mirror of
https://github.com/mozilla/gecko-dev.git
synced 2024-11-06 09:05:45 +00:00
162 lines
5.2 KiB
C
162 lines
5.2 KiB
C
/* -*- Mode: C; tab-width: 8 -*-*/
|
|
/*
|
|
* The contents of this file are subject to the Mozilla Public
|
|
* License Version 1.1 (the "License"); you may not use this file
|
|
* except in compliance with the License. You may obtain a copy of
|
|
* the License at http://www.mozilla.org/MPL/
|
|
*
|
|
* Software distributed under the License is distributed on an "AS
|
|
* IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or
|
|
* implied. See the License for the specific language governing
|
|
* rights and limitations under the License.
|
|
*
|
|
* The Original Code is the Netscape security libraries.
|
|
*
|
|
* The Initial Developer of the Original Code is Netscape
|
|
* Communications Corporation. Portions created by Netscape are
|
|
* Copyright (C) 1994-2000 Netscape Communications Corporation. All
|
|
* Rights Reserved.
|
|
*
|
|
* Contributor(s):
|
|
*
|
|
* Alternatively, the contents of this file may be used under the
|
|
* terms of the GNU General Public License Version 2 or later (the
|
|
* "GPL"), in which case the provisions of the GPL are applicable
|
|
* instead of those above. If you wish to allow use of your
|
|
* version of this file only under the terms of the GPL and not to
|
|
* allow others to use your version of this file under the MPL,
|
|
* indicate your decision by deleting the provisions above and
|
|
* replace them with the notice and other provisions required by
|
|
* the GPL. If you do not delete the provisions above, a recipient
|
|
* may use your version of this file under either the MPL or the
|
|
* GPL.
|
|
*/
|
|
|
|
#include "cmmf.h"
|
|
#include "cmmfi.h"
|
|
#include "secasn1.h"
|
|
#include "secitem.h"
|
|
|
|
SEC_ASN1_MKSUB(SEC_SignedCertificateTemplate)
|
|
|
|
static const SEC_ASN1Template CMMFSequenceOfCertifiedKeyPairsTemplate[] = {
|
|
{ SEC_ASN1_SEQUENCE_OF, 0, CMMFCertifiedKeyPairTemplate}
|
|
};
|
|
|
|
static const SEC_ASN1Template CMMFKeyRecRepContentTemplate[] = {
|
|
{ SEC_ASN1_SEQUENCE, 0, NULL, sizeof(CMMFKeyRecRepContent)},
|
|
{ SEC_ASN1_INLINE, offsetof(CMMFKeyRecRepContent, status),
|
|
CMMFPKIStatusInfoTemplate},
|
|
{ SEC_ASN1_OPTIONAL | SEC_ASN1_CONTEXT_SPECIFIC | SEC_ASN1_POINTER |
|
|
SEC_ASN1_XTRN | 0,
|
|
offsetof(CMMFKeyRecRepContent, newSigCert),
|
|
SEC_ASN1_SUB(SEC_SignedCertificateTemplate)},
|
|
{ SEC_ASN1_CONSTRUCTED | SEC_ASN1_OPTIONAL | SEC_ASN1_CONTEXT_SPECIFIC | 1,
|
|
offsetof(CMMFKeyRecRepContent, caCerts),
|
|
CMMFSequenceOfCertsTemplate},
|
|
{ SEC_ASN1_CONSTRUCTED | SEC_ASN1_OPTIONAL | SEC_ASN1_CONTEXT_SPECIFIC | 2,
|
|
offsetof(CMMFKeyRecRepContent, keyPairHist),
|
|
CMMFSequenceOfCertifiedKeyPairsTemplate},
|
|
{ 0 }
|
|
};
|
|
|
|
SECStatus
|
|
CMMF_EncodeCertRepContent (CMMFCertRepContent *inCertRepContent,
|
|
CRMFEncoderOutputCallback inCallback,
|
|
void *inArg)
|
|
{
|
|
return cmmf_user_encode(inCertRepContent, inCallback, inArg,
|
|
CMMFCertRepContentTemplate);
|
|
}
|
|
|
|
SECStatus
|
|
CMMF_EncodePOPODecKeyChallContent(CMMFPOPODecKeyChallContent *inDecKeyChall,
|
|
CRMFEncoderOutputCallback inCallback,
|
|
void *inArg)
|
|
{
|
|
return cmmf_user_encode(inDecKeyChall, inCallback, inArg,
|
|
CMMFPOPODecKeyChallContentTemplate);
|
|
}
|
|
|
|
CMMFPOPODecKeyRespContent*
|
|
CMMF_CreatePOPODecKeyRespContentFromDER(const char *buf, long len)
|
|
{
|
|
PRArenaPool *poolp;
|
|
CMMFPOPODecKeyRespContent *decKeyResp;
|
|
SECStatus rv;
|
|
|
|
poolp = PORT_NewArena(CRMF_DEFAULT_ARENA_SIZE);
|
|
if (poolp == NULL) {
|
|
return NULL;
|
|
}
|
|
decKeyResp = PORT_ArenaZNew(poolp, CMMFPOPODecKeyRespContent);
|
|
if (decKeyResp == NULL) {
|
|
goto loser;
|
|
}
|
|
decKeyResp->poolp = poolp;
|
|
rv = SEC_ASN1Decode(poolp, decKeyResp, CMMFPOPODecKeyRespContentTemplate,
|
|
buf, len);
|
|
if (rv != SECSuccess) {
|
|
goto loser;
|
|
}
|
|
return decKeyResp;
|
|
|
|
loser:
|
|
if (poolp != NULL) {
|
|
PORT_FreeArena(poolp, PR_FALSE);
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
SECStatus
|
|
CMMF_EncodeKeyRecRepContent(CMMFKeyRecRepContent *inKeyRecRep,
|
|
CRMFEncoderOutputCallback inCallback,
|
|
void *inArg)
|
|
{
|
|
return cmmf_user_encode(inKeyRecRep, inCallback, inArg,
|
|
CMMFKeyRecRepContentTemplate);
|
|
}
|
|
|
|
CMMFKeyRecRepContent*
|
|
CMMF_CreateKeyRecRepContentFromDER(CERTCertDBHandle *db, const char *buf,
|
|
long len)
|
|
{
|
|
PRArenaPool *poolp;
|
|
CMMFKeyRecRepContent *keyRecContent;
|
|
SECStatus rv;
|
|
|
|
poolp = PORT_NewArena(CRMF_DEFAULT_ARENA_SIZE);
|
|
if (poolp == NULL) {
|
|
return NULL;
|
|
}
|
|
keyRecContent = PORT_ArenaZNew(poolp, CMMFKeyRecRepContent);
|
|
if (keyRecContent == NULL) {
|
|
goto loser;
|
|
}
|
|
keyRecContent->poolp = poolp;
|
|
rv = SEC_ASN1Decode(poolp, keyRecContent, CMMFKeyRecRepContentTemplate,
|
|
buf, len);
|
|
if (rv != SECSuccess) {
|
|
goto loser;
|
|
}
|
|
if (keyRecContent->keyPairHist != NULL) {
|
|
while(keyRecContent->keyPairHist[keyRecContent->numKeyPairs] != NULL) {
|
|
rv = cmmf_decode_process_certified_key_pair(poolp, db,
|
|
keyRecContent->keyPairHist[keyRecContent->numKeyPairs]);
|
|
if (rv != SECSuccess) {
|
|
goto loser;
|
|
}
|
|
keyRecContent->numKeyPairs++;
|
|
}
|
|
keyRecContent->allocKeyPairs = keyRecContent->numKeyPairs;
|
|
}
|
|
keyRecContent->isDecoded = PR_TRUE;
|
|
return keyRecContent;
|
|
loser:
|
|
if (poolp != NULL) {
|
|
PORT_FreeArena(poolp, PR_FALSE);
|
|
}
|
|
return NULL;
|
|
}
|
|
|