003 File Manager
Current Path:
/usr/src/crypto/heimdal/lib/hx509
usr
/
src
/
crypto
/
heimdal
/
lib
/
hx509
/
π
..
π
ChangeLog
(71.11 KB)
π
Makefile.am
(10.85 KB)
π
Makefile.in
(109.81 KB)
π
ca.c
(38.68 KB)
π
cert.c
(83.12 KB)
π
char_map.h
(2.29 KB)
π
cms.c
(41.02 KB)
π
collector.c
(7.76 KB)
π
crmf.asn1
(2.72 KB)
π
crypto.c
(76.34 KB)
π
doxygen.c
(3.36 KB)
π
env.c
(5.5 KB)
π
error.c
(5.45 KB)
π
file.c
(5.96 KB)
π
hx509-private.h
(9.39 KB)
π
hx509-protos.h
(22.53 KB)
π
hx509.h
(5.88 KB)
π
hx509_err.et
(4.78 KB)
π
hx_locl.h
(6.42 KB)
π
hxtool-commands.in
(15.32 KB)
π
hxtool.c
(52.7 KB)
π
keyset.c
(18.85 KB)
π
ks_dir.c
(4.92 KB)
π
ks_file.c
(16.03 KB)
π
ks_keychain.c
(12.8 KB)
π
ks_mem.c
(5.23 KB)
π
ks_null.c
(2.6 KB)
π
ks_p11.c
(28.46 KB)
π
ks_p12.c
(16.46 KB)
π
lock.c
(5.55 KB)
π
name.c
(24.15 KB)
π
ocsp.asn1
(4.04 KB)
π
ocsp.opt
(68 B)
π
peer.c
(5.59 KB)
π
pkcs10.asn1
(521 B)
π
pkcs10.opt
(43 B)
π
print.c
(26.23 KB)
π
quote.py
(3.19 KB)
π
ref
π
req.c
(7.65 KB)
π
revoke.c
(37.22 KB)
π
sel-gram.y
(3.53 KB)
π
sel-lex.l
(3.29 KB)
π
sel.c
(5.72 KB)
π
sel.h
(2.45 KB)
π
softp11.c
(43.25 KB)
π
test_ca.in
(13.49 KB)
π
test_cert.in
(3.02 KB)
π
test_chain.in
(8.63 KB)
π
test_cms.in
(16.23 KB)
π
test_crypto.in
(6.46 KB)
π
test_java_pkcs11.in
(2.23 KB)
π
test_name.c
(17.75 KB)
π
test_nist.in
(3.7 KB)
π
test_nist2.in
(3.85 KB)
π
test_nist_cert.in
(2.3 KB)
π
test_nist_pkcs12.in
(2.41 KB)
π
test_pkcs11.in
(2.1 KB)
π
test_query.in
(6.69 KB)
π
test_req.in
(2.26 KB)
π
test_soft_pkcs11.c
(6.27 KB)
π
test_windows.in
(3.03 KB)
π
tst-crypto-available1
(263 B)
π
tst-crypto-available2
(102 B)
π
tst-crypto-available3
(122 B)
π
tst-crypto-select
(22 B)
π
tst-crypto-select1
(23 B)
π
tst-crypto-select2
(22 B)
π
tst-crypto-select3
(21 B)
π
tst-crypto-select4
(21 B)
π
tst-crypto-select5
(22 B)
π
tst-crypto-select6
(21 B)
π
tst-crypto-select7
(24 B)
π
version-script.map
(6.21 KB)
Editing: req.c
/* * Copyright (c) 2006 Kungliga Tekniska HΓΆgskolan * (Royal Institute of Technology, Stockholm, Sweden). * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * * 3. Neither the name of the Institute nor the names of its contributors * may be used to endorse or promote products derived from this software * without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. */ #include "hx_locl.h" #include <pkcs10_asn1.h> struct hx509_request_data { hx509_name name; SubjectPublicKeyInfo key; ExtKeyUsage eku; GeneralNames san; }; /* * */ int hx509_request_init(hx509_context context, hx509_request *req) { *req = calloc(1, sizeof(**req)); if (*req == NULL) return ENOMEM; return 0; } void hx509_request_free(hx509_request *req) { if ((*req)->name) hx509_name_free(&(*req)->name); free_SubjectPublicKeyInfo(&(*req)->key); free_ExtKeyUsage(&(*req)->eku); free_GeneralNames(&(*req)->san); memset(*req, 0, sizeof(**req)); free(*req); *req = NULL; } int hx509_request_set_name(hx509_context context, hx509_request req, hx509_name name) { if (req->name) hx509_name_free(&req->name); if (name) { int ret = hx509_name_copy(context, name, &req->name); if (ret) return ret; } return 0; } int hx509_request_get_name(hx509_context context, hx509_request req, hx509_name *name) { if (req->name == NULL) { hx509_set_error_string(context, 0, EINVAL, "Request have no name"); return EINVAL; } return hx509_name_copy(context, req->name, name); } int hx509_request_set_SubjectPublicKeyInfo(hx509_context context, hx509_request req, const SubjectPublicKeyInfo *key) { free_SubjectPublicKeyInfo(&req->key); return copy_SubjectPublicKeyInfo(key, &req->key); } int hx509_request_get_SubjectPublicKeyInfo(hx509_context context, hx509_request req, SubjectPublicKeyInfo *key) { return copy_SubjectPublicKeyInfo(&req->key, key); } int _hx509_request_add_eku(hx509_context context, hx509_request req, const heim_oid *oid) { void *val; int ret; val = realloc(req->eku.val, sizeof(req->eku.val[0]) * (req->eku.len + 1)); if (val == NULL) return ENOMEM; req->eku.val = val; ret = der_copy_oid(oid, &req->eku.val[req->eku.len]); if (ret) return ret; req->eku.len += 1; return 0; } int _hx509_request_add_dns_name(hx509_context context, hx509_request req, const char *hostname) { GeneralName name; memset(&name, 0, sizeof(name)); name.element = choice_GeneralName_dNSName; name.u.dNSName.data = rk_UNCONST(hostname); name.u.dNSName.length = strlen(hostname); return add_GeneralNames(&req->san, &name); } int _hx509_request_add_email(hx509_context context, hx509_request req, const char *email) { GeneralName name; memset(&name, 0, sizeof(name)); name.element = choice_GeneralName_rfc822Name; name.u.dNSName.data = rk_UNCONST(email); name.u.dNSName.length = strlen(email); return add_GeneralNames(&req->san, &name); } int _hx509_request_to_pkcs10(hx509_context context, const hx509_request req, const hx509_private_key signer, heim_octet_string *request) { CertificationRequest r; heim_octet_string data, os; int ret; size_t size; if (req->name == NULL) { hx509_set_error_string(context, 0, EINVAL, "PKCS10 needs to have a subject"); return EINVAL; } memset(&r, 0, sizeof(r)); memset(request, 0, sizeof(*request)); r.certificationRequestInfo.version = pkcs10_v1; ret = copy_Name(&req->name->der_name, &r.certificationRequestInfo.subject); if (ret) goto out; ret = copy_SubjectPublicKeyInfo(&req->key, &r.certificationRequestInfo.subjectPKInfo); if (ret) goto out; r.certificationRequestInfo.attributes = calloc(1, sizeof(*r.certificationRequestInfo.attributes)); if (r.certificationRequestInfo.attributes == NULL) { ret = ENOMEM; goto out; } ASN1_MALLOC_ENCODE(CertificationRequestInfo, data.data, data.length, &r.certificationRequestInfo, &size, ret); if (ret) goto out; if (data.length != size) abort(); ret = _hx509_create_signature(context, signer, _hx509_crypto_default_sig_alg, &data, &r.signatureAlgorithm, &os); free(data.data); if (ret) goto out; r.signature.data = os.data; r.signature.length = os.length * 8; ASN1_MALLOC_ENCODE(CertificationRequest, data.data, data.length, &r, &size, ret); if (ret) goto out; if (data.length != size) abort(); *request = data; out: free_CertificationRequest(&r); return ret; } int _hx509_request_parse(hx509_context context, const char *path, hx509_request *req) { CertificationRequest r; CertificationRequestInfo *rinfo; hx509_name subject; size_t len, size; void *p; int ret; if (strncmp(path, "PKCS10:", 7) != 0) { hx509_set_error_string(context, 0, HX509_UNSUPPORTED_OPERATION, "unsupport type in %s", path); return HX509_UNSUPPORTED_OPERATION; } path += 7; /* XXX PEM request */ ret = rk_undumpdata(path, &p, &len); if (ret) { hx509_set_error_string(context, 0, ret, "Failed to map file %s", path); return ret; } ret = decode_CertificationRequest(p, len, &r, &size); rk_xfree(p); if (ret) { hx509_set_error_string(context, 0, ret, "Failed to decode %s", path); return ret; } ret = hx509_request_init(context, req); if (ret) { free_CertificationRequest(&r); return ret; } rinfo = &r.certificationRequestInfo; ret = hx509_request_set_SubjectPublicKeyInfo(context, *req, &rinfo->subjectPKInfo); if (ret) { free_CertificationRequest(&r); hx509_request_free(req); return ret; } ret = _hx509_name_from_Name(&rinfo->subject, &subject); if (ret) { free_CertificationRequest(&r); hx509_request_free(req); return ret; } ret = hx509_request_set_name(context, *req, subject); hx509_name_free(&subject); free_CertificationRequest(&r); if (ret) { hx509_request_free(req); return ret; } return 0; } int _hx509_request_print(hx509_context context, hx509_request req, FILE *f) { int ret; if (req->name) { char *subject; ret = hx509_name_to_string(req->name, &subject); if (ret) { hx509_set_error_string(context, 0, ret, "Failed to print name"); return ret; } fprintf(f, "name: %s\n", subject); free(subject); } return 0; }
Upload File
Create Folder