternalPrincipalIdentifier PA-PK-AS-REQ ::= SEQUENCE { signedAuthPack [0] IMPLICIT OCTET STRING, trustedCertifiers [1] ExternalPrincipalIdentifiers OPTIONAL, kdcPkId [2] IMPLICIT OCTET STRING OPTIONAL, ... } PKAuthenticator ::= SEQUENCE { cusec [0] INTEGER -- (0..999999) --, ctime [1] KerberosTime, nonce [2] INTEGER (0..4294967295), paChecksum [3] OCTET STRING OPTIONAL, ... } AuthPack ::= SEQUENCE { pkAuthenticator [0] PKAuthenticator, clientPublicValue [1] SubjectPublicKeyInfo OPTIONAL, supportedCMSTypes [2] SEQUENCE OF AlgorithmIdentifier OPTIONAL, clientDHNonce [3] DHNonce OPTIONAL, ..., supportedKDFs [4] SEQUENCE OF KDFAlgorithmId OPTIONAL, ... } TD-TRUSTED-CERTIFIERS ::= ExternalPrincipalIdentifiers TD-INVALID-CERTIFICATES ::= ExternalPrincipalIdentifiers KRB5PrincipalName ::= SEQUENCE { realm [0] Realm, principalName [1] PrincipalName } AD-INITIAL-VERIFIED-CAS ::= SEQUENCE OF ExternalPrincipalIdentifier DHRepInfo ::= SEQUENCE { dhSignedData [0] IMPLICIT OCTET STRING, serverDHNonce [1] DHNonce OPTIONAL, ..., kdf [2] KDFAlgorithmId OPTIONAL, ... } PA-PK-AS-REP ::= CHOICE { dhInfo [0] DHRepInfo, encKeyPack [1] IMPLICIT OCTET STRING, ... } KDCDHKeyInfo ::= SEQUENCE { subjectPublicKey [0] BIT STRING, nonce [1] INTEGER (0..4294967295), dhKeyExpiration [2] KerberosTime OPTIONAL, ... } ReplyKeyPack ::= SEQUENCE { replyKey [0] EncryptionKey, asChecksum [1] Checksum, ... } TD-DH-PARAMETERS ::= SEQUENCE OF AlgorithmIdentifier -- Windows compat glue -- PKAuthenticator-Win2k ::= SEQUENCE { kdcName [0] PrincipalName, kdcRealm [1] Realm, cusec [2] INTEGER (0..4294967295), ctime [3] KerberosTime, nonce [4] INTEGER (-2147483648..2147483647) } AuthPack-Win2k ::= SEQUENCE { pkAuthenticator [0] PKAuthenticator-Win2k, clientPublicValue [1] SubjectPublicKeyInfo OPTIONAL } TrustedCA-Win2k ::= CHOICE { caName [1] heim_any, issuerAndSerial [2] IssuerAndSerialNumber } PA-PK-AS-REQ-Win2k ::= SEQUENCE { signed-auth-pack [0] IMPLICIT OCTET STRING, trusted-certifiers [2] SEQUENCE OF TrustedCA-Win2k OPTIONAL, kdc-cert [3] IMPLICIT OCTET STRING OPTIONAL, encryption-cert [4] IMPLICIT OCTET STRING OPTIONAL } PA-PK-AS-REP-Win2k ::= CHOICE { dhSignedData [0] IMPLICIT OCTET STRING, encKeyPack [1] IMPLICIT OCTET STRING } KDCDHKeyInfo-Win2k ::= SEQUENCE { nonce [0] INTEGER (-2147483648..2147483647), subjectPublicKey [2] BIT STRING } ReplyKeyPack-Win2k ::= SEQUENCE { replyKey [0] EncryptionKey, nonce [1] INTEGER (-2147483648..2147483647), ... } PA-PK-AS-REP-BTMM ::= SEQUENCE { dhSignedData [0] heim_any OPTIONAL, encKeyPack [1] heim_any OPTIONAL } PkinitSP80056AOtherInfo ::= SEQUENCE { algorithmID AlgorithmIdentifier, partyUInfo [0] OCTET STRING, partyVInfo [1] OCTET STRING, suppPubInfo [2] OCTET STRING OPTIONAL, suppPrivInfo [3] OCTET STRING OPTIONAL } PkinitSuppPubInfo ::= SEQUENCE { enctype [0] INTEGER (-2147483648..2147483647), as-REQ [1] OCTET STRING, pk-as-rep [2] OCTET STRING, ticket [3] Ticket, ... } END
Upload File
Create Folder