1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
|
/* Generated from /home/biorn/src/lib/libkrb5/../../kerberosV/src/lib/asn1/k5.asn1 */
/* Do not edit */
#include <stdio.h>
#include <stdlib.h>
#include <time.h>
#include <string.h>
#include <errno.h>
#include <krb5_asn1.h>
#include <asn1_err.h>
#include <der.h>
#include <parse_units.h>
#define BACK if (e) return e; p -= l; len -= l; ret += l
int
encode_SAMFlags(unsigned char *p, size_t len, const SAMFlags *data, size_t *size)
{
size_t ret = 0;
size_t l;
int i, e;
i = 0;
{
unsigned char c = 0;
*p-- = c; len--; ret++;
c = 0;
*p-- = c; len--; ret++;
c = 0;
*p-- = c; len--; ret++;
c = 0;
if(data->must_pk_encrypt_sad) c |= 1<<5;
if(data->send_encrypted_sad) c |= 1<<6;
if(data->use_sad_as_key) c |= 1<<7;
*p-- = c;
*p-- = 0;
len -= 2;
ret += 2;
}
e = der_put_length_and_tag (p, len, ret, ASN1_C_UNIV, PRIM,UT_BitString, &l);
BACK;
*size = ret;
return 0;
}
#define FORW if(e) goto fail; p += l; len -= l; ret += l
int
decode_SAMFlags(const unsigned char *p, size_t len, SAMFlags *data, size_t *size)
{
size_t ret = 0, reallen;
size_t l;
int e;
memset(data, 0, sizeof(*data));
reallen = 0;
e = der_match_tag_and_length (p, len, ASN1_C_UNIV, PRIM, UT_BitString,&reallen, &l);
FORW;
if(len < reallen)
return ASN1_OVERRUN;
p++;
len--;
reallen--;
ret++;
data->use_sad_as_key = (*p >> 7) & 1;
data->send_encrypted_sad = (*p >> 6) & 1;
data->must_pk_encrypt_sad = (*p >> 5) & 1;
p += reallen; len -= reallen; ret += reallen;
if(size) *size = ret;
return 0;
fail:
free_SAMFlags(data);
return e;
}
void
free_SAMFlags(SAMFlags *data)
{
}
size_t
length_SAMFlags(const SAMFlags *data)
{
size_t ret = 0;
ret += 7;
return ret;
}
int
copy_SAMFlags(const SAMFlags *from, SAMFlags *to)
{
*(to) = *(from);
return 0;
}
unsigned SAMFlags2int(SAMFlags f)
{
unsigned r = 0;
if(f.use_sad_as_key) r |= (1U << 0);
if(f.send_encrypted_sad) r |= (1U << 1);
if(f.must_pk_encrypt_sad) r |= (1U << 2);
return r;
}
SAMFlags int2SAMFlags(unsigned n)
{
SAMFlags flags;
flags.use_sad_as_key = (n >> 0) & 1;
flags.send_encrypted_sad = (n >> 1) & 1;
flags.must_pk_encrypt_sad = (n >> 2) & 1;
return flags;
}
static struct units SAMFlags_units[] = {
{"must_pk_encrypt_sad", 1U << 2},
{"send_encrypted_sad", 1U << 1},
{"use_sad_as_key", 1U << 0},
{NULL, 0}
};
const struct units * asn1_SAMFlags_units(void){
return SAMFlags_units;
}
|