1*e1608179Sbeck /* $OpenBSD: x_spki.c,v 1.14 2024/04/09 13:55:02 beck Exp $ */ 25b37fcf3Sryker /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 35b37fcf3Sryker * All rights reserved. 45b37fcf3Sryker * 55b37fcf3Sryker * This package is an SSL implementation written 65b37fcf3Sryker * by Eric Young (eay@cryptsoft.com). 75b37fcf3Sryker * The implementation was written so as to conform with Netscapes SSL. 85b37fcf3Sryker * 95b37fcf3Sryker * This library is free for commercial and non-commercial use as long as 105b37fcf3Sryker * the following conditions are aheared to. The following conditions 115b37fcf3Sryker * apply to all code found in this distribution, be it the RC4, RSA, 125b37fcf3Sryker * lhash, DES, etc., code; not just the SSL code. The SSL documentation 135b37fcf3Sryker * included with this distribution is covered by the same copyright terms 145b37fcf3Sryker * except that the holder is Tim Hudson (tjh@cryptsoft.com). 155b37fcf3Sryker * 165b37fcf3Sryker * Copyright remains Eric Young's, and as such any Copyright notices in 175b37fcf3Sryker * the code are not to be removed. 185b37fcf3Sryker * If this package is used in a product, Eric Young should be given attribution 195b37fcf3Sryker * as the author of the parts of the library used. 205b37fcf3Sryker * This can be in the form of a textual message at program startup or 215b37fcf3Sryker * in documentation (online or textual) provided with the package. 225b37fcf3Sryker * 235b37fcf3Sryker * Redistribution and use in source and binary forms, with or without 245b37fcf3Sryker * modification, are permitted provided that the following conditions 255b37fcf3Sryker * are met: 265b37fcf3Sryker * 1. Redistributions of source code must retain the copyright 275b37fcf3Sryker * notice, this list of conditions and the following disclaimer. 285b37fcf3Sryker * 2. Redistributions in binary form must reproduce the above copyright 295b37fcf3Sryker * notice, this list of conditions and the following disclaimer in the 305b37fcf3Sryker * documentation and/or other materials provided with the distribution. 315b37fcf3Sryker * 3. All advertising materials mentioning features or use of this software 325b37fcf3Sryker * must display the following acknowledgement: 335b37fcf3Sryker * "This product includes cryptographic software written by 345b37fcf3Sryker * Eric Young (eay@cryptsoft.com)" 355b37fcf3Sryker * The word 'cryptographic' can be left out if the rouines from the library 365b37fcf3Sryker * being used are not cryptographic related :-). 375b37fcf3Sryker * 4. If you include any Windows specific code (or a derivative thereof) from 385b37fcf3Sryker * the apps directory (application code) you must include an acknowledgement: 395b37fcf3Sryker * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" 405b37fcf3Sryker * 415b37fcf3Sryker * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND 425b37fcf3Sryker * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 435b37fcf3Sryker * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 445b37fcf3Sryker * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 455b37fcf3Sryker * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 465b37fcf3Sryker * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 475b37fcf3Sryker * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 485b37fcf3Sryker * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 495b37fcf3Sryker * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 505b37fcf3Sryker * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 515b37fcf3Sryker * SUCH DAMAGE. 525b37fcf3Sryker * 535b37fcf3Sryker * The licence and distribution terms for any publically available version or 545b37fcf3Sryker * derivative of this code cannot be changed. i.e. this code cannot simply be 555b37fcf3Sryker * copied and put under another distribution licence 565b37fcf3Sryker * [including the GNU Public Licence.] 575b37fcf3Sryker */ 585b37fcf3Sryker 595b37fcf3Sryker /* This module was send to me my Pat Richards <patr@x509.com> who 60ba5406e9Sbeck * wrote it. It is under my Copyright with his permission 615b37fcf3Sryker */ 625b37fcf3Sryker 635b37fcf3Sryker #include <stdio.h> 64b6ab114eSjsing 65913ec974Sbeck #include <openssl/x509.h> 66da347917Sbeck #include <openssl/asn1t.h> 675b37fcf3Sryker 682c25b402Sjsing static const ASN1_TEMPLATE NETSCAPE_SPKAC_seq_tt[] = { 692c25b402Sjsing { 702c25b402Sjsing .offset = offsetof(NETSCAPE_SPKAC, pubkey), 712c25b402Sjsing .field_name = "pubkey", 722c25b402Sjsing .item = &X509_PUBKEY_it, 732c25b402Sjsing }, 742c25b402Sjsing { 752c25b402Sjsing .offset = offsetof(NETSCAPE_SPKAC, challenge), 762c25b402Sjsing .field_name = "challenge", 772c25b402Sjsing .item = &ASN1_IA5STRING_it, 782c25b402Sjsing }, 792c25b402Sjsing }; 802c25b402Sjsing 812c25b402Sjsing const ASN1_ITEM NETSCAPE_SPKAC_it = { 822c25b402Sjsing .itype = ASN1_ITYPE_SEQUENCE, 832c25b402Sjsing .utype = V_ASN1_SEQUENCE, 842c25b402Sjsing .templates = NETSCAPE_SPKAC_seq_tt, 852c25b402Sjsing .tcount = sizeof(NETSCAPE_SPKAC_seq_tt) / sizeof(ASN1_TEMPLATE), 862c25b402Sjsing .size = sizeof(NETSCAPE_SPKAC), 872c25b402Sjsing .sname = "NETSCAPE_SPKAC", 882c25b402Sjsing }; 895b37fcf3Sryker 90811ee5a3Sjsing 91811ee5a3Sjsing NETSCAPE_SPKAC * 92811ee5a3Sjsing d2i_NETSCAPE_SPKAC(NETSCAPE_SPKAC **a, const unsigned char **in, long len) 93811ee5a3Sjsing { 94811ee5a3Sjsing return (NETSCAPE_SPKAC *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, 95811ee5a3Sjsing &NETSCAPE_SPKAC_it); 96811ee5a3Sjsing } 97*e1608179Sbeck LCRYPTO_ALIAS(d2i_NETSCAPE_SPKAC); 98811ee5a3Sjsing 99811ee5a3Sjsing int 100811ee5a3Sjsing i2d_NETSCAPE_SPKAC(NETSCAPE_SPKAC *a, unsigned char **out) 101811ee5a3Sjsing { 102811ee5a3Sjsing return ASN1_item_i2d((ASN1_VALUE *)a, out, &NETSCAPE_SPKAC_it); 103811ee5a3Sjsing } 104*e1608179Sbeck LCRYPTO_ALIAS(i2d_NETSCAPE_SPKAC); 105811ee5a3Sjsing 106811ee5a3Sjsing NETSCAPE_SPKAC * 107811ee5a3Sjsing NETSCAPE_SPKAC_new(void) 108811ee5a3Sjsing { 109811ee5a3Sjsing return (NETSCAPE_SPKAC *)ASN1_item_new(&NETSCAPE_SPKAC_it); 110811ee5a3Sjsing } 111*e1608179Sbeck LCRYPTO_ALIAS(NETSCAPE_SPKAC_new); 112811ee5a3Sjsing 113811ee5a3Sjsing void 114811ee5a3Sjsing NETSCAPE_SPKAC_free(NETSCAPE_SPKAC *a) 115811ee5a3Sjsing { 116811ee5a3Sjsing ASN1_item_free((ASN1_VALUE *)a, &NETSCAPE_SPKAC_it); 117811ee5a3Sjsing } 118*e1608179Sbeck LCRYPTO_ALIAS(NETSCAPE_SPKAC_free); 1195b37fcf3Sryker 1202c25b402Sjsing static const ASN1_TEMPLATE NETSCAPE_SPKI_seq_tt[] = { 1212c25b402Sjsing { 1222c25b402Sjsing .flags = 0, 1232c25b402Sjsing .tag = 0, 1242c25b402Sjsing .offset = offsetof(NETSCAPE_SPKI, spkac), 1252c25b402Sjsing .field_name = "spkac", 1262c25b402Sjsing .item = &NETSCAPE_SPKAC_it, 1272c25b402Sjsing }, 1282c25b402Sjsing { 1292c25b402Sjsing .flags = 0, 1302c25b402Sjsing .tag = 0, 1312c25b402Sjsing .offset = offsetof(NETSCAPE_SPKI, sig_algor), 1322c25b402Sjsing .field_name = "sig_algor", 1332c25b402Sjsing .item = &X509_ALGOR_it, 1342c25b402Sjsing }, 1352c25b402Sjsing { 1362c25b402Sjsing .flags = 0, 1372c25b402Sjsing .tag = 0, 1382c25b402Sjsing .offset = offsetof(NETSCAPE_SPKI, signature), 1392c25b402Sjsing .field_name = "signature", 1402c25b402Sjsing .item = &ASN1_BIT_STRING_it, 1412c25b402Sjsing }, 1422c25b402Sjsing }; 1432c25b402Sjsing 1442c25b402Sjsing const ASN1_ITEM NETSCAPE_SPKI_it = { 1452c25b402Sjsing .itype = ASN1_ITYPE_SEQUENCE, 1462c25b402Sjsing .utype = V_ASN1_SEQUENCE, 1472c25b402Sjsing .templates = NETSCAPE_SPKI_seq_tt, 1482c25b402Sjsing .tcount = sizeof(NETSCAPE_SPKI_seq_tt) / sizeof(ASN1_TEMPLATE), 1492c25b402Sjsing .funcs = NULL, 1502c25b402Sjsing .size = sizeof(NETSCAPE_SPKI), 1512c25b402Sjsing .sname = "NETSCAPE_SPKI", 1522c25b402Sjsing }; 1535b37fcf3Sryker 154811ee5a3Sjsing 155811ee5a3Sjsing NETSCAPE_SPKI * 156811ee5a3Sjsing d2i_NETSCAPE_SPKI(NETSCAPE_SPKI **a, const unsigned char **in, long len) 157811ee5a3Sjsing { 158811ee5a3Sjsing return (NETSCAPE_SPKI *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, 159811ee5a3Sjsing &NETSCAPE_SPKI_it); 160811ee5a3Sjsing } 161*e1608179Sbeck LCRYPTO_ALIAS(d2i_NETSCAPE_SPKI); 162811ee5a3Sjsing 163811ee5a3Sjsing int 164811ee5a3Sjsing i2d_NETSCAPE_SPKI(NETSCAPE_SPKI *a, unsigned char **out) 165811ee5a3Sjsing { 166811ee5a3Sjsing return ASN1_item_i2d((ASN1_VALUE *)a, out, &NETSCAPE_SPKI_it); 167811ee5a3Sjsing } 168*e1608179Sbeck LCRYPTO_ALIAS(i2d_NETSCAPE_SPKI); 169811ee5a3Sjsing 170811ee5a3Sjsing NETSCAPE_SPKI * 171811ee5a3Sjsing NETSCAPE_SPKI_new(void) 172811ee5a3Sjsing { 173811ee5a3Sjsing return (NETSCAPE_SPKI *)ASN1_item_new(&NETSCAPE_SPKI_it); 174811ee5a3Sjsing } 175*e1608179Sbeck LCRYPTO_ALIAS(NETSCAPE_SPKI_new); 176811ee5a3Sjsing 177811ee5a3Sjsing void 178811ee5a3Sjsing NETSCAPE_SPKI_free(NETSCAPE_SPKI *a) 179811ee5a3Sjsing { 180811ee5a3Sjsing ASN1_item_free((ASN1_VALUE *)a, &NETSCAPE_SPKI_it); 181811ee5a3Sjsing } 182*e1608179Sbeck LCRYPTO_ALIAS(NETSCAPE_SPKI_free); 183