Lines Matching defs:asn1

25 encode_algoid(BerElement *asn1, KMF_X509_ALGORITHM_IDENTIFIER *algoid,
30 if (kmfber_printf(asn1, "{D", &algoid->algorithm) == -1) {
34 if (kmfber_printf(asn1, "}") == -1)
38 if (kmfber_printf(asn1, "n}") == -1)
45 (void) kmfber_write(asn1, (char *)algoid->parameters.Data,
47 if (kmfber_printf(asn1, "}") == -1) {
202 get_sequence_data(BerElement *asn1, BerValue *seqdata)
207 tag = kmfber_next_element(asn1, &size, NULL);
216 if (kmfber_read(asn1, seqdata->bv_val, size) ==
225 if ((kmfber_scanf(asn1, "tl", &tag, &size)) == -1) {
238 if (kmfber_read(asn1, seqdata->bv_val, size) ==
247 get_algoid(BerElement *asn1, KMF_X509_ALGORITHM_IDENTIFIER *algoid)
257 rv = get_sequence_data(asn1, &algoid_data);
338 encode_spki(BerElement *asn1, KMF_X509_SPKI *spki)
342 if (kmfber_printf(asn1, "{") == -1)
349 if ((ret = encode_algoid(asn1, &spki->algorithm, TRUE)) != KMF_OK)
352 if (kmfber_printf(asn1, "B}", spki->subjectPublicKey.Data,
363 BerElement *asn1;
369 if ((asn1 = kmfder_alloc()) == NULL)
372 if ((ret = encode_spki(asn1, spki)) != KMF_OK) {
376 if (kmfber_flatten(asn1, &result) == -1) {
377 kmfber_free(asn1, 1);
385 kmfber_free(asn1, 1);
390 get_spki(BerElement *asn1, KMF_X509_SPKI *spki)
396 if (kmfber_scanf(asn1, "{") == -1)
399 if ((ret = get_algoid(asn1, &spki->algorithm)) != KMF_OK)
402 if (kmfber_scanf(asn1, "B}", &bitstr, &size) == BER_BIT_STRING) {
425 BerElement *asn1;
435 asn1 = kmfder_alloc();
436 if (asn1 == NULL)
444 if (kmfber_printf(asn1, "{II}",
446 kmfber_free(asn1, 1);
450 if (kmfber_flatten(asn1, &buf) == -1) {
451 kmfber_free(asn1, 1);
458 kmfber_free(asn1, 1);
515 BerElement *asn1 = NULL;
529 if ((asn1 = kmfder_init(&buf)) == NULL)
532 if (kmfber_scanf(asn1, "{II}", &R, &S) == -1) {
590 if (asn1) kmfber_free(asn1, 1);
606 BerElement *asn1;
618 if ((asn1 = kmfder_init(&bv)) == NULL)
621 ret = get_spki(asn1, spki);
627 kmfber_free(asn1, 1);
671 encode_validity(BerElement *asn1, KMF_X509_VALIDITY *validity)
675 ret = kmfber_printf(asn1, "{tsts}",
688 get_validity(BerElement *asn1, KMF_X509_VALIDITY *validity)
698 tag = kmfber_next_element(asn1, &size, NULL);
703 if (kmfber_scanf(asn1, "{tata}", &t1, &t1str, &t2, &t2str) == -1) {
749 encode_rdn(BerElement *asn1, KMF_X509_NAME *name)
756 if (kmfber_printf(asn1, "{") == -1) {
762 if (kmfber_printf(asn1, "[") == -1) {
770 if (kmfber_printf(asn1, "{Dto}",
779 if (kmfber_printf(asn1, "]") == -1) {
785 if (kmfber_printf(asn1, "}") == -1) {
881 get_rdn(BerElement *asn1, KMF_X509_NAME *name)
916 tag = kmfber_first_element(asn1, &size, &end);
922 while ((tag = kmfber_next_element(asn1, &size, end)) ==
925 if (kmfber_scanf(asn1, "T", &tag) == -1) {
938 if (kmfber_scanf(asn1, "{Dtl", &AttrOID, &tag, &size) == -1) {
948 if (kmfber_scanf(asn1, "a}]", &AttrValue) == -1) {
1015 encode_uniqueid(BerElement *asn1, int tag, KMF_DATA *id)
1022 if (kmfber_printf(asn1, "TlB", tag, len,
1030 encode_extension_list(BerElement *asn1, KMF_X509_EXTENSIONS *extns)
1040 if (kmfber_printf(asn1, "{D", &v) == -1) {
1046 if (kmfber_printf(asn1, "b",
1053 if (kmfber_printf(asn1, "o}",
1065 encode_extensions(BerElement *asn1, KMF_X509_EXTENSIONS *extns)
1092 if (kmfber_printf(asn1, "Tl", 0xA3, extnvalue->bv_len) == -1) {
1097 if (kmfber_write(asn1, extnvalue->bv_val, extnvalue->bv_len, 0) == -1) {
1111 get_one_extension(BerElement *asn1, KMF_X509_EXTENSION **retex, char *end)
1121 if (kmfber_scanf(asn1, "T", &tag) == -1) {
1126 tag = kmfber_next_element(asn1, &size, end);
1131 if (kmfber_scanf(asn1, "D", &extOID) == -1) {
1136 tag = kmfber_next_element(asn1, &size, end);
1142 if (kmfber_scanf(asn1, "b", &critical) == -1)
1146 tag = kmfber_next_element(asn1, &size, end);
1151 if (kmfber_scanf(asn1, "o", &extValue) == -1) {
1220 get_extensions(BerElement *asn1, KMF_X509_EXTENSIONS *extns)
1237 if (kmfber_first_element(asn1, &size, &end) !=
1241 while (kmfber_next_element(asn1, &size, end) ==
1243 ret = get_one_extension(asn1, &ex, end);
1268 decode_tbscert_data(BerElement *asn1,
1277 if (kmfber_scanf(asn1, "{t", &tag) == -1) {
1284 if (kmfber_scanf(asn1, "Ti", &tag, &version) == -1) {
1293 if (kmfber_scanf(asn1, "I", &bvserno) == -1) {
1315 if ((ret = get_algoid(asn1, &tbscert->signature)) != KMF_OK)
1318 if ((ret = get_rdn(asn1, &tbscert->issuer)) != KMF_OK)
1321 if ((ret = get_validity(asn1, &tbscert->validity)) != KMF_OK)
1324 if ((ret = get_rdn(asn1, &tbscert->subject)) != KMF_OK)
1327 if ((ret = get_spki(asn1, &tbscert->subjectPublicKeyInfo)) != KMF_OK)
1334 while ((kmfber_scanf(asn1, "t", &tag)) != -1 &&
1340 (void) kmfber_scanf(asn1, "T", &tag);
1343 if (kmfber_scanf(asn1, "B", &optfield, &len) !=
1354 if (kmfber_scanf(asn1, "B", &optfield, &len) !=
1365 ret = get_extensions(asn1, &tbscert->extensions);
1392 BerElement *asn1 = NULL;
1402 if ((asn1 = kmfder_init(&rawcert)) == NULL)
1405 ret = decode_tbscert_data(asn1, &newcert);
1417 kmfber_free(asn1, 1);
1438 BerElement *asn1 = NULL;
1453 if ((asn1 = kmfder_init(&rawcert)) == NULL)
1456 if (kmfber_first_element(asn1, &size, &end) !=
1469 ret = decode_tbscert_data(asn1, &tbscert);
1480 if ((ret = get_algoid(asn1,
1484 if (kmfber_next_element(asn1, &size, end) == BER_BIT_STRING) {
1486 if (kmfber_scanf(asn1, "tl", &tag, &size) == -1) {
1494 if (kmfber_scanf(asn1, "B}", &signature, &size) == -1) {
1521 if (asn1)
1522 kmfber_free(asn1, 1);
1532 BerElement *asn1 = NULL;
1538 asn1 = kmfder_init(&bv);
1539 if (asn1 == NULL)
1542 ret = get_one_extension(asn1, extn, NULL);
1552 kmfber_free(asn1, 1);
1560 BerElement *asn1 = NULL;
1566 asn1 = kmfder_init(&bv);
1567 if (asn1 == NULL)
1572 if ((ret = get_rdn(asn1, name)) != KMF_OK)
1576 if (asn1)
1577 kmfber_free(asn1, 1);
1585 BerElement *asn1 = NULL;
1588 asn1 = kmfder_alloc();
1589 if (asn1 == NULL)
1592 if ((ret = encode_rdn(asn1, name)) != KMF_OK)
1595 if (kmfber_flatten(asn1, &bv) == -1) {
1607 if (asn1)
1608 kmfber_free(asn1, 1);
1614 encode_tbs_cert(BerElement *asn1, KMF_X509_TBS_CERT *tbscert)
1627 if (kmfber_printf(asn1, "{Tli", 0xA0, 3, version) == -1) {
1632 if (kmfber_printf(asn1, "I",
1640 if ((ret = encode_algoid(asn1, &tbscert->signature, FALSE)) != KMF_OK)
1644 if ((ret = encode_rdn(asn1, &tbscert->issuer)) != KMF_OK)
1648 if ((ret = encode_validity(asn1, &tbscert->validity)) != KMF_OK)
1652 if ((ret = encode_rdn(asn1, &tbscert->subject)) != KMF_OK)
1656 if ((ret = encode_spki(asn1, &tbscert->subjectPublicKeyInfo)) != KMF_OK)
1661 if ((ret = encode_uniqueid(asn1, 0xA1,
1668 if ((ret = encode_uniqueid(asn1, 0xA2,
1675 if ((ret = encode_extensions(asn1,
1681 if (kmfber_printf(asn1, "}") == -1) {
1700 BerElement *asn1 = NULL;
1703 asn1 = kmfder_alloc();
1704 if (asn1 == NULL)
1710 ret = encode_tbs_cert(asn1, tbs_cert_ptr);
1714 if (kmfber_flatten(asn1, &tbsdata) == -1) {
1726 if (asn1 != NULL)
1727 kmfber_free(asn1, 1);
1742 BerElement *asn1 = NULL;
1754 asn1 = kmfder_alloc();
1755 if (asn1 == NULL)
1759 if (kmfber_printf(asn1, "{") == -1) {
1764 if ((ret = encode_tbs_cert(asn1, tbscert)) != KMF_OK) {
1770 if ((ret = encode_algoid(asn1,
1775 if (kmfber_printf(asn1, "B", signature->encrypted.Data,
1782 if (kmfber_printf(asn1, "}") == -1) {
1787 if (kmfber_flatten(asn1, &tbsdata) == -1) {
1802 if (asn1)
1803 kmfber_free(asn1, 1);
1890 decode_csr_extensions(BerElement *asn1, KMF_X509_EXTENSIONS *extns)
1895 if (kmfber_scanf(asn1, "{D", &oid) == -1) {
1905 if (kmfber_scanf(asn1, "[") == -1) {
1908 ret = get_extensions(asn1, extns);
1915 decode_tbscsr_data(BerElement *asn1,
1926 if (kmfber_scanf(asn1, "{i", &version) == -1) {
1942 if ((ret = get_rdn(asn1, &tbscsr->subject)) != KMF_OK)
1945 if ((ret = get_spki(asn1, &tbscsr->subjectPublicKeyInfo)) != KMF_OK)
1949 if (kmfber_next_element(asn1, &size, end) == 0xA0) {
1950 if (kmfber_scanf(asn1, "Tl", &tag, &size) == -1) {
1955 ret = decode_csr_extensions(asn1, &tbscsr->extensions);
1976 BerElement *asn1 = NULL;
1986 if ((asn1 = kmfder_init(&rawcsr)) == NULL)
1989 ret = decode_tbscsr_data(asn1, &newcsr);
2001 kmfber_free(asn1, 1);
2011 BerElement *asn1 = NULL;
2026 if ((asn1 = kmfder_init(&rawcsr)) == NULL)
2029 if (kmfber_first_element(asn1, &size, &end) !=
2042 ret = decode_tbscsr_data(asn1, &tbscsr);
2050 if ((ret = get_algoid(asn1,
2055 if (kmfber_next_element(asn1, &size, end) == BER_BIT_STRING) {
2057 if (kmfber_scanf(asn1, "tl", &tag, &size) == -1) {
2065 if (kmfber_scanf(asn1, "B}", &signature, &size) == -1) {
2089 if (asn1)
2090 kmfber_free(asn1, 1);
2097 encode_csr_extensions(BerElement *asn1, KMF_TBS_CSR *tbscsr)
2106 if (kmfber_printf(asn1, "T", 0xA0) == -1) {
2166 if (kmfber_printf(asn1, "l", attlen) == -1) {
2173 if (kmfber_write(asn1, extnvalue->bv_val,
2195 encode_tbs_csr(BerElement *asn1, KMF_TBS_CSR *tbscsr)
2204 if (kmfber_printf(asn1, "{i", version) == -1) {
2210 if ((ret = encode_rdn(asn1, &tbscsr->subject)) != KMF_OK)
2214 if ((ret = encode_spki(asn1, &tbscsr->subjectPublicKeyInfo)) != KMF_OK)
2217 if ((ret = encode_csr_extensions(asn1, tbscsr)) != KMF_OK)
2221 if (kmfber_printf(asn1, "}") == -1) {
2234 BerElement *asn1 = NULL;
2237 asn1 = kmfder_alloc();
2238 if (asn1 == NULL)
2241 if (kmfber_printf(asn1, "I",
2247 if (kmfber_flatten(asn1, &dsadata) == -1) {
2257 kmfber_free(asn1, 1);
2265 BerElement *asn1 = NULL;
2269 asn1 = kmfder_alloc();
2270 if (asn1 == NULL)
2273 if (kmfber_printf(asn1, "{IIIIIIIII}",
2285 if (kmfber_flatten(asn1, &rsadata) == -1) {
2295 kmfber_free(asn1, 1);
2303 BerElement *asn1 = NULL;
2307 asn1 = kmfder_alloc();
2308 if (asn1 == NULL)
2311 if (kmfber_printf(asn1, "{io",
2320 if (kmfber_printf(asn1, "T", 0xA0) == -1) {
2324 if (kmfber_printf(asn1, "l", eckey->params.Length) == -1) {
2328 if (kmfber_write(asn1, (char *)eckey->params.Data,
2333 if (kmfber_printf(asn1, "}") == -1) {
2337 if (kmfber_flatten(asn1, &data) == -1) {
2345 kmfber_free(asn1, 1);
2356 BerElement *asn1 = NULL;
2358 asn1 = kmfder_alloc();
2363 if (asn1 == NULL)
2366 ret = encode_tbs_csr(asn1, tbs_csr_ptr);
2370 if (kmfber_flatten(asn1, &tbsdata) == -1) {
2382 if (asn1 != NULL)
2383 kmfber_free(asn1, 1);
2398 BerElement *asn1 = NULL;
2407 asn1 = kmfder_alloc();
2408 if (asn1 == NULL)
2412 if (kmfber_printf(asn1, "{") == -1) {
2417 ret = encode_tbs_csr(asn1, tbscsr);
2420 if ((ret = encode_algoid(asn1,
2425 if (kmfber_printf(asn1, "B", signature->encrypted.Data,
2432 if (kmfber_printf(asn1, "}") == -1) {
2437 if (kmfber_flatten(asn1, &tbsdata) == -1) {
2453 if (asn1)
2454 kmfber_free(asn1, 1);
2484 BerElement *asn1 = NULL;
2499 if ((asn1 = kmfder_init(&PubKeyParams)) == NULL)
2502 if (kmfber_scanf(asn1, "{III}", &P, &Q, &G) == -1) {
2503 kmfber_free(asn1, 1);
2517 kmfber_free(asn1, 1);
2522 if ((asn1 = kmfder_init(&PubKeyData)) == NULL) {
2527 if (kmfber_scanf(asn1, "I", &PubKey) == -1) {
2557 if ((asn1 = kmfder_init(&PubKeyData)) == NULL) {
2561 if (kmfber_scanf(asn1, "{II}", &Mod, &Exp) == -1) {
2585 if (asn1 != NULL) {
2586 kmfber_free(asn1, 1);