mirror of
https://github.com/rn10950/RetroZilla.git
synced 2024-11-14 03:30:17 +01:00
44b7f056d9
bug1001332, 56b691c003ad, bug1086145, bug1054069, bug1155922, bug991783, bug1125025, bug1162521, bug1162644, bug1132941, bug1164364, bug1166205, bug1166163, bug1166515, bug1138554, bug1167046, bug1167043, bug1169451, bug1172128, bug1170322, bug102794, bug1128184, bug557830, bug1174648, bug1180244, bug1177784, bug1173413, bug1169174, bug1084669, bug951455, bug1183395, bug1177430, bug1183827, bug1160139, bug1154106, bug1142209, bug1185033, bug1193467, bug1182667(with sha512 changes backed out, which breaks VC6 compilation), bug1158489, bug337796
187 lines
6.3 KiB
C
187 lines
6.3 KiB
C
/* -*- Mode: C; tab-width: 8 -*-*/
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
|
|
#ifndef _CRMFI_H_
|
|
#define _CRMFI_H_
|
|
/* This file will contain all declarations common to both
|
|
* encoding and decoding of CRMF Cert Requests. This header
|
|
* file should only be included internally by CRMF implementation
|
|
* files.
|
|
*/
|
|
#include "secasn1.h"
|
|
#include "crmfit.h"
|
|
#include "secerr.h"
|
|
#include "blapit.h"
|
|
|
|
#define CRMF_DEFAULT_ARENA_SIZE 1024
|
|
|
|
/*
|
|
* Explanation for the definition of MAX_WRAPPED_KEY_LEN:
|
|
*
|
|
* It's used for internal buffers to transport a wrapped private key.
|
|
* The value is in BYTES.
|
|
* We want to define a reasonable upper bound for this value.
|
|
* Ideally this could be calculated, but in order to simplify the code
|
|
* we want to estimate the maximum requires size.
|
|
* See also bug 655850 for the full explanation.
|
|
*
|
|
* We know the largest wrapped keys are RSA keys.
|
|
* We'll estimate the maximum size needed for wrapped RSA keys,
|
|
* and assume it's sufficient for wrapped keys of any type we support.
|
|
*
|
|
* The maximum size of RSA keys in bits is defined elsewhere as
|
|
* RSA_MAX_MODULUS_BITS
|
|
*
|
|
* The idea is to define MAX_WRAPPED_KEY_LEN based on the above.
|
|
*
|
|
* A wrapped RSA key requires about
|
|
* ( ( RSA_MAX_MODULUS_BITS / 8 ) * 5.5) + 65
|
|
* bytes.
|
|
*
|
|
* Therefore, a safe upper bound is:
|
|
* ( ( RSA_MAX_MODULUS_BITS / 8 ) *8 ) = RSA_MAX_MODULUS_BITS
|
|
*
|
|
*/
|
|
#define MAX_WRAPPED_KEY_LEN RSA_MAX_MODULUS_BITS
|
|
|
|
#define CRMF_BITS_TO_BYTES(bits) (((bits)+7)/8)
|
|
#define CRMF_BYTES_TO_BITS(bytes) ((bytes)*8)
|
|
|
|
struct crmfEncoderArg {
|
|
SECItem *buffer;
|
|
unsigned long allocatedLen;
|
|
};
|
|
|
|
struct crmfEncoderOutput {
|
|
CRMFEncoderOutputCallback fn;
|
|
void *outputArg;
|
|
};
|
|
|
|
/*
|
|
* This function is used by the API for encoding functions that are
|
|
* exposed through the API, ie all of the CMMF_Encode* and CRMF_Encode*
|
|
* functions.
|
|
*/
|
|
extern void
|
|
crmf_encoder_out(void *arg, const char *buf, unsigned long len,
|
|
int depth, SEC_ASN1EncodingPart data_kind);
|
|
|
|
/*
|
|
* This function is used when we want to encode something locally within
|
|
* the library, ie the CertRequest so that we can produce its signature.
|
|
*/
|
|
extern SECStatus
|
|
crmf_init_encoder_callback_arg (struct crmfEncoderArg *encoderArg,
|
|
SECItem *derDest);
|
|
|
|
/*
|
|
* This is the callback function we feed to the ASN1 encoder when doing
|
|
* internal DER-encodings. ie, encoding the cert request so we can
|
|
* produce a signature.
|
|
*/
|
|
extern void
|
|
crmf_generic_encoder_callback(void *arg, const char* buf, unsigned long len,
|
|
int depth, SEC_ASN1EncodingPart data_kind);
|
|
|
|
/* The ASN1 templates that need to be seen by internal files
|
|
* in order to implement CRMF.
|
|
*/
|
|
extern const SEC_ASN1Template CRMFCertReqMsgTemplate[];
|
|
extern const SEC_ASN1Template CRMFRAVerifiedTemplate[];
|
|
extern const SEC_ASN1Template CRMFPOPOSigningKeyTemplate[];
|
|
extern const SEC_ASN1Template CRMFPOPOKeyEnciphermentTemplate[];
|
|
extern const SEC_ASN1Template CRMFPOPOKeyAgreementTemplate[];
|
|
extern const SEC_ASN1Template CRMFThisMessageTemplate[];
|
|
extern const SEC_ASN1Template CRMFSubsequentMessageTemplate[];
|
|
extern const SEC_ASN1Template CRMFDHMACTemplate[];
|
|
extern const SEC_ASN1Template CRMFEncryptedKeyWithEncryptedValueTemplate[];
|
|
extern const SEC_ASN1Template CRMFEncryptedValueTemplate[];
|
|
|
|
/*
|
|
* Use these two values for encoding Boolean values.
|
|
*/
|
|
extern const unsigned char hexTrue;
|
|
extern const unsigned char hexFalse;
|
|
/*
|
|
* Prototypes for helper routines used internally by multiple files.
|
|
*/
|
|
extern SECStatus crmf_encode_integer(PLArenaPool *poolp, SECItem *dest,
|
|
long value);
|
|
extern SECStatus crmf_make_bitstring_copy(PLArenaPool *arena, SECItem *dest,
|
|
SECItem *src);
|
|
|
|
extern SECStatus crmf_copy_pkiarchiveoptions(PLArenaPool *poolp,
|
|
CRMFPKIArchiveOptions *destOpt,
|
|
CRMFPKIArchiveOptions *srcOpt);
|
|
extern SECStatus
|
|
crmf_destroy_pkiarchiveoptions(CRMFPKIArchiveOptions *inArchOptions,
|
|
PRBool freeit);
|
|
extern const SEC_ASN1Template*
|
|
crmf_get_pkiarchiveoptions_subtemplate(CRMFControl *inControl);
|
|
|
|
extern SECStatus crmf_copy_encryptedkey(PLArenaPool *poolp,
|
|
CRMFEncryptedKey *srcEncrKey,
|
|
CRMFEncryptedKey *destEncrKey);
|
|
extern SECStatus
|
|
crmf_copy_encryptedvalue(PLArenaPool *poolp,
|
|
CRMFEncryptedValue *srcValue,
|
|
CRMFEncryptedValue *destValue);
|
|
|
|
extern SECStatus
|
|
crmf_copy_encryptedvalue_secalg(PLArenaPool *poolp,
|
|
SECAlgorithmID *srcAlgId,
|
|
SECAlgorithmID **destAlgId);
|
|
|
|
extern SECStatus crmf_template_copy_secalg(PLArenaPool *poolp,
|
|
SECAlgorithmID **dest,
|
|
SECAlgorithmID *src);
|
|
|
|
extern SECStatus crmf_copy_cert_name(PLArenaPool *poolp, CERTName **dest,
|
|
CERTName *src);
|
|
|
|
extern SECStatus crmf_template_add_public_key(PLArenaPool *poolp,
|
|
CERTSubjectPublicKeyInfo **dest,
|
|
CERTSubjectPublicKeyInfo *pubKey);
|
|
|
|
extern CRMFCertExtension* crmf_create_cert_extension(PLArenaPool *poolp,
|
|
SECOidTag tag,
|
|
PRBool isCritical,
|
|
SECItem *data);
|
|
extern CRMFCertRequest*
|
|
crmf_copy_cert_request(PLArenaPool *poolp, CRMFCertRequest *srcReq);
|
|
|
|
extern SECStatus crmf_destroy_encrypted_value(CRMFEncryptedValue *inEncrValue,
|
|
PRBool freeit);
|
|
|
|
extern CRMFEncryptedValue *
|
|
crmf_create_encrypted_value_wrapped_privkey(SECKEYPrivateKey *inPrivKey,
|
|
SECKEYPublicKey *inPubKey,
|
|
CRMFEncryptedValue *destValue);
|
|
|
|
extern CK_MECHANISM_TYPE
|
|
crmf_get_mechanism_from_public_key(SECKEYPublicKey *inPubKey);
|
|
|
|
extern SECStatus
|
|
crmf_encrypted_value_unwrap_priv_key(PLArenaPool *poolp,
|
|
CRMFEncryptedValue *encValue,
|
|
SECKEYPrivateKey *privKey,
|
|
SECKEYPublicKey *newPubKey,
|
|
SECItem *nickname,
|
|
PK11SlotInfo *slot,
|
|
unsigned char keyUsage,
|
|
SECKEYPrivateKey **unWrappedKey,
|
|
void *wincx);
|
|
|
|
extern SECItem*
|
|
crmf_get_public_value(SECKEYPublicKey *pubKey, SECItem *dest);
|
|
|
|
extern CRMFCertExtension*
|
|
crmf_copy_cert_extension(PLArenaPool *poolp, CRMFCertExtension *inExtension);
|
|
|
|
extern SECStatus
|
|
crmf_create_prtime(SECItem *src, PRTime **dest);
|
|
#endif /*_CRMFI_H_*/
|