diff options
Diffstat (limited to 'src/lib/libcrypto/krb5/krb5_asn.c')
-rw-r--r-- | src/lib/libcrypto/krb5/krb5_asn.c | 722 |
1 files changed, 0 insertions, 722 deletions
diff --git a/src/lib/libcrypto/krb5/krb5_asn.c b/src/lib/libcrypto/krb5/krb5_asn.c deleted file mode 100644 index 4713fce37b..0000000000 --- a/src/lib/libcrypto/krb5/krb5_asn.c +++ /dev/null | |||
@@ -1,722 +0,0 @@ | |||
1 | /* $OpenBSD: krb5_asn.c,v 1.4 2015/07/25 14:49:45 jsing Exp $ */ | ||
2 | /* Written by Vern Staats <staatsvr@asc.hpc.mil> for the OpenSSL project, | ||
3 | ** using ocsp/{*.h,*asn*.c} as a starting point | ||
4 | */ | ||
5 | /* ==================================================================== | ||
6 | * Copyright (c) 2000 The OpenSSL Project. All rights reserved. | ||
7 | * | ||
8 | * Redistribution and use in source and binary forms, with or without | ||
9 | * modification, are permitted provided that the following conditions | ||
10 | * are met: | ||
11 | * | ||
12 | * 1. Redistributions of source code must retain the above copyright | ||
13 | * notice, this list of conditions and the following disclaimer. | ||
14 | * | ||
15 | * 2. Redistributions in binary form must reproduce the above copyright | ||
16 | * notice, this list of conditions and the following disclaimer in | ||
17 | * the documentation and/or other materials provided with the | ||
18 | * distribution. | ||
19 | * | ||
20 | * 3. All advertising materials mentioning features or use of this | ||
21 | * software must display the following acknowledgment: | ||
22 | * "This product includes software developed by the OpenSSL Project | ||
23 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | ||
24 | * | ||
25 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
26 | * endorse or promote products derived from this software without | ||
27 | * prior written permission. For written permission, please contact | ||
28 | * licensing@OpenSSL.org. | ||
29 | * | ||
30 | * 5. Products derived from this software may not be called "OpenSSL" | ||
31 | * nor may "OpenSSL" appear in their names without prior written | ||
32 | * permission of the OpenSSL Project. | ||
33 | * | ||
34 | * 6. Redistributions of any form whatsoever must retain the following | ||
35 | * acknowledgment: | ||
36 | * "This product includes software developed by the OpenSSL Project | ||
37 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | ||
38 | * | ||
39 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
40 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
41 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
42 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
43 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
44 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
45 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
46 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
47 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
48 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
49 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
50 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
51 | * ==================================================================== | ||
52 | * | ||
53 | * This product includes cryptographic software written by Eric Young | ||
54 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
55 | * Hudson (tjh@cryptsoft.com). | ||
56 | * | ||
57 | */ | ||
58 | #include <openssl/asn1.h> | ||
59 | #include <openssl/asn1t.h> | ||
60 | #include <openssl/krb5_asn.h> | ||
61 | |||
62 | |||
63 | static const ASN1_TEMPLATE KRB5_ENCDATA_seq_tt[] = { | ||
64 | { | ||
65 | .flags = ASN1_TFLG_EXPLICIT, | ||
66 | .tag = 0, | ||
67 | .offset = offsetof(KRB5_ENCDATA, etype), | ||
68 | .field_name = "etype", | ||
69 | .item = &ASN1_INTEGER_it, | ||
70 | }, | ||
71 | { | ||
72 | .flags = ASN1_TFLG_EXPLICIT | ASN1_TFLG_OPTIONAL, | ||
73 | .tag = 1, | ||
74 | .offset = offsetof(KRB5_ENCDATA, kvno), | ||
75 | .field_name = "kvno", | ||
76 | .item = &ASN1_INTEGER_it, | ||
77 | }, | ||
78 | { | ||
79 | .flags = ASN1_TFLG_EXPLICIT, | ||
80 | .tag = 2, | ||
81 | .offset = offsetof(KRB5_ENCDATA, cipher), | ||
82 | .field_name = "cipher", | ||
83 | .item = &ASN1_OCTET_STRING_it, | ||
84 | }, | ||
85 | }; | ||
86 | |||
87 | const ASN1_ITEM KRB5_ENCDATA_it = { | ||
88 | .itype = ASN1_ITYPE_SEQUENCE, | ||
89 | .utype = V_ASN1_SEQUENCE, | ||
90 | .templates = KRB5_ENCDATA_seq_tt, | ||
91 | .tcount = sizeof(KRB5_ENCDATA_seq_tt) / sizeof(ASN1_TEMPLATE), | ||
92 | .funcs = NULL, | ||
93 | .size = sizeof(KRB5_ENCDATA), | ||
94 | .sname = "KRB5_ENCDATA", | ||
95 | }; | ||
96 | |||
97 | |||
98 | KRB5_ENCDATA * | ||
99 | d2i_KRB5_ENCDATA(KRB5_ENCDATA **a, const unsigned char **in, long len) | ||
100 | { | ||
101 | return (KRB5_ENCDATA *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | ||
102 | &KRB5_ENCDATA_it); | ||
103 | } | ||
104 | |||
105 | int | ||
106 | i2d_KRB5_ENCDATA(KRB5_ENCDATA *a, unsigned char **out) | ||
107 | { | ||
108 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &KRB5_ENCDATA_it); | ||
109 | } | ||
110 | |||
111 | KRB5_ENCDATA * | ||
112 | KRB5_ENCDATA_new(void) | ||
113 | { | ||
114 | return (KRB5_ENCDATA *)ASN1_item_new(&KRB5_ENCDATA_it); | ||
115 | } | ||
116 | |||
117 | void | ||
118 | KRB5_ENCDATA_free(KRB5_ENCDATA *a) | ||
119 | { | ||
120 | ASN1_item_free((ASN1_VALUE *)a, &KRB5_ENCDATA_it); | ||
121 | } | ||
122 | |||
123 | |||
124 | static const ASN1_TEMPLATE KRB5_PRINCNAME_seq_tt[] = { | ||
125 | { | ||
126 | .flags = ASN1_TFLG_EXPLICIT, | ||
127 | .tag = 0, | ||
128 | .offset = offsetof(KRB5_PRINCNAME, nametype), | ||
129 | .field_name = "nametype", | ||
130 | .item = &ASN1_INTEGER_it, | ||
131 | }, | ||
132 | { | ||
133 | .flags = ASN1_TFLG_EXPLICIT | ASN1_TFLG_SEQUENCE_OF, | ||
134 | .tag = 1, | ||
135 | .offset = offsetof(KRB5_PRINCNAME, namestring), | ||
136 | .field_name = "namestring", | ||
137 | .item = &ASN1_GENERALSTRING_it, | ||
138 | }, | ||
139 | }; | ||
140 | |||
141 | const ASN1_ITEM KRB5_PRINCNAME_it = { | ||
142 | .itype = ASN1_ITYPE_SEQUENCE, | ||
143 | .utype = V_ASN1_SEQUENCE, | ||
144 | .templates = KRB5_PRINCNAME_seq_tt, | ||
145 | .tcount = sizeof(KRB5_PRINCNAME_seq_tt) / sizeof(ASN1_TEMPLATE), | ||
146 | .funcs = NULL, | ||
147 | .size = sizeof(KRB5_PRINCNAME), | ||
148 | .sname = "KRB5_PRINCNAME", | ||
149 | }; | ||
150 | |||
151 | |||
152 | KRB5_PRINCNAME * | ||
153 | d2i_KRB5_PRINCNAME(KRB5_PRINCNAME **a, const unsigned char **in, long len) | ||
154 | { | ||
155 | return (KRB5_PRINCNAME *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | ||
156 | &KRB5_PRINCNAME_it); | ||
157 | } | ||
158 | |||
159 | int | ||
160 | i2d_KRB5_PRINCNAME(KRB5_PRINCNAME *a, unsigned char **out) | ||
161 | { | ||
162 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &KRB5_PRINCNAME_it); | ||
163 | } | ||
164 | |||
165 | KRB5_PRINCNAME * | ||
166 | KRB5_PRINCNAME_new(void) | ||
167 | { | ||
168 | return (KRB5_PRINCNAME *)ASN1_item_new(&KRB5_PRINCNAME_it); | ||
169 | } | ||
170 | |||
171 | void | ||
172 | KRB5_PRINCNAME_free(KRB5_PRINCNAME *a) | ||
173 | { | ||
174 | ASN1_item_free((ASN1_VALUE *)a, &KRB5_PRINCNAME_it); | ||
175 | } | ||
176 | |||
177 | |||
178 | /* [APPLICATION 1] = 0x61 */ | ||
179 | static const ASN1_TEMPLATE KRB5_TKTBODY_seq_tt[] = { | ||
180 | { | ||
181 | .flags = ASN1_TFLG_EXPLICIT, | ||
182 | .tag = 0, | ||
183 | .offset = offsetof(KRB5_TKTBODY, tktvno), | ||
184 | .field_name = "tktvno", | ||
185 | .item = &ASN1_INTEGER_it, | ||
186 | }, | ||
187 | { | ||
188 | .flags = ASN1_TFLG_EXPLICIT, | ||
189 | .tag = 1, | ||
190 | .offset = offsetof(KRB5_TKTBODY, realm), | ||
191 | .field_name = "realm", | ||
192 | .item = &ASN1_GENERALSTRING_it, | ||
193 | }, | ||
194 | { | ||
195 | .flags = ASN1_TFLG_EXPLICIT, | ||
196 | .tag = 2, | ||
197 | .offset = offsetof(KRB5_TKTBODY, sname), | ||
198 | .field_name = "sname", | ||
199 | .item = &KRB5_PRINCNAME_it, | ||
200 | }, | ||
201 | { | ||
202 | .flags = ASN1_TFLG_EXPLICIT, | ||
203 | .tag = 3, | ||
204 | .offset = offsetof(KRB5_TKTBODY, encdata), | ||
205 | .field_name = "encdata", | ||
206 | .item = &KRB5_ENCDATA_it, | ||
207 | }, | ||
208 | }; | ||
209 | |||
210 | const ASN1_ITEM KRB5_TKTBODY_it = { | ||
211 | .itype = ASN1_ITYPE_SEQUENCE, | ||
212 | .utype = V_ASN1_SEQUENCE, | ||
213 | .templates = KRB5_TKTBODY_seq_tt, | ||
214 | .tcount = sizeof(KRB5_TKTBODY_seq_tt) / sizeof(ASN1_TEMPLATE), | ||
215 | .funcs = NULL, | ||
216 | .size = sizeof(KRB5_TKTBODY), | ||
217 | .sname = "KRB5_TKTBODY", | ||
218 | }; | ||
219 | |||
220 | |||
221 | KRB5_TKTBODY * | ||
222 | d2i_KRB5_TKTBODY(KRB5_TKTBODY **a, const unsigned char **in, long len) | ||
223 | { | ||
224 | return (KRB5_TKTBODY *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | ||
225 | &KRB5_TKTBODY_it); | ||
226 | } | ||
227 | |||
228 | int | ||
229 | i2d_KRB5_TKTBODY(KRB5_TKTBODY *a, unsigned char **out) | ||
230 | { | ||
231 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &KRB5_TKTBODY_it); | ||
232 | } | ||
233 | |||
234 | KRB5_TKTBODY * | ||
235 | KRB5_TKTBODY_new(void) | ||
236 | { | ||
237 | return (KRB5_TKTBODY *)ASN1_item_new(&KRB5_TKTBODY_it); | ||
238 | } | ||
239 | |||
240 | void | ||
241 | KRB5_TKTBODY_free(KRB5_TKTBODY *a) | ||
242 | { | ||
243 | ASN1_item_free((ASN1_VALUE *)a, &KRB5_TKTBODY_it); | ||
244 | } | ||
245 | |||
246 | |||
247 | static const ASN1_TEMPLATE KRB5_TICKET_item_tt = { | ||
248 | .flags = ASN1_TFLG_EXPTAG | ASN1_TFLG_APPLICATION, | ||
249 | .tag = 1, | ||
250 | .offset = 0, | ||
251 | .field_name = "KRB5_TICKET", | ||
252 | .item = &KRB5_TKTBODY_it, | ||
253 | }; | ||
254 | |||
255 | const ASN1_ITEM KRB5_TICKET_it = { | ||
256 | .itype = ASN1_ITYPE_PRIMITIVE, | ||
257 | .utype = -1, | ||
258 | .templates = &KRB5_TICKET_item_tt, | ||
259 | .tcount = 0, | ||
260 | .funcs = NULL, | ||
261 | .size = 0, | ||
262 | .sname = "KRB5_TICKET", | ||
263 | }; | ||
264 | |||
265 | |||
266 | KRB5_TICKET * | ||
267 | d2i_KRB5_TICKET(KRB5_TICKET **a, const unsigned char **in, long len) | ||
268 | { | ||
269 | return (KRB5_TICKET *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | ||
270 | &KRB5_TICKET_it); | ||
271 | } | ||
272 | |||
273 | int | ||
274 | i2d_KRB5_TICKET(KRB5_TICKET *a, unsigned char **out) | ||
275 | { | ||
276 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &KRB5_TICKET_it); | ||
277 | } | ||
278 | |||
279 | KRB5_TICKET * | ||
280 | KRB5_TICKET_new(void) | ||
281 | { | ||
282 | return (KRB5_TICKET *)ASN1_item_new(&KRB5_TICKET_it); | ||
283 | } | ||
284 | |||
285 | void | ||
286 | KRB5_TICKET_free(KRB5_TICKET *a) | ||
287 | { | ||
288 | ASN1_item_free((ASN1_VALUE *)a, &KRB5_TICKET_it); | ||
289 | } | ||
290 | |||
291 | |||
292 | /* [APPLICATION 14] = 0x6e */ | ||
293 | static const ASN1_TEMPLATE KRB5_APREQBODY_seq_tt[] = { | ||
294 | { | ||
295 | .flags = ASN1_TFLG_EXPLICIT, | ||
296 | .tag = 0, | ||
297 | .offset = offsetof(KRB5_APREQBODY, pvno), | ||
298 | .field_name = "pvno", | ||
299 | .item = &ASN1_INTEGER_it, | ||
300 | }, | ||
301 | { | ||
302 | .flags = ASN1_TFLG_EXPLICIT, | ||
303 | .tag = 1, | ||
304 | .offset = offsetof(KRB5_APREQBODY, msgtype), | ||
305 | .field_name = "msgtype", | ||
306 | .item = &ASN1_INTEGER_it, | ||
307 | }, | ||
308 | { | ||
309 | .flags = ASN1_TFLG_EXPLICIT, | ||
310 | .tag = 2, | ||
311 | .offset = offsetof(KRB5_APREQBODY, apoptions), | ||
312 | .field_name = "apoptions", | ||
313 | .item = &ASN1_BIT_STRING_it, | ||
314 | }, | ||
315 | { | ||
316 | .flags = ASN1_TFLG_EXPLICIT, | ||
317 | .tag = 3, | ||
318 | .offset = offsetof(KRB5_APREQBODY, ticket), | ||
319 | .field_name = "ticket", | ||
320 | .item = &KRB5_TICKET_it, | ||
321 | }, | ||
322 | { | ||
323 | .flags = ASN1_TFLG_EXPLICIT, | ||
324 | .tag = 4, | ||
325 | .offset = offsetof(KRB5_APREQBODY, authenticator), | ||
326 | .field_name = "authenticator", | ||
327 | .item = &KRB5_ENCDATA_it, | ||
328 | }, | ||
329 | }; | ||
330 | |||
331 | const ASN1_ITEM KRB5_APREQBODY_it = { | ||
332 | .itype = ASN1_ITYPE_SEQUENCE, | ||
333 | .utype = V_ASN1_SEQUENCE, | ||
334 | .templates = KRB5_APREQBODY_seq_tt, | ||
335 | .tcount = sizeof(KRB5_APREQBODY_seq_tt) / sizeof(ASN1_TEMPLATE), | ||
336 | .funcs = NULL, | ||
337 | .size = sizeof(KRB5_APREQBODY), | ||
338 | .sname = "KRB5_APREQBODY", | ||
339 | }; | ||
340 | |||
341 | |||
342 | KRB5_APREQBODY * | ||
343 | d2i_KRB5_APREQBODY(KRB5_APREQBODY **a, const unsigned char **in, long len) | ||
344 | { | ||
345 | return (KRB5_APREQBODY *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | ||
346 | &KRB5_APREQBODY_it); | ||
347 | } | ||
348 | |||
349 | int | ||
350 | i2d_KRB5_APREQBODY(KRB5_APREQBODY *a, unsigned char **out) | ||
351 | { | ||
352 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &KRB5_APREQBODY_it); | ||
353 | } | ||
354 | |||
355 | KRB5_APREQBODY * | ||
356 | KRB5_APREQBODY_new(void) | ||
357 | { | ||
358 | return (KRB5_APREQBODY *)ASN1_item_new(&KRB5_APREQBODY_it); | ||
359 | } | ||
360 | |||
361 | void | ||
362 | KRB5_APREQBODY_free(KRB5_APREQBODY *a) | ||
363 | { | ||
364 | ASN1_item_free((ASN1_VALUE *)a, &KRB5_APREQBODY_it); | ||
365 | } | ||
366 | |||
367 | static const ASN1_TEMPLATE KRB5_APREQ_item_tt = { | ||
368 | .flags = ASN1_TFLG_EXPTAG | ASN1_TFLG_APPLICATION, | ||
369 | .tag = 14, | ||
370 | .offset = 0, | ||
371 | .field_name = "KRB5_APREQ", | ||
372 | .item = &KRB5_APREQBODY_it, | ||
373 | }; | ||
374 | |||
375 | const ASN1_ITEM KRB5_APREQ_it = { | ||
376 | .itype = ASN1_ITYPE_PRIMITIVE, | ||
377 | .utype = -1, | ||
378 | .templates = &KRB5_APREQ_item_tt, | ||
379 | .tcount = 0, | ||
380 | .funcs = NULL, | ||
381 | .size = 0, | ||
382 | .sname = "KRB5_APREQ", | ||
383 | }; | ||
384 | |||
385 | |||
386 | KRB5_APREQ * | ||
387 | d2i_KRB5_APREQ(KRB5_APREQ **a, const unsigned char **in, long len) | ||
388 | { | ||
389 | return (KRB5_APREQ *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | ||
390 | &KRB5_APREQ_it); | ||
391 | } | ||
392 | |||
393 | int | ||
394 | i2d_KRB5_APREQ(KRB5_APREQ *a, unsigned char **out) | ||
395 | { | ||
396 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &KRB5_APREQ_it); | ||
397 | } | ||
398 | |||
399 | KRB5_APREQ * | ||
400 | KRB5_APREQ_new(void) | ||
401 | { | ||
402 | return (KRB5_APREQ *)ASN1_item_new(&KRB5_APREQ_it); | ||
403 | } | ||
404 | |||
405 | void | ||
406 | KRB5_APREQ_free(KRB5_APREQ *a) | ||
407 | { | ||
408 | ASN1_item_free((ASN1_VALUE *)a, &KRB5_APREQ_it); | ||
409 | } | ||
410 | |||
411 | |||
412 | /* Authenticator stuff */ | ||
413 | |||
414 | static const ASN1_TEMPLATE KRB5_CHECKSUM_seq_tt[] = { | ||
415 | { | ||
416 | .flags = ASN1_TFLG_EXPLICIT, | ||
417 | .tag = 0, | ||
418 | .offset = offsetof(KRB5_CHECKSUM, ctype), | ||
419 | .field_name = "ctype", | ||
420 | .item = &ASN1_INTEGER_it, | ||
421 | }, | ||
422 | { | ||
423 | .flags = ASN1_TFLG_EXPLICIT, | ||
424 | .tag = 1, | ||
425 | .offset = offsetof(KRB5_CHECKSUM, checksum), | ||
426 | .field_name = "checksum", | ||
427 | .item = &ASN1_OCTET_STRING_it, | ||
428 | }, | ||
429 | }; | ||
430 | |||
431 | const ASN1_ITEM KRB5_CHECKSUM_it = { | ||
432 | .itype = ASN1_ITYPE_SEQUENCE, | ||
433 | .utype = V_ASN1_SEQUENCE, | ||
434 | .templates = KRB5_CHECKSUM_seq_tt, | ||
435 | .tcount = sizeof(KRB5_CHECKSUM_seq_tt) / sizeof(ASN1_TEMPLATE), | ||
436 | .funcs = NULL, | ||
437 | .size = sizeof(KRB5_CHECKSUM), | ||
438 | .sname = "KRB5_CHECKSUM", | ||
439 | }; | ||
440 | |||
441 | |||
442 | KRB5_CHECKSUM * | ||
443 | d2i_KRB5_CHECKSUM(KRB5_CHECKSUM **a, const unsigned char **in, long len) | ||
444 | { | ||
445 | return (KRB5_CHECKSUM *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | ||
446 | &KRB5_CHECKSUM_it); | ||
447 | } | ||
448 | |||
449 | int | ||
450 | i2d_KRB5_CHECKSUM(KRB5_CHECKSUM *a, unsigned char **out) | ||
451 | { | ||
452 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &KRB5_CHECKSUM_it); | ||
453 | } | ||
454 | |||
455 | KRB5_CHECKSUM * | ||
456 | KRB5_CHECKSUM_new(void) | ||
457 | { | ||
458 | return (KRB5_CHECKSUM *)ASN1_item_new(&KRB5_CHECKSUM_it); | ||
459 | } | ||
460 | |||
461 | void | ||
462 | KRB5_CHECKSUM_free(KRB5_CHECKSUM *a) | ||
463 | { | ||
464 | ASN1_item_free((ASN1_VALUE *)a, &KRB5_CHECKSUM_it); | ||
465 | } | ||
466 | |||
467 | |||
468 | static const ASN1_TEMPLATE KRB5_ENCKEY_seq_tt[] = { | ||
469 | { | ||
470 | .flags = ASN1_TFLG_EXPLICIT, | ||
471 | .tag = 0, | ||
472 | .offset = offsetof(KRB5_ENCKEY, ktype), | ||
473 | .field_name = "ktype", | ||
474 | .item = &ASN1_INTEGER_it, | ||
475 | }, | ||
476 | { | ||
477 | .flags = ASN1_TFLG_EXPLICIT, | ||
478 | .tag = 1, | ||
479 | .offset = offsetof(KRB5_ENCKEY, keyvalue), | ||
480 | .field_name = "keyvalue", | ||
481 | .item = &ASN1_OCTET_STRING_it, | ||
482 | }, | ||
483 | }; | ||
484 | |||
485 | const ASN1_ITEM KRB5_ENCKEY_it = { | ||
486 | .itype = ASN1_ITYPE_SEQUENCE, | ||
487 | .utype = V_ASN1_SEQUENCE, | ||
488 | .templates = KRB5_ENCKEY_seq_tt, | ||
489 | .tcount = sizeof(KRB5_ENCKEY_seq_tt) / sizeof(ASN1_TEMPLATE), | ||
490 | .funcs = NULL, | ||
491 | .size = sizeof(KRB5_ENCKEY), | ||
492 | .sname = "KRB5_ENCKEY", | ||
493 | }; | ||
494 | |||
495 | |||
496 | KRB5_ENCKEY * | ||
497 | d2i_KRB5_ENCKEY(KRB5_ENCKEY **a, const unsigned char **in, long len) | ||
498 | { | ||
499 | return (KRB5_ENCKEY *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | ||
500 | &KRB5_ENCKEY_it); | ||
501 | } | ||
502 | |||
503 | int | ||
504 | i2d_KRB5_ENCKEY(KRB5_ENCKEY *a, unsigned char **out) | ||
505 | { | ||
506 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &KRB5_ENCKEY_it); | ||
507 | } | ||
508 | |||
509 | KRB5_ENCKEY * | ||
510 | KRB5_ENCKEY_new(void) | ||
511 | { | ||
512 | return (KRB5_ENCKEY *)ASN1_item_new(&KRB5_ENCKEY_it); | ||
513 | } | ||
514 | |||
515 | void | ||
516 | KRB5_ENCKEY_free(KRB5_ENCKEY *a) | ||
517 | { | ||
518 | ASN1_item_free((ASN1_VALUE *)a, &KRB5_ENCKEY_it); | ||
519 | } | ||
520 | |||
521 | |||
522 | /* SEQ OF SEQ; see ASN1_EXP_SEQUENCE_OF_OPT() below */ | ||
523 | static const ASN1_TEMPLATE KRB5_AUTHDATA_seq_tt[] = { | ||
524 | { | ||
525 | .flags = ASN1_TFLG_EXPLICIT, | ||
526 | .tag = 0, | ||
527 | .offset = offsetof(KRB5_AUTHDATA, adtype), | ||
528 | .field_name = "adtype", | ||
529 | .item = &ASN1_INTEGER_it, | ||
530 | }, | ||
531 | { | ||
532 | .flags = ASN1_TFLG_EXPLICIT, | ||
533 | .tag = 1, | ||
534 | .offset = offsetof(KRB5_AUTHDATA, addata), | ||
535 | .field_name = "addata", | ||
536 | .item = &ASN1_OCTET_STRING_it, | ||
537 | }, | ||
538 | }; | ||
539 | |||
540 | const ASN1_ITEM KRB5_AUTHDATA_it = { | ||
541 | .itype = ASN1_ITYPE_SEQUENCE, | ||
542 | .utype = V_ASN1_SEQUENCE, | ||
543 | .templates = KRB5_AUTHDATA_seq_tt, | ||
544 | .tcount = sizeof(KRB5_AUTHDATA_seq_tt) / sizeof(ASN1_TEMPLATE), | ||
545 | .funcs = NULL, | ||
546 | .size = sizeof(KRB5_AUTHDATA), | ||
547 | .sname = "KRB5_AUTHDATA", | ||
548 | }; | ||
549 | |||
550 | |||
551 | KRB5_AUTHDATA * | ||
552 | d2i_KRB5_AUTHDATA(KRB5_AUTHDATA **a, const unsigned char **in, long len) | ||
553 | { | ||
554 | return (KRB5_AUTHDATA *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | ||
555 | &KRB5_AUTHDATA_it); | ||
556 | } | ||
557 | |||
558 | int | ||
559 | i2d_KRB5_AUTHDATA(KRB5_AUTHDATA *a, unsigned char **out) | ||
560 | { | ||
561 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &KRB5_AUTHDATA_it); | ||
562 | } | ||
563 | |||
564 | KRB5_AUTHDATA * | ||
565 | KRB5_AUTHDATA_new(void) | ||
566 | { | ||
567 | return (KRB5_AUTHDATA *)ASN1_item_new(&KRB5_AUTHDATA_it); | ||
568 | } | ||
569 | |||
570 | void | ||
571 | KRB5_AUTHDATA_free(KRB5_AUTHDATA *a) | ||
572 | { | ||
573 | ASN1_item_free((ASN1_VALUE *)a, &KRB5_AUTHDATA_it); | ||
574 | } | ||
575 | |||
576 | |||
577 | /* [APPLICATION 2] = 0x62 */ | ||
578 | static const ASN1_TEMPLATE KRB5_AUTHENTBODY_seq_tt[] = { | ||
579 | { | ||
580 | .flags = ASN1_TFLG_EXPLICIT, | ||
581 | .tag = 0, | ||
582 | .offset = offsetof(KRB5_AUTHENTBODY, avno), | ||
583 | .field_name = "avno", | ||
584 | .item = &ASN1_INTEGER_it, | ||
585 | }, | ||
586 | { | ||
587 | .flags = ASN1_TFLG_EXPLICIT, | ||
588 | .tag = 1, | ||
589 | .offset = offsetof(KRB5_AUTHENTBODY, crealm), | ||
590 | .field_name = "crealm", | ||
591 | .item = &ASN1_GENERALSTRING_it, | ||
592 | }, | ||
593 | { | ||
594 | .flags = ASN1_TFLG_EXPLICIT, | ||
595 | .tag = 2, | ||
596 | .offset = offsetof(KRB5_AUTHENTBODY, cname), | ||
597 | .field_name = "cname", | ||
598 | .item = &KRB5_PRINCNAME_it, | ||
599 | }, | ||
600 | { | ||
601 | .flags = ASN1_TFLG_EXPLICIT | ASN1_TFLG_OPTIONAL, | ||
602 | .tag = 3, | ||
603 | .offset = offsetof(KRB5_AUTHENTBODY, cksum), | ||
604 | .field_name = "cksum", | ||
605 | .item = &KRB5_CHECKSUM_it, | ||
606 | }, | ||
607 | { | ||
608 | .flags = ASN1_TFLG_EXPLICIT, | ||
609 | .tag = 4, | ||
610 | .offset = offsetof(KRB5_AUTHENTBODY, cusec), | ||
611 | .field_name = "cusec", | ||
612 | .item = &ASN1_INTEGER_it, | ||
613 | }, | ||
614 | { | ||
615 | .flags = ASN1_TFLG_EXPLICIT, | ||
616 | .tag = 5, | ||
617 | .offset = offsetof(KRB5_AUTHENTBODY, ctime), | ||
618 | .field_name = "ctime", | ||
619 | .item = &ASN1_GENERALIZEDTIME_it, | ||
620 | }, | ||
621 | { | ||
622 | .flags = ASN1_TFLG_EXPLICIT | ASN1_TFLG_OPTIONAL, | ||
623 | .tag = 6, | ||
624 | .offset = offsetof(KRB5_AUTHENTBODY, subkey), | ||
625 | .field_name = "subkey", | ||
626 | .item = &KRB5_ENCKEY_it, | ||
627 | }, | ||
628 | { | ||
629 | .flags = ASN1_TFLG_EXPLICIT | ASN1_TFLG_OPTIONAL, | ||
630 | .tag = 7, | ||
631 | .offset = offsetof(KRB5_AUTHENTBODY, seqnum), | ||
632 | .field_name = "seqnum", | ||
633 | .item = &ASN1_INTEGER_it, | ||
634 | }, | ||
635 | { | ||
636 | .flags = ASN1_TFLG_EXPLICIT | ASN1_TFLG_SEQUENCE_OF | ASN1_TFLG_OPTIONAL, | ||
637 | .tag = 8, | ||
638 | .offset = offsetof(KRB5_AUTHENTBODY, authorization), | ||
639 | .field_name = "authorization", | ||
640 | .item = &KRB5_AUTHDATA_it, | ||
641 | }, | ||
642 | }; | ||
643 | |||
644 | const ASN1_ITEM KRB5_AUTHENTBODY_it = { | ||
645 | .itype = ASN1_ITYPE_SEQUENCE, | ||
646 | .utype = V_ASN1_SEQUENCE, | ||
647 | .templates = KRB5_AUTHENTBODY_seq_tt, | ||
648 | .tcount = sizeof(KRB5_AUTHENTBODY_seq_tt) / sizeof(ASN1_TEMPLATE), | ||
649 | .funcs = NULL, | ||
650 | .size = sizeof(KRB5_AUTHENTBODY), | ||
651 | .sname = "KRB5_AUTHENTBODY", | ||
652 | }; | ||
653 | |||
654 | |||
655 | KRB5_AUTHENTBODY * | ||
656 | d2i_KRB5_AUTHENTBODY(KRB5_AUTHENTBODY **a, const unsigned char **in, long len) | ||
657 | { | ||
658 | return (KRB5_AUTHENTBODY *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | ||
659 | &KRB5_AUTHENTBODY_it); | ||
660 | } | ||
661 | |||
662 | int | ||
663 | i2d_KRB5_AUTHENTBODY(KRB5_AUTHENTBODY *a, unsigned char **out) | ||
664 | { | ||
665 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &KRB5_AUTHENTBODY_it); | ||
666 | } | ||
667 | |||
668 | KRB5_AUTHENTBODY * | ||
669 | KRB5_AUTHENTBODY_new(void) | ||
670 | { | ||
671 | return (KRB5_AUTHENTBODY *)ASN1_item_new(&KRB5_AUTHENTBODY_it); | ||
672 | } | ||
673 | |||
674 | void | ||
675 | KRB5_AUTHENTBODY_free(KRB5_AUTHENTBODY *a) | ||
676 | { | ||
677 | ASN1_item_free((ASN1_VALUE *)a, &KRB5_AUTHENTBODY_it); | ||
678 | } | ||
679 | |||
680 | static const ASN1_TEMPLATE KRB5_AUTHENT_item_tt = { | ||
681 | .flags = ASN1_TFLG_EXPTAG | ASN1_TFLG_APPLICATION, | ||
682 | .tag = 2, | ||
683 | .offset = 0, | ||
684 | .field_name = "KRB5_AUTHENT", | ||
685 | .item = &KRB5_AUTHENTBODY_it, | ||
686 | }; | ||
687 | |||
688 | const ASN1_ITEM KRB5_AUTHENT_it = { | ||
689 | .itype = ASN1_ITYPE_PRIMITIVE, | ||
690 | .utype = -1, | ||
691 | .templates = &KRB5_AUTHENT_item_tt, | ||
692 | .tcount = 0, | ||
693 | .funcs = NULL, | ||
694 | .size = 0, | ||
695 | .sname = "KRB5_AUTHENT", | ||
696 | }; | ||
697 | |||
698 | |||
699 | KRB5_AUTHENT * | ||
700 | d2i_KRB5_AUTHENT(KRB5_AUTHENT **a, const unsigned char **in, long len) | ||
701 | { | ||
702 | return (KRB5_AUTHENT *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | ||
703 | &KRB5_AUTHENT_it); | ||
704 | } | ||
705 | |||
706 | int | ||
707 | i2d_KRB5_AUTHENT(KRB5_AUTHENT *a, unsigned char **out) | ||
708 | { | ||
709 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &KRB5_AUTHENT_it); | ||
710 | } | ||
711 | |||
712 | KRB5_AUTHENT * | ||
713 | KRB5_AUTHENT_new(void) | ||
714 | { | ||
715 | return (KRB5_AUTHENT *)ASN1_item_new(&KRB5_AUTHENT_it); | ||
716 | } | ||
717 | |||
718 | void | ||
719 | KRB5_AUTHENT_free(KRB5_AUTHENT *a) | ||
720 | { | ||
721 | ASN1_item_free((ASN1_VALUE *)a, &KRB5_AUTHENT_it); | ||
722 | } | ||