2015-10-21 05:03:22 +02:00
|
|
|
/* -*- Mode: C; tab-width: 8 -*-*/
|
2018-05-04 16:08:28 +02:00
|
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
2015-10-21 05:03:22 +02:00
|
|
|
|
|
|
|
|
|
|
|
#ifndef _CRMFI_H_
|
|
|
|
#define _CRMFI_H_
|
|
|
|
/* This file will contain all declarations common to both
|
|
|
|
* encoding and decoding of CRMF Cert Requests. This header
|
|
|
|
* file should only be included internally by CRMF implementation
|
|
|
|
* files.
|
|
|
|
*/
|
|
|
|
#include "secasn1.h"
|
|
|
|
#include "crmfit.h"
|
|
|
|
#include "secerr.h"
|
2018-05-04 16:08:28 +02:00
|
|
|
#include "blapit.h"
|
2015-10-21 05:03:22 +02:00
|
|
|
|
|
|
|
#define CRMF_DEFAULT_ARENA_SIZE 1024
|
|
|
|
|
2018-05-04 16:08:28 +02:00
|
|
|
/*
|
|
|
|
* Explanation for the definition of MAX_WRAPPED_KEY_LEN:
|
|
|
|
*
|
|
|
|
* It's used for internal buffers to transport a wrapped private key.
|
|
|
|
* The value is in BYTES.
|
|
|
|
* We want to define a reasonable upper bound for this value.
|
|
|
|
* Ideally this could be calculated, but in order to simplify the code
|
|
|
|
* we want to estimate the maximum requires size.
|
|
|
|
* See also bug 655850 for the full explanation.
|
|
|
|
*
|
|
|
|
* We know the largest wrapped keys are RSA keys.
|
|
|
|
* We'll estimate the maximum size needed for wrapped RSA keys,
|
|
|
|
* and assume it's sufficient for wrapped keys of any type we support.
|
|
|
|
*
|
|
|
|
* The maximum size of RSA keys in bits is defined elsewhere as
|
|
|
|
* RSA_MAX_MODULUS_BITS
|
|
|
|
*
|
|
|
|
* The idea is to define MAX_WRAPPED_KEY_LEN based on the above.
|
|
|
|
*
|
|
|
|
* A wrapped RSA key requires about
|
|
|
|
* ( ( RSA_MAX_MODULUS_BITS / 8 ) * 5.5) + 65
|
|
|
|
* bytes.
|
|
|
|
*
|
|
|
|
* Therefore, a safe upper bound is:
|
|
|
|
* ( ( RSA_MAX_MODULUS_BITS / 8 ) *8 ) = RSA_MAX_MODULUS_BITS
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
#define MAX_WRAPPED_KEY_LEN RSA_MAX_MODULUS_BITS
|
2015-10-21 05:03:22 +02:00
|
|
|
|
|
|
|
#define CRMF_BITS_TO_BYTES(bits) (((bits)+7)/8)
|
|
|
|
#define CRMF_BYTES_TO_BITS(bytes) ((bytes)*8)
|
|
|
|
|
|
|
|
struct crmfEncoderArg {
|
|
|
|
SECItem *buffer;
|
cherry-picked mozilla NSS upstream changes (to rev bad5fd065fa1, which is on par with 3.20):
bug1001332, 56b691c003ad, bug1086145, bug1054069, bug1155922, bug991783, bug1125025, bug1162521, bug1162644, bug1132941, bug1164364, bug1166205, bug1166163, bug1166515, bug1138554, bug1167046, bug1167043, bug1169451, bug1172128, bug1170322, bug102794, bug1128184, bug557830, bug1174648, bug1180244, bug1177784, bug1173413, bug1169174, bug1084669, bug951455, bug1183395, bug1177430, bug1183827, bug1160139, bug1154106, bug1142209, bug1185033, bug1193467, bug1182667(with sha512 changes backed out, which breaks VC6 compilation), bug1158489, bug337796
2018-07-12 15:44:51 +02:00
|
|
|
unsigned long allocatedLen;
|
2015-10-21 05:03:22 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
struct crmfEncoderOutput {
|
|
|
|
CRMFEncoderOutputCallback fn;
|
|
|
|
void *outputArg;
|
|
|
|
};
|
|
|
|
|
|
|
|
/*
|
2018-05-04 16:08:28 +02:00
|
|
|
* This function is used by the API for encoding functions that are
|
2015-10-21 05:03:22 +02:00
|
|
|
* exposed through the API, ie all of the CMMF_Encode* and CRMF_Encode*
|
|
|
|
* functions.
|
|
|
|
*/
|
|
|
|
extern void
|
|
|
|
crmf_encoder_out(void *arg, const char *buf, unsigned long len,
|
|
|
|
int depth, SEC_ASN1EncodingPart data_kind);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* This function is used when we want to encode something locally within
|
|
|
|
* the library, ie the CertRequest so that we can produce its signature.
|
|
|
|
*/
|
|
|
|
extern SECStatus
|
|
|
|
crmf_init_encoder_callback_arg (struct crmfEncoderArg *encoderArg,
|
|
|
|
SECItem *derDest);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* This is the callback function we feed to the ASN1 encoder when doing
|
|
|
|
* internal DER-encodings. ie, encoding the cert request so we can
|
|
|
|
* produce a signature.
|
|
|
|
*/
|
|
|
|
extern void
|
|
|
|
crmf_generic_encoder_callback(void *arg, const char* buf, unsigned long len,
|
|
|
|
int depth, SEC_ASN1EncodingPart data_kind);
|
|
|
|
|
|
|
|
/* The ASN1 templates that need to be seen by internal files
|
|
|
|
* in order to implement CRMF.
|
|
|
|
*/
|
|
|
|
extern const SEC_ASN1Template CRMFCertReqMsgTemplate[];
|
|
|
|
extern const SEC_ASN1Template CRMFRAVerifiedTemplate[];
|
|
|
|
extern const SEC_ASN1Template CRMFPOPOSigningKeyTemplate[];
|
|
|
|
extern const SEC_ASN1Template CRMFPOPOKeyEnciphermentTemplate[];
|
|
|
|
extern const SEC_ASN1Template CRMFPOPOKeyAgreementTemplate[];
|
|
|
|
extern const SEC_ASN1Template CRMFThisMessageTemplate[];
|
|
|
|
extern const SEC_ASN1Template CRMFSubsequentMessageTemplate[];
|
|
|
|
extern const SEC_ASN1Template CRMFDHMACTemplate[];
|
|
|
|
extern const SEC_ASN1Template CRMFEncryptedKeyWithEncryptedValueTemplate[];
|
|
|
|
extern const SEC_ASN1Template CRMFEncryptedValueTemplate[];
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Use these two values for encoding Boolean values.
|
|
|
|
*/
|
|
|
|
extern const unsigned char hexTrue;
|
|
|
|
extern const unsigned char hexFalse;
|
|
|
|
/*
|
|
|
|
* Prototypes for helper routines used internally by multiple files.
|
|
|
|
*/
|
2018-05-04 16:08:28 +02:00
|
|
|
extern SECStatus crmf_encode_integer(PLArenaPool *poolp, SECItem *dest,
|
2015-10-21 05:03:22 +02:00
|
|
|
long value);
|
2018-05-04 16:08:28 +02:00
|
|
|
extern SECStatus crmf_make_bitstring_copy(PLArenaPool *arena, SECItem *dest,
|
2015-10-21 05:03:22 +02:00
|
|
|
SECItem *src);
|
|
|
|
|
2018-05-04 16:08:28 +02:00
|
|
|
extern SECStatus crmf_copy_pkiarchiveoptions(PLArenaPool *poolp,
|
2015-10-21 05:03:22 +02:00
|
|
|
CRMFPKIArchiveOptions *destOpt,
|
|
|
|
CRMFPKIArchiveOptions *srcOpt);
|
|
|
|
extern SECStatus
|
|
|
|
crmf_destroy_pkiarchiveoptions(CRMFPKIArchiveOptions *inArchOptions,
|
|
|
|
PRBool freeit);
|
|
|
|
extern const SEC_ASN1Template*
|
|
|
|
crmf_get_pkiarchiveoptions_subtemplate(CRMFControl *inControl);
|
|
|
|
|
2018-05-04 16:08:28 +02:00
|
|
|
extern SECStatus crmf_copy_encryptedkey(PLArenaPool *poolp,
|
2015-10-21 05:03:22 +02:00
|
|
|
CRMFEncryptedKey *srcEncrKey,
|
|
|
|
CRMFEncryptedKey *destEncrKey);
|
|
|
|
extern SECStatus
|
2018-05-04 16:08:28 +02:00
|
|
|
crmf_copy_encryptedvalue(PLArenaPool *poolp,
|
2015-10-21 05:03:22 +02:00
|
|
|
CRMFEncryptedValue *srcValue,
|
|
|
|
CRMFEncryptedValue *destValue);
|
|
|
|
|
|
|
|
extern SECStatus
|
2018-05-04 16:08:28 +02:00
|
|
|
crmf_copy_encryptedvalue_secalg(PLArenaPool *poolp,
|
2015-10-21 05:03:22 +02:00
|
|
|
SECAlgorithmID *srcAlgId,
|
|
|
|
SECAlgorithmID **destAlgId);
|
|
|
|
|
2018-05-04 16:08:28 +02:00
|
|
|
extern SECStatus crmf_template_copy_secalg(PLArenaPool *poolp,
|
2015-10-21 05:03:22 +02:00
|
|
|
SECAlgorithmID **dest,
|
|
|
|
SECAlgorithmID *src);
|
|
|
|
|
2018-05-04 16:08:28 +02:00
|
|
|
extern SECStatus crmf_copy_cert_name(PLArenaPool *poolp, CERTName **dest,
|
2015-10-21 05:03:22 +02:00
|
|
|
CERTName *src);
|
|
|
|
|
2018-05-04 16:08:28 +02:00
|
|
|
extern SECStatus crmf_template_add_public_key(PLArenaPool *poolp,
|
2015-10-21 05:03:22 +02:00
|
|
|
CERTSubjectPublicKeyInfo **dest,
|
|
|
|
CERTSubjectPublicKeyInfo *pubKey);
|
|
|
|
|
2018-05-04 16:08:28 +02:00
|
|
|
extern CRMFCertExtension* crmf_create_cert_extension(PLArenaPool *poolp,
|
2015-10-21 05:03:22 +02:00
|
|
|
SECOidTag tag,
|
|
|
|
PRBool isCritical,
|
|
|
|
SECItem *data);
|
|
|
|
extern CRMFCertRequest*
|
2018-05-04 16:08:28 +02:00
|
|
|
crmf_copy_cert_request(PLArenaPool *poolp, CRMFCertRequest *srcReq);
|
2015-10-21 05:03:22 +02:00
|
|
|
|
|
|
|
extern SECStatus crmf_destroy_encrypted_value(CRMFEncryptedValue *inEncrValue,
|
|
|
|
PRBool freeit);
|
|
|
|
|
|
|
|
extern CRMFEncryptedValue *
|
|
|
|
crmf_create_encrypted_value_wrapped_privkey(SECKEYPrivateKey *inPrivKey,
|
|
|
|
SECKEYPublicKey *inPubKey,
|
|
|
|
CRMFEncryptedValue *destValue);
|
|
|
|
|
|
|
|
extern CK_MECHANISM_TYPE
|
|
|
|
crmf_get_mechanism_from_public_key(SECKEYPublicKey *inPubKey);
|
|
|
|
|
|
|
|
extern SECStatus
|
2018-05-04 16:08:28 +02:00
|
|
|
crmf_encrypted_value_unwrap_priv_key(PLArenaPool *poolp,
|
2015-10-21 05:03:22 +02:00
|
|
|
CRMFEncryptedValue *encValue,
|
|
|
|
SECKEYPrivateKey *privKey,
|
|
|
|
SECKEYPublicKey *newPubKey,
|
|
|
|
SECItem *nickname,
|
|
|
|
PK11SlotInfo *slot,
|
|
|
|
unsigned char keyUsage,
|
|
|
|
SECKEYPrivateKey **unWrappedKey,
|
|
|
|
void *wincx);
|
|
|
|
|
|
|
|
extern SECItem*
|
|
|
|
crmf_get_public_value(SECKEYPublicKey *pubKey, SECItem *dest);
|
|
|
|
|
|
|
|
extern CRMFCertExtension*
|
2018-05-04 16:08:28 +02:00
|
|
|
crmf_copy_cert_extension(PLArenaPool *poolp, CRMFCertExtension *inExtension);
|
2015-10-21 05:03:22 +02:00
|
|
|
|
|
|
|
extern SECStatus
|
|
|
|
crmf_create_prtime(SECItem *src, PRTime **dest);
|
|
|
|
#endif /*_CRMFI_H_*/
|