diff --git a/LICENSE b/LICENSE index 2708889c31a25bec89b466c00cbfc7619617f6e7..f48f32919c2272e16b0224ab96d130492bc74cec 100644 --- a/LICENSE +++ b/LICENSE @@ -1,23 +1,23 @@ -Copyright 2024 ETSI - -Redistribution and use in source and binary forms, with or without -modification, are permitted provided that the following conditions are met: -1. Redistributions of source code must retain the above copyright notice, - this list of conditions and the following disclaimer. -2. Redistributions in binary form must reproduce the above copyright notice, - this list of conditions and the following disclaimer in the documentation - and/or other materials provided with the distribution. -3. Neither the name of the copyright holder nor the names of its contributors - may be used to endorse or promote products derived from this software without - specific prior written permission. - -THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND -ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED -WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. -IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, -INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, -BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, -DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF -LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE -OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED -OF THE POSSIBILITY OF SUCH DAMAGE. +Copyright 2024 ETSI + +Redistribution and use in source and binary forms, with or without +modification, are permitted provided that the following conditions are met: +1. Redistributions of source code must retain the above copyright notice, + this list of conditions and the following disclaimer. +2. Redistributions in binary form must reproduce the above copyright notice, + this list of conditions and the following disclaimer in the documentation + and/or other materials provided with the distribution. +3. Neither the name of the copyright holder nor the names of its contributors + may be used to endorse or promote products derived from this software without + specific prior written permission. + +THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND +ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED +WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. +IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, +INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, +BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, +DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF +LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE +OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED +OF THE POSSIBILITY OF SUCH DAMAGE. diff --git a/certgen/asn1certgen.xslt b/certgen/asn1certgen.xslt index c18b3336c06b7a5b2421e9a492f4ec8ec6dd2417..79f8d88e192d91dc86b763431433ccab89366e68 100644 --- a/certgen/asn1certgen.xslt +++ b/certgen/asn1certgen.xslt @@ -1,830 +1,830 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 0 - 00110010 - 00110010 - 0 - 00001110 - 11000000 - 0 - 0 - - - - - - 11111110 - 0 - 0 - 0 - 11000000 - 0 - 0 - 0 - - - - - - - - - - - - - 00 00 00 - 0 - - - - - - - - - - - - - - - - - - - - - - - - - - 0 - - - - - - - - - level= confidence= - - - - - - - - - - - - - - - - - - - - - - - - - - - 2 - 2 - - - - - - - - - - - - - 01000000 - - - - - 11000000 - - - - - - - - - - - - - - - - - - - - 01 FF FC - 01 FF FF FF - 01 E0 - 01 C0 - 01 00 00 00 FF F8 - 02 FF FF E0 - 01 - 01 - 01 - 01 - - - 01 FE - 01 C0 - 01 00 - - - - - - - - - - - - - - - - - FF 00 03 - FF 00 00 00 - FF 1F - FF 3F - FF 00 00 00 00 07 - FF 00 00 1F - FF - FF - FF - FF - - - FF 01 - FF FF - 01 FF - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - -
- -
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - @local - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - A - B - C - D - E - F - A - - - - - - -
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + 3 + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + 0 + 00110010 + 00110010 + 0 + 00001110 + 11000000 + 0 + 0 + + + + + + 11111110 + 0 + 0 + 0 + 11000000 + 0 + 0 + 0 + + + + + + + + + + + + + 00 00 00 + 0 + + + + + + + + + + + + + + + + + + + + + + + + + + 0 + + + + + + + + + level= confidence= + + + + + + + + + + + + + + + + + + + + + + + + + + + 2 + 2 + + + + + + + + + + + + + 01000000 + + + + + 11000000 + + + + + + + + + + + + + + + + + + + + 01 FF FC + 01 FF FF FF + 01 E0 + 01 C0 + 01 00 00 00 FF F8 + 02 FF FF E0 + 01 + 01 + 01 + 01 + + + 01 FE + 01 C0 + 01 00 + + + + + + + + + + + + + + + + + FF 00 03 + FF 00 00 00 + FF 1F + FF 3F + FF 00 00 00 00 07 + FF 00 00 1F + FF + FF + FF + FF + + + FF 01 + FF FF + 01 FF + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
+ + + + + + + + + + + + + + +
+ +
+
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @local + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + A + B + C + D + E + F + A + + + + + + +
diff --git a/certgen/asncodec/ANY.c b/certgen/asncodec/ANY.c index bf988dbda05981bf344587f614e079516f84cc6a..ee21889abc3d09b36fec61a0e1c5669207112c57 100644 --- a/certgen/asncodec/ANY.c +++ b/certgen/asncodec/ANY.c @@ -1,80 +1,80 @@ -/* - * Copyright (c) 2004-2017 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include - -asn_OCTET_STRING_specifics_t asn_SPC_ANY_specs = { - sizeof(ANY_t), - offsetof(ANY_t, _asn_ctx), - ASN_OSUBV_ANY -}; -asn_TYPE_operation_t asn_OP_ANY = { - OCTET_STRING_free, -#if !defined(ASN_DISABLE_PRINT_SUPPORT) - OCTET_STRING_print, -#else - 0, -#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ - OCTET_STRING_compare, -#if !defined(ASN_DISABLE_BER_SUPPORT) - OCTET_STRING_decode_ber, - OCTET_STRING_encode_der, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ -#if !defined(ASN_DISABLE_XER_SUPPORT) - OCTET_STRING_decode_xer_hex, - ANY_encode_xer, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ -#if !defined(ASN_DISABLE_JER_SUPPORT) - ANY_encode_jer, -#else - 0, -#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ -#if !defined(ASN_DISABLE_OER_SUPPORT) - 0, - 0, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ -#if !defined(ASN_DISABLE_UPER_SUPPORT) - ANY_decode_uper, - ANY_encode_uper, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ -#if !defined(ASN_DISABLE_APER_SUPPORT) - ANY_decode_aper, - ANY_encode_aper, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ - 0, /* Random fill is not defined for ANY type */ - 0 /* Use generic outmost tag fetcher */ -}; -asn_TYPE_descriptor_t asn_DEF_ANY = { - "ANY", - "ANY", - &asn_OP_ANY, - 0, 0, 0, 0, - { -#if !defined(ASN_DISABLE_OER_SUPPORT) - 0, -#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ -#if !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) - 0, -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) */ - asn_generic_no_constraint - }, /* No constraints */ - 0, 0, /* No members */ - &asn_SPC_ANY_specs, -}; +/* + * Copyright (c) 2004-2017 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include + +asn_OCTET_STRING_specifics_t asn_SPC_ANY_specs = { + sizeof(ANY_t), + offsetof(ANY_t, _asn_ctx), + ASN_OSUBV_ANY +}; +asn_TYPE_operation_t asn_OP_ANY = { + OCTET_STRING_free, +#if !defined(ASN_DISABLE_PRINT_SUPPORT) + OCTET_STRING_print, +#else + 0, +#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ + OCTET_STRING_compare, +#if !defined(ASN_DISABLE_BER_SUPPORT) + OCTET_STRING_decode_ber, + OCTET_STRING_encode_der, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ +#if !defined(ASN_DISABLE_XER_SUPPORT) + OCTET_STRING_decode_xer_hex, + ANY_encode_xer, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ +#if !defined(ASN_DISABLE_JER_SUPPORT) + ANY_encode_jer, +#else + 0, +#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ +#if !defined(ASN_DISABLE_OER_SUPPORT) + 0, + 0, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ +#if !defined(ASN_DISABLE_UPER_SUPPORT) + ANY_decode_uper, + ANY_encode_uper, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ +#if !defined(ASN_DISABLE_APER_SUPPORT) + ANY_decode_aper, + ANY_encode_aper, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ + 0, /* Random fill is not defined for ANY type */ + 0 /* Use generic outmost tag fetcher */ +}; +asn_TYPE_descriptor_t asn_DEF_ANY = { + "ANY", + "ANY", + &asn_OP_ANY, + 0, 0, 0, 0, + { +#if !defined(ASN_DISABLE_OER_SUPPORT) + 0, +#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ +#if !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) + 0, +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) */ + asn_generic_no_constraint + }, /* No constraints */ + 0, 0, /* No members */ + &asn_SPC_ANY_specs, +}; diff --git a/certgen/asncodec/ANY.h b/certgen/asncodec/ANY.h index 871ed5ed393585c1d2f816c0341044f789f36897..af936cf82f84162e0e28c8ef2a16a00047662701 100644 --- a/certgen/asncodec/ANY.h +++ b/certgen/asncodec/ANY.h @@ -1,84 +1,84 @@ -/*- - * Copyright (c) 2004-2017 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#ifndef ASN_TYPE_ANY_H -#define ASN_TYPE_ANY_H - -#include /* Implemented via OCTET STRING type */ - -#ifdef __cplusplus -extern "C" { -#endif - -typedef struct ANY { - uint8_t *buf; /* BER-encoded ANY contents */ - int size; /* Size of the above buffer */ - - asn_struct_ctx_t _asn_ctx; /* Parsing across buffer boundaries */ -} ANY_t; - -extern asn_TYPE_descriptor_t asn_DEF_ANY; -extern asn_TYPE_operation_t asn_OP_ANY; -extern asn_OCTET_STRING_specifics_t asn_SPC_ANY_specs; - -#define ANY_free OCTET_STRING_free - -#if !defined(ASN_DISABLE_PRINT_SUPPORT) -#define ANY_print OCTET_STRING_print -#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ - -#define ANY_compare OCTET_STRING_compare - -#define ANY_constraint asn_generic_no_constraint - -#if !defined(ASN_DISABLE_BER_SUPPORT) -#define ANY_decode_ber OCTET_STRING_decode_ber -#define ANY_encode_der OCTET_STRING_encode_der -#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ - -#if !defined(ASN_DISABLE_XER_SUPPORT) -#define ANY_decode_xer OCTET_STRING_decode_xer_hex -xer_type_encoder_f ANY_encode_xer; -#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ - -#if !defined(ASN_DISABLE_JER_SUPPORT) -jer_type_encoder_f ANY_encode_jer; -#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ - -#if !defined(ASN_DISABLE_UPER_SUPPORT) -per_type_decoder_f ANY_decode_uper; -per_type_encoder_f ANY_encode_uper; -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ -#if !defined(ASN_DISABLE_APER_SUPPORT) -per_type_decoder_f ANY_decode_aper; -per_type_encoder_f ANY_encode_aper; -#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ - -/****************************** - * Handy conversion routines. * - ******************************/ - -/* Convert another ASN.1 type into the ANY. This implies DER encoding. */ -int ANY_fromType(ANY_t *, asn_TYPE_descriptor_t *td, void *struct_ptr); -ANY_t *ANY_new_fromType(asn_TYPE_descriptor_t *td, void *struct_ptr); -#if !defined(ASN_DISABLE_APER_SUPPORT) -int ANY_fromType_aper(ANY_t *st, asn_TYPE_descriptor_t *td, void *sptr); -ANY_t *ANY_new_fromType_aper(asn_TYPE_descriptor_t *td, void *sptr); -#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ - -/* Convert the contents of the ANY type into the specified type. */ -int ANY_to_type(ANY_t *, asn_TYPE_descriptor_t *td, void **struct_ptr); -#if !defined(ASN_DISABLE_APER_SUPPORT) -int ANY_to_type_aper(ANY_t *, asn_TYPE_descriptor_t *td, void **struct_ptr); -#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ - -#define ANY_fromBuf(s, buf, size) OCTET_STRING_fromBuf((s), (buf), (size)) -#define ANY_new_fromBuf(buf, size) OCTET_STRING_new_fromBuf( \ - &asn_DEF_ANY, (buf), (size)) - -#ifdef __cplusplus -} -#endif - -#endif /* ASN_TYPE_ANY_H */ +/*- + * Copyright (c) 2004-2017 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#ifndef ASN_TYPE_ANY_H +#define ASN_TYPE_ANY_H + +#include /* Implemented via OCTET STRING type */ + +#ifdef __cplusplus +extern "C" { +#endif + +typedef struct ANY { + uint8_t *buf; /* BER-encoded ANY contents */ + int size; /* Size of the above buffer */ + + asn_struct_ctx_t _asn_ctx; /* Parsing across buffer boundaries */ +} ANY_t; + +extern asn_TYPE_descriptor_t asn_DEF_ANY; +extern asn_TYPE_operation_t asn_OP_ANY; +extern asn_OCTET_STRING_specifics_t asn_SPC_ANY_specs; + +#define ANY_free OCTET_STRING_free + +#if !defined(ASN_DISABLE_PRINT_SUPPORT) +#define ANY_print OCTET_STRING_print +#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ + +#define ANY_compare OCTET_STRING_compare + +#define ANY_constraint asn_generic_no_constraint + +#if !defined(ASN_DISABLE_BER_SUPPORT) +#define ANY_decode_ber OCTET_STRING_decode_ber +#define ANY_encode_der OCTET_STRING_encode_der +#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ + +#if !defined(ASN_DISABLE_XER_SUPPORT) +#define ANY_decode_xer OCTET_STRING_decode_xer_hex +xer_type_encoder_f ANY_encode_xer; +#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ + +#if !defined(ASN_DISABLE_JER_SUPPORT) +jer_type_encoder_f ANY_encode_jer; +#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ + +#if !defined(ASN_DISABLE_UPER_SUPPORT) +per_type_decoder_f ANY_decode_uper; +per_type_encoder_f ANY_encode_uper; +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ +#if !defined(ASN_DISABLE_APER_SUPPORT) +per_type_decoder_f ANY_decode_aper; +per_type_encoder_f ANY_encode_aper; +#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ + +/****************************** + * Handy conversion routines. * + ******************************/ + +/* Convert another ASN.1 type into the ANY. This implies DER encoding. */ +int ANY_fromType(ANY_t *, asn_TYPE_descriptor_t *td, void *struct_ptr); +ANY_t *ANY_new_fromType(asn_TYPE_descriptor_t *td, void *struct_ptr); +#if !defined(ASN_DISABLE_APER_SUPPORT) +int ANY_fromType_aper(ANY_t *st, asn_TYPE_descriptor_t *td, void *sptr); +ANY_t *ANY_new_fromType_aper(asn_TYPE_descriptor_t *td, void *sptr); +#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ + +/* Convert the contents of the ANY type into the specified type. */ +int ANY_to_type(ANY_t *, asn_TYPE_descriptor_t *td, void **struct_ptr); +#if !defined(ASN_DISABLE_APER_SUPPORT) +int ANY_to_type_aper(ANY_t *, asn_TYPE_descriptor_t *td, void **struct_ptr); +#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ + +#define ANY_fromBuf(s, buf, size) OCTET_STRING_fromBuf((s), (buf), (size)) +#define ANY_new_fromBuf(buf, size) OCTET_STRING_new_fromBuf( \ + &asn_DEF_ANY, (buf), (size)) + +#ifdef __cplusplus +} +#endif + +#endif /* ASN_TYPE_ANY_H */ diff --git a/certgen/asncodec/ANY_xer.c b/certgen/asncodec/ANY_xer.c index 112c213287b13ba70fbb75214f29f6ec11f46c58..32998dccf62ab55a9595f5def2743a0c5fb1a67b 100644 --- a/certgen/asncodec/ANY_xer.c +++ b/certgen/asncodec/ANY_xer.c @@ -1,22 +1,22 @@ -/* - * Copyright (c) 2017 Lev Walkin . - * All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include - -asn_enc_rval_t -ANY_encode_xer(const asn_TYPE_descriptor_t *td, const void *sptr, int ilevel, - enum xer_encoder_flags_e flags, asn_app_consume_bytes_f *cb, - void *app_key) { - if(flags & XER_F_CANONICAL) { - /* - * Canonical XER-encoding of ANY type is not supported. - */ - ASN__ENCODE_FAILED; - } - - /* Dump as binary */ - return OCTET_STRING_encode_xer(td, sptr, ilevel, flags, cb, app_key); -} +/* + * Copyright (c) 2017 Lev Walkin . + * All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include + +asn_enc_rval_t +ANY_encode_xer(const asn_TYPE_descriptor_t *td, const void *sptr, int ilevel, + enum xer_encoder_flags_e flags, asn_app_consume_bytes_f *cb, + void *app_key) { + if(flags & XER_F_CANONICAL) { + /* + * Canonical XER-encoding of ANY type is not supported. + */ + ASN__ENCODE_FAILED; + } + + /* Dump as binary */ + return OCTET_STRING_encode_xer(td, sptr, ilevel, flags, cb, app_key); +} diff --git a/certgen/asncodec/AaEntry.c b/certgen/asncodec/AaEntry.c index df15bb647a6426376f8edaf83aecbd79ad56f0ce..0421a2cdc4944071839de4ff47bb21a21090f9d4 100644 --- a/certgen/asncodec/AaEntry.c +++ b/certgen/asncodec/AaEntry.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TrustLists" * found in "asn1/pki_ts102941/EtsiTs102941TrustLists.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "AaEntry.h" diff --git a/certgen/asncodec/AaEntry.h b/certgen/asncodec/AaEntry.h index f30344af85822053c0ba6f08994a1eb5ca920e48..f73ca4db6e9cd29fd7696e6c988806438decc6b0 100644 --- a/certgen/asncodec/AaEntry.h +++ b/certgen/asncodec/AaEntry.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TrustLists" * found in "asn1/pki_ts102941/EtsiTs102941TrustLists.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/AcaEeCertResponse.c b/certgen/asncodec/AcaEeCertResponse.c index b3585bd561e74e777829eb9a4ae94443dd69815f..1785bbc62c1e3ee7ca058dbe651c4a9b1093a9a1 100644 --- a/certgen/asncodec/AcaEeCertResponse.c +++ b/certgen/asncodec/AcaEeCertResponse.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1AcaEeInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1AcaEeInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "AcaEeCertResponse.h" diff --git a/certgen/asncodec/AcaEeCertResponse.h b/certgen/asncodec/AcaEeCertResponse.h index 532d0bad2a31153063c1cf26239f0a0b4436954a..1346a763dd01bb76626fb1a29a9fedadf0bf79e8 100644 --- a/certgen/asncodec/AcaEeCertResponse.h +++ b/certgen/asncodec/AcaEeCertResponse.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1AcaEeInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1AcaEeInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/AcaEeCertResponseCubkSpdu.c b/certgen/asncodec/AcaEeCertResponseCubkSpdu.c index 305efa8df2fbac44663bec5cacb80641e08707aa..3ffa7faebb30ca6654ed3fa22343d70cd86e4a04 100644 --- a/certgen/asncodec/AcaEeCertResponseCubkSpdu.c +++ b/certgen/asncodec/AcaEeCertResponseCubkSpdu.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "AcaEeCertResponseCubkSpdu.h" diff --git a/certgen/asncodec/AcaEeCertResponseCubkSpdu.h b/certgen/asncodec/AcaEeCertResponseCubkSpdu.h index b34b1292fe94f4eb245560f009c9edd880a7a025..13b544a01f56dc7b4b8d99b5aac6fc4062c2d1bf 100644 --- a/certgen/asncodec/AcaEeCertResponseCubkSpdu.h +++ b/certgen/asncodec/AcaEeCertResponseCubkSpdu.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/AcaEeCertResponsePlainSpdu.c b/certgen/asncodec/AcaEeCertResponsePlainSpdu.c index ba0cf2cec1841a9a768bffc68970059c0a58569c..ab924a5f1c6fd2953a1e88b6d736a9ca3db84056 100644 --- a/certgen/asncodec/AcaEeCertResponsePlainSpdu.c +++ b/certgen/asncodec/AcaEeCertResponsePlainSpdu.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "AcaEeCertResponsePlainSpdu.h" diff --git a/certgen/asncodec/AcaEeCertResponsePlainSpdu.h b/certgen/asncodec/AcaEeCertResponsePlainSpdu.h index 449abdf226596ed0e63a3c412d476c10aa40b121..c46ff31227a2ce596d9879fc78b4e7da3f63d4f9 100644 --- a/certgen/asncodec/AcaEeCertResponsePlainSpdu.h +++ b/certgen/asncodec/AcaEeCertResponsePlainSpdu.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/AcaEeCertResponsePrivateSpdu.c b/certgen/asncodec/AcaEeCertResponsePrivateSpdu.c index 8e63864b26851559f5fe19a1af6f397dd7808138..ddf52b2d4221a44ba2b2363d750e4eae087c16e5 100644 --- a/certgen/asncodec/AcaEeCertResponsePrivateSpdu.c +++ b/certgen/asncodec/AcaEeCertResponsePrivateSpdu.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "AcaEeCertResponsePrivateSpdu.h" diff --git a/certgen/asncodec/AcaEeCertResponsePrivateSpdu.h b/certgen/asncodec/AcaEeCertResponsePrivateSpdu.h index 0175c0c54439e2add98264840cf40f4bb8a165b1..ee987a1475bf007525a658355db8f6af8eae0207 100644 --- a/certgen/asncodec/AcaEeCertResponsePrivateSpdu.h +++ b/certgen/asncodec/AcaEeCertResponsePrivateSpdu.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/AcaEeInterfacePdu.c b/certgen/asncodec/AcaEeInterfacePdu.c index a5b07c4c6b470e21d221167b7affb336e5c043b1..4d4bba1852862ced2b98b80727e0ad63050c8918 100644 --- a/certgen/asncodec/AcaEeInterfacePdu.c +++ b/certgen/asncodec/AcaEeInterfacePdu.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1AcaEeInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1AcaEeInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "AcaEeInterfacePdu.h" diff --git a/certgen/asncodec/AcaEeInterfacePdu.h b/certgen/asncodec/AcaEeInterfacePdu.h index 2ebb133415173d6dc64eb4c652c88110a65189d5..9b73f9972a5053f0b7d793b3c9cb19a2dbd07ba0 100644 --- a/certgen/asncodec/AcaEeInterfacePdu.h +++ b/certgen/asncodec/AcaEeInterfacePdu.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1AcaEeInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1AcaEeInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/AcaLaInterfacePdu.c b/certgen/asncodec/AcaLaInterfacePdu.c index 9c9dbc9498639c591926c760f226a8683af499b1..b5a67e7bbf4d3c47784cd7e3d4dfe8bc8e2a1b49 100644 --- a/certgen/asncodec/AcaLaInterfacePdu.c +++ b/certgen/asncodec/AcaLaInterfacePdu.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1AcaLaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1AcaLaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "AcaLaInterfacePdu.h" diff --git a/certgen/asncodec/AcaLaInterfacePdu.h b/certgen/asncodec/AcaLaInterfacePdu.h index 703948d017823855aa4397b8697b633d3cd30f62..3956de1dad647e197cacf0349ad608ec114222bc 100644 --- a/certgen/asncodec/AcaLaInterfacePdu.h +++ b/certgen/asncodec/AcaLaInterfacePdu.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1AcaLaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1AcaLaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/AcaMaInterfacePdu.c b/certgen/asncodec/AcaMaInterfacePdu.c index 508ed960aa6603fdc7720abe974f295d3728be10..47d7620b251ecd145b61d9afc29c0e3b532ec4f5 100644 --- a/certgen/asncodec/AcaMaInterfacePdu.c +++ b/certgen/asncodec/AcaMaInterfacePdu.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1AcaMaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1AcaMaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "AcaMaInterfacePdu.h" diff --git a/certgen/asncodec/AcaMaInterfacePdu.h b/certgen/asncodec/AcaMaInterfacePdu.h index 0aba589dd26cfc4088ebdea6cad20a8abe9db797..0828265f4e2c4f3bc6c9e84b6885e73b010f41bd 100644 --- a/certgen/asncodec/AcaMaInterfacePdu.h +++ b/certgen/asncodec/AcaMaInterfacePdu.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1AcaMaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1AcaMaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/AcaRaCertResponse.c b/certgen/asncodec/AcaRaCertResponse.c index e4834a9283578054d8ae3a7114cb78302ccc330e..7d159f1a53140a8aaab8cfd8f013114c5de619c6 100644 --- a/certgen/asncodec/AcaRaCertResponse.c +++ b/certgen/asncodec/AcaRaCertResponse.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1AcaRaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1AcaRaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "AcaRaCertResponse.h" diff --git a/certgen/asncodec/AcaRaCertResponse.h b/certgen/asncodec/AcaRaCertResponse.h index fd3ff4c7d3f9fae7ccd21c0ceeef8c03cf3e4b0a..812f4fb57b0d6dddfe990117a0300b50c1ca3a07 100644 --- a/certgen/asncodec/AcaRaCertResponse.h +++ b/certgen/asncodec/AcaRaCertResponse.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1AcaRaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1AcaRaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/AcaRaCertResponseSpdu.c b/certgen/asncodec/AcaRaCertResponseSpdu.c index 2cf5ad720ee17855aa8b5993e1a5bc47b61dc7da..fb5a712ff856bda24e6a00f6c117261835fba90c 100644 --- a/certgen/asncodec/AcaRaCertResponseSpdu.c +++ b/certgen/asncodec/AcaRaCertResponseSpdu.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "AcaRaCertResponseSpdu.h" diff --git a/certgen/asncodec/AcaRaCertResponseSpdu.h b/certgen/asncodec/AcaRaCertResponseSpdu.h index 21e04e78d8da0154f2270a1a5d5b6d025cea1e6a..d1204d94821458da9c914a92bf66c6a5283f561f 100644 --- a/certgen/asncodec/AcaRaCertResponseSpdu.h +++ b/certgen/asncodec/AcaRaCertResponseSpdu.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/AcaRaInterfacePdu.c b/certgen/asncodec/AcaRaInterfacePdu.c index 25a70f14acb7d1c0b4f56fe7f41fa6a1369cb8d4..099d35c0c62d649fa84691798c4a3bfa78311ffe 100644 --- a/certgen/asncodec/AcaRaInterfacePdu.c +++ b/certgen/asncodec/AcaRaInterfacePdu.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1AcaRaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1AcaRaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "AcaRaInterfacePdu.h" diff --git a/certgen/asncodec/AcaRaInterfacePdu.h b/certgen/asncodec/AcaRaInterfacePdu.h index b078de2376c5cbba73954be788512c2f3d72ba34..ebffd27c2d296b76b8214e42f4078408c2661fd7 100644 --- a/certgen/asncodec/AcaRaInterfacePdu.h +++ b/certgen/asncodec/AcaRaInterfacePdu.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1AcaRaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1AcaRaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/AcaResponse.c b/certgen/asncodec/AcaResponse.c index 3ea14b7694af9afb2d1c569a3a4333e5366594dd..ddc9f89ce50b9c29bbf36a6b631d6a13ba31135e 100644 --- a/certgen/asncodec/AcaResponse.c +++ b/certgen/asncodec/AcaResponse.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1AcaRaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1AcaRaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "AcaResponse.h" diff --git a/certgen/asncodec/AcaResponse.h b/certgen/asncodec/AcaResponse.h index 73af31dcd4e6415376dde0c0aee9d049f153fbf3..cf95f5a95a02d3f82348e8ecc889f588a21d6f35 100644 --- a/certgen/asncodec/AcaResponse.h +++ b/certgen/asncodec/AcaResponse.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1AcaRaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1AcaRaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/AcaSsp.c b/certgen/asncodec/AcaSsp.c index 7e85f0d6715ab95b4be8af20205c955bf3570f90..a18b0166008d0e93be03cce1c7aaa0963ebc5ce5 100644 --- a/certgen/asncodec/AcaSsp.c +++ b/certgen/asncodec/AcaSsp.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "AcaSsp.h" diff --git a/certgen/asncodec/AcaSsp.h b/certgen/asncodec/AcaSsp.h index b5620c8941a986a6e215d46b480fa8db7435019c..56dedde496c3947655f495379270c5bb5de4b34b 100644 --- a/certgen/asncodec/AcaSsp.h +++ b/certgen/asncodec/AcaSsp.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/AcpcNodeValue.c b/certgen/asncodec/AcpcNodeValue.c index d33e2eddcc5fb810ca17f0f974faa6155ef0cb95..5bd07468cffd6aa99c170c8c762ef27d943ddf9b 100644 --- a/certgen/asncodec/AcpcNodeValue.c +++ b/certgen/asncodec/AcpcNodeValue.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Acpc" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Acpc.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "AcpcNodeValue.h" diff --git a/certgen/asncodec/AcpcNodeValue.h b/certgen/asncodec/AcpcNodeValue.h index 9294d9f9707f6aadac7eb5eb3f61f1ac9e459c03..0d6223d30bc368f5ef038ab32df9bbdb0cc8cff9 100644 --- a/certgen/asncodec/AcpcNodeValue.h +++ b/certgen/asncodec/AcpcNodeValue.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Acpc" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Acpc.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/AcpcPdu.c b/certgen/asncodec/AcpcPdu.c index 66833011687eb26d5dfe88b83a6a9c752d207157..4f8591021eaf515c9ac9a33631f7ae599cc14d07 100644 --- a/certgen/asncodec/AcpcPdu.c +++ b/certgen/asncodec/AcpcPdu.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Acpc" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Acpc.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "AcpcPdu.h" diff --git a/certgen/asncodec/AcpcPdu.h b/certgen/asncodec/AcpcPdu.h index 883d6da2ba1ed70e3069500cfe8da37f9ff70650..af20db10ceb054befb4078012d728372283232bf 100644 --- a/certgen/asncodec/AcpcPdu.h +++ b/certgen/asncodec/AcpcPdu.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Acpc" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Acpc.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/AcpcPsid.c b/certgen/asncodec/AcpcPsid.c index f5572a56f197cfc96542a666464fe5bfa8ab9825..76950440fd1c0649f69501eb99950dc0d13228da 100644 --- a/certgen/asncodec/AcpcPsid.c +++ b/certgen/asncodec/AcpcPsid.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Acpc" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Acpc.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "AcpcPsid.h" diff --git a/certgen/asncodec/AcpcPsid.h b/certgen/asncodec/AcpcPsid.h index de2c28b9127683b5ca77f697ac4aade532af62a0..8eeadf6b4119e3cffbe0c6720069befabe2a68a5 100644 --- a/certgen/asncodec/AcpcPsid.h +++ b/certgen/asncodec/AcpcPsid.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Acpc" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Acpc.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/AcpcSsp.c b/certgen/asncodec/AcpcSsp.c index 75d5b8a80a57277435995c1a687135d1ac0e1f77..8f70cf8e67726fc1ac011a8c4af5bc51084e1540 100644 --- a/certgen/asncodec/AcpcSsp.c +++ b/certgen/asncodec/AcpcSsp.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "AcpcSsp.h" diff --git a/certgen/asncodec/AcpcSsp.h b/certgen/asncodec/AcpcSsp.h index 966d32981eeca7c3229c9a38a80e3edef5d4e300..02fcea4775512b118f76e68a364ac0ed669a6599 100644 --- a/certgen/asncodec/AcpcSsp.h +++ b/certgen/asncodec/AcpcSsp.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/AcpcTreeId.c b/certgen/asncodec/AcpcTreeId.c index 203b0cb3da1d349c6a1c89823768f605aca474b1..6ff6a4920e4cffb3cb4f493d663f50ae602f0f98 100644 --- a/certgen/asncodec/AcpcTreeId.c +++ b/certgen/asncodec/AcpcTreeId.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Acpc" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Acpc.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "AcpcTreeId.h" diff --git a/certgen/asncodec/AcpcTreeId.h b/certgen/asncodec/AcpcTreeId.h index f75429beb07981fc83a9c5bb0f6ba4e6937d51ef..79c276d976afdab4abf3d6ed01980852514f7959 100644 --- a/certgen/asncodec/AcpcTreeId.h +++ b/certgen/asncodec/AcpcTreeId.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Acpc" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Acpc.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/AdditionalParams.c b/certgen/asncodec/AdditionalParams.c index 31cb215b898fa104a9d607a96396bd37aef9a897..5808f98b9baa4d88472e31cb0be8eb12d055c64b 100644 --- a/certgen/asncodec/AdditionalParams.c +++ b/certgen/asncodec/AdditionalParams.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1EeRaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1EeRaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "AdditionalParams.h" diff --git a/certgen/asncodec/AdditionalParams.h b/certgen/asncodec/AdditionalParams.h index f31f1036ce7f7509586077ddb98580fa655c8270..02b1f73840ae0e006eb22bbaff61c92aa8cc3473 100644 --- a/certgen/asncodec/AdditionalParams.h +++ b/certgen/asncodec/AdditionalParams.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1EeRaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1EeRaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/Aes128CcmCiphertext.c b/certgen/asncodec/Aes128CcmCiphertext.c index c161304c6955487004ced7df28eb31aca09eee2d..9855b9c4dcc2ca71802d183b40bbd64018ad516b 100644 --- a/certgen/asncodec/Aes128CcmCiphertext.c +++ b/certgen/asncodec/Aes128CcmCiphertext.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "Aes128CcmCiphertext.h" diff --git a/certgen/asncodec/Aes128CcmCiphertext.h b/certgen/asncodec/Aes128CcmCiphertext.h index b49e9417464d3acae903bcb2808918560b34291e..ad3a583d94a657b6cf15a1a73609af55ed52a955 100644 --- a/certgen/asncodec/Aes128CcmCiphertext.h +++ b/certgen/asncodec/Aes128CcmCiphertext.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/AppExtension.c b/certgen/asncodec/AppExtension.c index 9ea862a8f4285b8b09f9746ea27927cbee85437f..62e83f3b488887c93fd90bbc7ba7da714fdf4139 100644 --- a/certgen/asncodec/AppExtension.c +++ b/certgen/asncodec/AppExtension.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "AppExtension.h" diff --git a/certgen/asncodec/AppExtension.h b/certgen/asncodec/AppExtension.h index b2991bc7509cff14eb75e177ba9d7e134c95518d..63aae302d879ff52f27ad9b34bd37c6c613f9899 100644 --- a/certgen/asncodec/AppExtension.h +++ b/certgen/asncodec/AppExtension.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/AprvBinaryTree.c b/certgen/asncodec/AprvBinaryTree.c index 205d4a0e3ad92873cf825f21fc8f885783a890bc..0e48240cdfcc6c9c503f8fe698358716f6c861ae 100644 --- a/certgen/asncodec/AprvBinaryTree.c +++ b/certgen/asncodec/AprvBinaryTree.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Acpc" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Acpc.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "AprvBinaryTree.h" diff --git a/certgen/asncodec/AprvBinaryTree.h b/certgen/asncodec/AprvBinaryTree.h index 48919dcbb49e2fdebd548d084114fb4bdff48a1c..ba86c7b37483ecca2260311586e3cb8e48a4b61a 100644 --- a/certgen/asncodec/AprvBinaryTree.h +++ b/certgen/asncodec/AprvBinaryTree.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Acpc" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Acpc.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/AprvHashCalculationInput.c b/certgen/asncodec/AprvHashCalculationInput.c index a8dbd6161ef8aa38de94f568b9c86b99d3373594..709a3b73a128abc30def703d99d1d9728c7f6e01 100644 --- a/certgen/asncodec/AprvHashCalculationInput.c +++ b/certgen/asncodec/AprvHashCalculationInput.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Acpc" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Acpc.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "AprvHashCalculationInput.h" diff --git a/certgen/asncodec/AprvHashCalculationInput.h b/certgen/asncodec/AprvHashCalculationInput.h index 5f4fd31974afc00d1bf492a4f66f15b3747a8db9..3a48b8075cd6cbb0b45e741dc865e8798b04ff04 100644 --- a/certgen/asncodec/AprvHashCalculationInput.h +++ b/certgen/asncodec/AprvHashCalculationInput.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Acpc" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Acpc.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/AuthorizationRequestMessage.c b/certgen/asncodec/AuthorizationRequestMessage.c index 8b2abbd0c74bb8c1b68bf41692d4a8f3a959c324..42bc3bfb0edfb83e9ef088e3dbdf3d497d5f1bb9 100644 --- a/certgen/asncodec/AuthorizationRequestMessage.c +++ b/certgen/asncodec/AuthorizationRequestMessage.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941MessagesCa" - * found in "asn1/pki_ts102941/EtsiTs102941MessagesCA.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/pki_ts102941/EtsiTs102941MessagesCa.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "AuthorizationRequestMessage.h" diff --git a/certgen/asncodec/AuthorizationRequestMessage.h b/certgen/asncodec/AuthorizationRequestMessage.h index da4769fcbdc90ef1697352959840254b56c0fd3b..1b3fd0c59b70696d2651dcfd4d07458bae32f18a 100644 --- a/certgen/asncodec/AuthorizationRequestMessage.h +++ b/certgen/asncodec/AuthorizationRequestMessage.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941MessagesCa" - * found in "asn1/pki_ts102941/EtsiTs102941MessagesCA.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/pki_ts102941/EtsiTs102941MessagesCa.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/AuthorizationRequestMessageWithPop.c b/certgen/asncodec/AuthorizationRequestMessageWithPop.c index ebcdc1122b69add9d36f7c85f1996e4d2ca5d097..d5f06a17ac056757ceab8cdf80852be1f0b150b0 100644 --- a/certgen/asncodec/AuthorizationRequestMessageWithPop.c +++ b/certgen/asncodec/AuthorizationRequestMessageWithPop.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941MessagesCa" - * found in "asn1/pki_ts102941/EtsiTs102941MessagesCA.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/pki_ts102941/EtsiTs102941MessagesCa.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "AuthorizationRequestMessageWithPop.h" diff --git a/certgen/asncodec/AuthorizationRequestMessageWithPop.h b/certgen/asncodec/AuthorizationRequestMessageWithPop.h index 16a2d7cff878552330fe893e1ba729a043633d23..9e86ec8c81a3f9785b97d34d11919d0a4a63836f 100644 --- a/certgen/asncodec/AuthorizationRequestMessageWithPop.h +++ b/certgen/asncodec/AuthorizationRequestMessageWithPop.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941MessagesCa" - * found in "asn1/pki_ts102941/EtsiTs102941MessagesCA.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/pki_ts102941/EtsiTs102941MessagesCa.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/AuthorizationResponseCode.c b/certgen/asncodec/AuthorizationResponseCode.c index 016912948854062528e47d5aac00d06f26347b5a..07140dd5d7f3380572f48885d4e9c5c45f4d2c92 100644 --- a/certgen/asncodec/AuthorizationResponseCode.c +++ b/certgen/asncodec/AuthorizationResponseCode.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TypesAuthorization" * found in "asn1/pki_ts102941/EtsiTs102941TypesAuthorization.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "AuthorizationResponseCode.h" diff --git a/certgen/asncodec/AuthorizationResponseCode.h b/certgen/asncodec/AuthorizationResponseCode.h index 1df76899d691e2cd118619d51e245534f84cd5ef..b206ede3feffc1e6f6cffca9909fcc60eec65403 100644 --- a/certgen/asncodec/AuthorizationResponseCode.h +++ b/certgen/asncodec/AuthorizationResponseCode.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TypesAuthorization" * found in "asn1/pki_ts102941/EtsiTs102941TypesAuthorization.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/AuthorizationResponseMessage.c b/certgen/asncodec/AuthorizationResponseMessage.c index 2802ec108b7c16091f82cfb264a6800e0827dce2..670c654cf4abc53d1913926881c8348ec4e7e96c 100644 --- a/certgen/asncodec/AuthorizationResponseMessage.c +++ b/certgen/asncodec/AuthorizationResponseMessage.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941MessagesCa" - * found in "asn1/pki_ts102941/EtsiTs102941MessagesCA.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/pki_ts102941/EtsiTs102941MessagesCa.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "AuthorizationResponseMessage.h" diff --git a/certgen/asncodec/AuthorizationResponseMessage.h b/certgen/asncodec/AuthorizationResponseMessage.h index 748efe0ed2725d432ccac6843815cff577046891..43cfe366f893ad5b5713eb5a6a9e3b0ea513cc5c 100644 --- a/certgen/asncodec/AuthorizationResponseMessage.h +++ b/certgen/asncodec/AuthorizationResponseMessage.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941MessagesCa" - * found in "asn1/pki_ts102941/EtsiTs102941MessagesCA.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/pki_ts102941/EtsiTs102941MessagesCa.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/AuthorizationValidationRequest.c b/certgen/asncodec/AuthorizationValidationRequest.c index ebde641a86fe7bbb45d9ee2b8940473af4a78b65..703a4eaa99c1a0a5172daaaf20251a39c9070ea3 100644 --- a/certgen/asncodec/AuthorizationValidationRequest.c +++ b/certgen/asncodec/AuthorizationValidationRequest.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TypesAuthorizationValidation" * found in "asn1/pki_ts102941/EtsiTs102941TypesAuthorizationValidation.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "AuthorizationValidationRequest.h" diff --git a/certgen/asncodec/AuthorizationValidationRequest.h b/certgen/asncodec/AuthorizationValidationRequest.h index 7bd77eca1c279f3cb5de236a7c842b537f62e1ce..8de44f680729b386abedb05bf374262663d17540 100644 --- a/certgen/asncodec/AuthorizationValidationRequest.h +++ b/certgen/asncodec/AuthorizationValidationRequest.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TypesAuthorizationValidation" * found in "asn1/pki_ts102941/EtsiTs102941TypesAuthorizationValidation.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/AuthorizationValidationRequestMessage.c b/certgen/asncodec/AuthorizationValidationRequestMessage.c index d398ffb3a3680ed19977e6b883512ab073a2eba5..894b0eb4d0de1e45c81b82270e40ac9e64474dda 100644 --- a/certgen/asncodec/AuthorizationValidationRequestMessage.c +++ b/certgen/asncodec/AuthorizationValidationRequestMessage.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941MessagesCa" - * found in "asn1/pki_ts102941/EtsiTs102941MessagesCA.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/pki_ts102941/EtsiTs102941MessagesCa.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "AuthorizationValidationRequestMessage.h" diff --git a/certgen/asncodec/AuthorizationValidationRequestMessage.h b/certgen/asncodec/AuthorizationValidationRequestMessage.h index 531213bf3f96517c792d593594f2ac7c9a5b4446..a30141121d28843954943deaad578c676d01db69 100644 --- a/certgen/asncodec/AuthorizationValidationRequestMessage.h +++ b/certgen/asncodec/AuthorizationValidationRequestMessage.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941MessagesCa" - * found in "asn1/pki_ts102941/EtsiTs102941MessagesCA.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/pki_ts102941/EtsiTs102941MessagesCa.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/AuthorizationValidationResponse.c b/certgen/asncodec/AuthorizationValidationResponse.c index a1eb9851d9e0edd5c82f66a44662b82910580ca9..8daf187d9898b932bc658005c068b8f29b29898f 100644 --- a/certgen/asncodec/AuthorizationValidationResponse.c +++ b/certgen/asncodec/AuthorizationValidationResponse.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TypesAuthorizationValidation" * found in "asn1/pki_ts102941/EtsiTs102941TypesAuthorizationValidation.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "AuthorizationValidationResponse.h" diff --git a/certgen/asncodec/AuthorizationValidationResponse.h b/certgen/asncodec/AuthorizationValidationResponse.h index 7c491034e5ec20d2601e403269a86cd6fd075d85..58b52d5897f6c29966ec94fe7a63097aa710ccb4 100644 --- a/certgen/asncodec/AuthorizationValidationResponse.h +++ b/certgen/asncodec/AuthorizationValidationResponse.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TypesAuthorizationValidation" * found in "asn1/pki_ts102941/EtsiTs102941TypesAuthorizationValidation.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/AuthorizationValidationResponseCode.c b/certgen/asncodec/AuthorizationValidationResponseCode.c index 61dbf411ec428e3a26d6036adad25a892ffbf2bf..a7f1f9ece2207199bed7dc4f495e550a776f86c3 100644 --- a/certgen/asncodec/AuthorizationValidationResponseCode.c +++ b/certgen/asncodec/AuthorizationValidationResponseCode.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TypesAuthorizationValidation" * found in "asn1/pki_ts102941/EtsiTs102941TypesAuthorizationValidation.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "AuthorizationValidationResponseCode.h" diff --git a/certgen/asncodec/AuthorizationValidationResponseCode.h b/certgen/asncodec/AuthorizationValidationResponseCode.h index b122f92140671363b71a87c55a765dbae2ba37ec..1cca00490aa3861a29b399e9cb7eb5409681f088 100644 --- a/certgen/asncodec/AuthorizationValidationResponseCode.h +++ b/certgen/asncodec/AuthorizationValidationResponseCode.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TypesAuthorizationValidation" * found in "asn1/pki_ts102941/EtsiTs102941TypesAuthorizationValidation.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/AuthorizationValidationResponseMessage.c b/certgen/asncodec/AuthorizationValidationResponseMessage.c index 8361495f70be28ef0d64464a6a8a329c0167a5fe..ddb862e403736e0c3c51152bf7e8a3349d091781 100644 --- a/certgen/asncodec/AuthorizationValidationResponseMessage.c +++ b/certgen/asncodec/AuthorizationValidationResponseMessage.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941MessagesCa" - * found in "asn1/pki_ts102941/EtsiTs102941MessagesCA.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/pki_ts102941/EtsiTs102941MessagesCa.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "AuthorizationValidationResponseMessage.h" diff --git a/certgen/asncodec/AuthorizationValidationResponseMessage.h b/certgen/asncodec/AuthorizationValidationResponseMessage.h index 1038744db7d7ba2170530c42eef40b82d5d14290..109cffa5633ac61b5aec0e550ff74abfd0329a3a 100644 --- a/certgen/asncodec/AuthorizationValidationResponseMessage.h +++ b/certgen/asncodec/AuthorizationValidationResponseMessage.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941MessagesCa" - * found in "asn1/pki_ts102941/EtsiTs102941MessagesCA.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/pki_ts102941/EtsiTs102941MessagesCa.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/BIT_STRING.c b/certgen/asncodec/BIT_STRING.c index b5ba94017ca31ac9cf6ee29a4388a029bf9bf5ae..2f68991459d16b5b604a0497960763743bae28f8 100644 --- a/certgen/asncodec/BIT_STRING.c +++ b/certgen/asncodec/BIT_STRING.c @@ -1,213 +1,213 @@ -/*- - * Copyright (c) 2003, 2004 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include - -/* - * BIT STRING basic type description. - */ -static const ber_tlv_tag_t asn_DEF_BIT_STRING_tags[] = { - (ASN_TAG_CLASS_UNIVERSAL | (3 << 2)) -}; -asn_OCTET_STRING_specifics_t asn_SPC_BIT_STRING_specs = { - sizeof(BIT_STRING_t), - offsetof(BIT_STRING_t, _asn_ctx), - ASN_OSUBV_BIT -}; -asn_TYPE_operation_t asn_OP_BIT_STRING = { - OCTET_STRING_free, /* Implemented in terms of OCTET STRING */ -#if !defined(ASN_DISABLE_PRINT_SUPPORT) - BIT_STRING_print, -#else - 0, -#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ - BIT_STRING_compare, -#if !defined(ASN_DISABLE_BER_SUPPORT) - OCTET_STRING_decode_ber, /* Implemented in terms of OCTET STRING */ - OCTET_STRING_encode_der, /* Implemented in terms of OCTET STRING */ -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ -#if !defined(ASN_DISABLE_XER_SUPPORT) - OCTET_STRING_decode_xer_binary, - BIT_STRING_encode_xer, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ -#if !defined(ASN_DISABLE_JER_SUPPORT) - BIT_STRING_encode_jer, -#else - 0, -#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ -#if !defined(ASN_DISABLE_OER_SUPPORT) - BIT_STRING_decode_oer, - BIT_STRING_encode_oer, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ -#if !defined(ASN_DISABLE_UPER_SUPPORT) - BIT_STRING_decode_uper, /* Unaligned PER decoder */ - BIT_STRING_encode_uper, /* Unaligned PER encoder */ -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ -#if !defined(ASN_DISABLE_APER_SUPPORT) - OCTET_STRING_decode_aper, /* Aligned PER decoder */ - OCTET_STRING_encode_aper, /* Aligned PER encoder */ -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ -#if !defined(ASN_DISABLE_RFILL_SUPPORT) - BIT_STRING_random_fill, -#else - 0, -#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ - 0 /* Use generic outmost tag fetcher */ -}; -asn_TYPE_descriptor_t asn_DEF_BIT_STRING = { - "BIT STRING", - "BIT_STRING", - &asn_OP_BIT_STRING, - asn_DEF_BIT_STRING_tags, - sizeof(asn_DEF_BIT_STRING_tags) - / sizeof(asn_DEF_BIT_STRING_tags[0]), - asn_DEF_BIT_STRING_tags, /* Same as above */ - sizeof(asn_DEF_BIT_STRING_tags) - / sizeof(asn_DEF_BIT_STRING_tags[0]), - { -#if !defined(ASN_DISABLE_OER_SUPPORT) - 0, -#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ -#if !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) - 0, -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) */ - BIT_STRING_constraint - }, - 0, 0, /* No members */ - &asn_SPC_BIT_STRING_specs -}; - -/* - * BIT STRING generic constraint. - */ -int -BIT_STRING_constraint(const asn_TYPE_descriptor_t *td, const void *sptr, - asn_app_constraint_failed_f *ctfailcb, void *app_key) { - const BIT_STRING_t *st = (const BIT_STRING_t *)sptr; - - if(st && st->buf) { - if((st->size == 0 && st->bits_unused) - || st->bits_unused < 0 || st->bits_unused > 7) { - ASN__CTFAIL(app_key, td, sptr, - "%s: invalid padding byte (%s:%d)", - td->name, __FILE__, __LINE__); - return -1; - } - } else { - ASN__CTFAIL(app_key, td, sptr, - "%s: value not given (%s:%d)", - td->name, __FILE__, __LINE__); - return -1; - } - - return 0; -} - -/* - * Non-destructively remove the trailing 0-bits from the given bit string. - */ -const BIT_STRING_t * -BIT_STRING__compactify(const BIT_STRING_t *st, BIT_STRING_t *tmp) { - const uint8_t *b; - union { - const uint8_t *c_buf; - uint8_t *nc_buf; - } unconst; - - if(st->size == 0) { - assert(st->bits_unused == 0); - return st; - } else { - for(b = &st->buf[st->size - 1]; b > st->buf && *b == 0; b--) { - ; - } - /* b points to the last byte which may contain data */ - if(*b) { - int unused = 7; - uint8_t v = *b; - v &= -(int8_t)v; - if(v & 0x0F) unused -= 4; - if(v & 0x33) unused -= 2; - if(v & 0x55) unused -= 1; - tmp->size = b-st->buf + 1; - tmp->bits_unused = unused; - } else { - tmp->size = b-st->buf; - tmp->bits_unused = 0; - } - - assert(b >= st->buf); - } - - unconst.c_buf = st->buf; - tmp->buf = unconst.nc_buf; - return tmp; -} - -/* - * Lexicographically compare the common prefix of both strings, - * and if it is the same return -1 for the smallest string. - */ -int -BIT_STRING_compare(const asn_TYPE_descriptor_t *td, const void *aptr, - const void *bptr) { - /* - * Remove information about trailing bits, since - * X.680 (08/2015) #22.7 "ensure that different semantics are not" - * "associated with [values that differ only in] the trailing 0 bits." - */ - BIT_STRING_t compact_a, compact_b; - const BIT_STRING_t *a = BIT_STRING__compactify(aptr, &compact_a); - const BIT_STRING_t *b = BIT_STRING__compactify(bptr, &compact_b); - const asn_OCTET_STRING_specifics_t *specs = td->specifics; - - (void)specs; - assert(specs && specs->subvariant == ASN_OSUBV_BIT); - - if(a && b) { - size_t common_prefix_size = a->size <= b->size ? a->size : b->size; - int ret = memcmp(a->buf, b->buf, common_prefix_size); - if(ret == 0) { - /* Figure out which string with equal prefixes is longer. */ - if(a->size < b->size) { - return -1; - } else if(a->size > b->size) { - return 1; - } else { - /* Figure out how many unused bits */ - if(a->bits_unused > b->bits_unused) { - return -1; - } else if(a->bits_unused < b->bits_unused) { - return 1; - } else { - return 0; - } - } - } else { - return ret; - } - } else if(!a && !b) { - return 0; - } else if(!a) { - return -1; - } else { - return 1; - } -} +/*- + * Copyright (c) 2003, 2004 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include + +/* + * BIT STRING basic type description. + */ +static const ber_tlv_tag_t asn_DEF_BIT_STRING_tags[] = { + (ASN_TAG_CLASS_UNIVERSAL | (3 << 2)) +}; +asn_OCTET_STRING_specifics_t asn_SPC_BIT_STRING_specs = { + sizeof(BIT_STRING_t), + offsetof(BIT_STRING_t, _asn_ctx), + ASN_OSUBV_BIT +}; +asn_TYPE_operation_t asn_OP_BIT_STRING = { + OCTET_STRING_free, /* Implemented in terms of OCTET STRING */ +#if !defined(ASN_DISABLE_PRINT_SUPPORT) + BIT_STRING_print, +#else + 0, +#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ + BIT_STRING_compare, +#if !defined(ASN_DISABLE_BER_SUPPORT) + OCTET_STRING_decode_ber, /* Implemented in terms of OCTET STRING */ + OCTET_STRING_encode_der, /* Implemented in terms of OCTET STRING */ +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ +#if !defined(ASN_DISABLE_XER_SUPPORT) + OCTET_STRING_decode_xer_binary, + BIT_STRING_encode_xer, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ +#if !defined(ASN_DISABLE_JER_SUPPORT) + BIT_STRING_encode_jer, +#else + 0, +#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ +#if !defined(ASN_DISABLE_OER_SUPPORT) + BIT_STRING_decode_oer, + BIT_STRING_encode_oer, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ +#if !defined(ASN_DISABLE_UPER_SUPPORT) + BIT_STRING_decode_uper, /* Unaligned PER decoder */ + BIT_STRING_encode_uper, /* Unaligned PER encoder */ +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ +#if !defined(ASN_DISABLE_APER_SUPPORT) + OCTET_STRING_decode_aper, /* Aligned PER decoder */ + OCTET_STRING_encode_aper, /* Aligned PER encoder */ +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ +#if !defined(ASN_DISABLE_RFILL_SUPPORT) + BIT_STRING_random_fill, +#else + 0, +#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ + 0 /* Use generic outmost tag fetcher */ +}; +asn_TYPE_descriptor_t asn_DEF_BIT_STRING = { + "BIT STRING", + "BIT_STRING", + &asn_OP_BIT_STRING, + asn_DEF_BIT_STRING_tags, + sizeof(asn_DEF_BIT_STRING_tags) + / sizeof(asn_DEF_BIT_STRING_tags[0]), + asn_DEF_BIT_STRING_tags, /* Same as above */ + sizeof(asn_DEF_BIT_STRING_tags) + / sizeof(asn_DEF_BIT_STRING_tags[0]), + { +#if !defined(ASN_DISABLE_OER_SUPPORT) + 0, +#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ +#if !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) + 0, +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) */ + BIT_STRING_constraint + }, + 0, 0, /* No members */ + &asn_SPC_BIT_STRING_specs +}; + +/* + * BIT STRING generic constraint. + */ +int +BIT_STRING_constraint(const asn_TYPE_descriptor_t *td, const void *sptr, + asn_app_constraint_failed_f *ctfailcb, void *app_key) { + const BIT_STRING_t *st = (const BIT_STRING_t *)sptr; + + if(st && st->buf) { + if((st->size == 0 && st->bits_unused) + || st->bits_unused < 0 || st->bits_unused > 7) { + ASN__CTFAIL(app_key, td, sptr, + "%s: invalid padding byte (%s:%d)", + td->name, __FILE__, __LINE__); + return -1; + } + } else { + ASN__CTFAIL(app_key, td, sptr, + "%s: value not given (%s:%d)", + td->name, __FILE__, __LINE__); + return -1; + } + + return 0; +} + +/* + * Non-destructively remove the trailing 0-bits from the given bit string. + */ +const BIT_STRING_t * +BIT_STRING__compactify(const BIT_STRING_t *st, BIT_STRING_t *tmp) { + const uint8_t *b; + union { + const uint8_t *c_buf; + uint8_t *nc_buf; + } unconst; + + if(st->size == 0) { + assert(st->bits_unused == 0); + return st; + } else { + for(b = &st->buf[st->size - 1]; b > st->buf && *b == 0; b--) { + ; + } + /* b points to the last byte which may contain data */ + if(*b) { + int unused = 7; + uint8_t v = *b; + v &= -(int8_t)v; + if(v & 0x0F) unused -= 4; + if(v & 0x33) unused -= 2; + if(v & 0x55) unused -= 1; + tmp->size = b-st->buf + 1; + tmp->bits_unused = unused; + } else { + tmp->size = b-st->buf; + tmp->bits_unused = 0; + } + + assert(b >= st->buf); + } + + unconst.c_buf = st->buf; + tmp->buf = unconst.nc_buf; + return tmp; +} + +/* + * Lexicographically compare the common prefix of both strings, + * and if it is the same return -1 for the smallest string. + */ +int +BIT_STRING_compare(const asn_TYPE_descriptor_t *td, const void *aptr, + const void *bptr) { + /* + * Remove information about trailing bits, since + * X.680 (08/2015) #22.7 "ensure that different semantics are not" + * "associated with [values that differ only in] the trailing 0 bits." + */ + BIT_STRING_t compact_a, compact_b; + const BIT_STRING_t *a = BIT_STRING__compactify(aptr, &compact_a); + const BIT_STRING_t *b = BIT_STRING__compactify(bptr, &compact_b); + const asn_OCTET_STRING_specifics_t *specs = td->specifics; + + (void)specs; + assert(specs && specs->subvariant == ASN_OSUBV_BIT); + + if(a && b) { + size_t common_prefix_size = a->size <= b->size ? a->size : b->size; + int ret = memcmp(a->buf, b->buf, common_prefix_size); + if(ret == 0) { + /* Figure out which string with equal prefixes is longer. */ + if(a->size < b->size) { + return -1; + } else if(a->size > b->size) { + return 1; + } else { + /* Figure out how many unused bits */ + if(a->bits_unused > b->bits_unused) { + return -1; + } else if(a->bits_unused < b->bits_unused) { + return 1; + } else { + return 0; + } + } + } else { + return ret; + } + } else if(!a && !b) { + return 0; + } else if(!a) { + return -1; + } else { + return 1; + } +} diff --git a/certgen/asncodec/BIT_STRING.h b/certgen/asncodec/BIT_STRING.h index e755fe9f5c40c1743016d90af6715bd2c81fab51..b469041bd28f4cb19ccfc8ea6c25dec720b5e595 100644 --- a/certgen/asncodec/BIT_STRING.h +++ b/certgen/asncodec/BIT_STRING.h @@ -1,75 +1,75 @@ -/*- - * Copyright (c) 2003-2017 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#ifndef _BIT_STRING_H_ -#define _BIT_STRING_H_ - -#include /* Some help from OCTET STRING */ - -#ifdef __cplusplus -extern "C" { -#endif - -typedef struct BIT_STRING_s { - uint8_t *buf; /* BIT STRING body */ - size_t size; /* Size of the above buffer */ - - int bits_unused;/* Unused trailing bits in the last octet (0..7) */ - - asn_struct_ctx_t _asn_ctx; /* Parsing across buffer boundaries */ -} BIT_STRING_t; - -extern asn_TYPE_descriptor_t asn_DEF_BIT_STRING; -extern asn_TYPE_operation_t asn_OP_BIT_STRING; -extern asn_OCTET_STRING_specifics_t asn_SPC_BIT_STRING_specs; - -#define BIT_STRING_free OCTET_STRING_free - -#if !defined(ASN_DISABLE_PRINT_SUPPORT) -asn_struct_print_f BIT_STRING_print; /* Human-readable output */ -#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ - -asn_struct_compare_f BIT_STRING_compare; - -asn_constr_check_f BIT_STRING_constraint; - -#if !defined(ASN_DISABLE_BER_SUPPORT) -#define BIT_STRING_decode_ber OCTET_STRING_decode_ber -#define BIT_STRING_encode_der OCTET_STRING_encode_der -#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ - -#if !defined(ASN_DISABLE_XER_SUPPORT) -#define BIT_STRING_decode_xer OCTET_STRING_decode_xer_binary -xer_type_encoder_f BIT_STRING_encode_xer; -#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ - -#if !defined(ASN_DISABLE_JER_SUPPORT) -jer_type_encoder_f BIT_STRING_encode_jer; -#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ - -#if !defined(ASN_DISABLE_OER_SUPPORT) -oer_type_decoder_f BIT_STRING_decode_oer; -oer_type_encoder_f BIT_STRING_encode_oer; -#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ - -#if !defined(ASN_DISABLE_UPER_SUPPORT) -per_type_decoder_f BIT_STRING_decode_uper; -per_type_encoder_f BIT_STRING_encode_uper; -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ -#if !defined(ASN_DISABLE_APER_SUPPORT) -#define BIT_STRING_decode_aper OCTET_STRING_decode_aper -#define BIT_STRING_encode_aper OCTET_STRING_encode_aper -#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ - -#if !defined(ASN_DISABLE_RFILL_SUPPORT) -asn_random_fill_f BIT_STRING_random_fill; -#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ - -const BIT_STRING_t *BIT_STRING__compactify(const BIT_STRING_t *st, BIT_STRING_t *tmp); - -#ifdef __cplusplus -} -#endif - -#endif /* _BIT_STRING_H_ */ +/*- + * Copyright (c) 2003-2017 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#ifndef _BIT_STRING_H_ +#define _BIT_STRING_H_ + +#include /* Some help from OCTET STRING */ + +#ifdef __cplusplus +extern "C" { +#endif + +typedef struct BIT_STRING_s { + uint8_t *buf; /* BIT STRING body */ + size_t size; /* Size of the above buffer */ + + int bits_unused;/* Unused trailing bits in the last octet (0..7) */ + + asn_struct_ctx_t _asn_ctx; /* Parsing across buffer boundaries */ +} BIT_STRING_t; + +extern asn_TYPE_descriptor_t asn_DEF_BIT_STRING; +extern asn_TYPE_operation_t asn_OP_BIT_STRING; +extern asn_OCTET_STRING_specifics_t asn_SPC_BIT_STRING_specs; + +#define BIT_STRING_free OCTET_STRING_free + +#if !defined(ASN_DISABLE_PRINT_SUPPORT) +asn_struct_print_f BIT_STRING_print; /* Human-readable output */ +#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ + +asn_struct_compare_f BIT_STRING_compare; + +asn_constr_check_f BIT_STRING_constraint; + +#if !defined(ASN_DISABLE_BER_SUPPORT) +#define BIT_STRING_decode_ber OCTET_STRING_decode_ber +#define BIT_STRING_encode_der OCTET_STRING_encode_der +#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ + +#if !defined(ASN_DISABLE_XER_SUPPORT) +#define BIT_STRING_decode_xer OCTET_STRING_decode_xer_binary +xer_type_encoder_f BIT_STRING_encode_xer; +#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ + +#if !defined(ASN_DISABLE_JER_SUPPORT) +jer_type_encoder_f BIT_STRING_encode_jer; +#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ + +#if !defined(ASN_DISABLE_OER_SUPPORT) +oer_type_decoder_f BIT_STRING_decode_oer; +oer_type_encoder_f BIT_STRING_encode_oer; +#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ + +#if !defined(ASN_DISABLE_UPER_SUPPORT) +per_type_decoder_f BIT_STRING_decode_uper; +per_type_encoder_f BIT_STRING_encode_uper; +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ +#if !defined(ASN_DISABLE_APER_SUPPORT) +#define BIT_STRING_decode_aper OCTET_STRING_decode_aper +#define BIT_STRING_encode_aper OCTET_STRING_encode_aper +#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ + +#if !defined(ASN_DISABLE_RFILL_SUPPORT) +asn_random_fill_f BIT_STRING_random_fill; +#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ + +const BIT_STRING_t *BIT_STRING__compactify(const BIT_STRING_t *st, BIT_STRING_t *tmp); + +#ifdef __cplusplus +} +#endif + +#endif /* _BIT_STRING_H_ */ diff --git a/certgen/asncodec/BIT_STRING_oer.c b/certgen/asncodec/BIT_STRING_oer.c index 95c9558964645afa7cd80565c05bdfa5eae79fdd..a95e3dc9897068a8abc990f1fce64cffdebd6c5c 100644 --- a/certgen/asncodec/BIT_STRING_oer.c +++ b/certgen/asncodec/BIT_STRING_oer.c @@ -1,168 +1,168 @@ -/* - * Copyright (c) 2017 Lev Walkin . - * All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include - -asn_dec_rval_t -BIT_STRING_decode_oer(const asn_codec_ctx_t *opt_codec_ctx, - const asn_TYPE_descriptor_t *td, - const asn_oer_constraints_t *constraints, void **sptr, - const void *ptr, size_t size) { - BIT_STRING_t *st = (BIT_STRING_t *)*sptr; - const asn_oer_constraints_t *cts = - constraints ? constraints : td->encoding_constraints.oer_constraints; - ssize_t ct_size = cts ? cts->size : -1; - asn_dec_rval_t rval = {RC_OK, 0}; - size_t expected_length = 0; - - (void)opt_codec_ctx; - - if(!st) { - st = (BIT_STRING_t *)(*sptr = CALLOC(1, sizeof(*st))); - if(!st) ASN__DECODE_FAILED; - } - - if(ct_size >= 0) { - expected_length = (ct_size + 7) >> 3; - st->bits_unused = (8 - (ct_size & 7)) & 7; - } else { - /* - * X.696 (08/2015) #13.3.1 - * Encode length determinant as _number of octets_, but only - * if upper bound is not equal to lower bound. - */ - ssize_t len_len = oer_fetch_length(ptr, size, &expected_length); - if(len_len > 0) { - ptr = (const char *)ptr + len_len; - size -= len_len; - } else if(len_len == 0) { - ASN__DECODE_STARVED; - } else if(len_len < 0) { - ASN__DECODE_FAILED; - } - - if(expected_length < 1) { - ASN__DECODE_FAILED; - } else if(expected_length > size) { - ASN__DECODE_STARVED; - } - - st->bits_unused = ((const uint8_t *)ptr)[0]; - if(st->bits_unused & ~7) { - ASN_DEBUG("%s: unused bits outside of 0..7 range", td->name); - ASN__DECODE_FAILED; - } - ptr = (const char *)ptr + 1; - size--; - expected_length--; - rval.consumed = len_len + 1; - } - - if(size < expected_length) { - ASN__DECODE_STARVED; - } else { - uint8_t *buf = MALLOC(expected_length + 1); - if(buf == NULL) { - ASN__DECODE_FAILED; - } else { - memcpy(buf, ptr, expected_length); - buf[expected_length] = '\0'; - } - FREEMEM(st->buf); - st->buf = buf; - st->size = expected_length; - if(expected_length > 0) { - buf[expected_length - 1] &= (0xff << st->bits_unused); - } - - rval.consumed += expected_length; - return rval; - } -} - -/* - * Encode as Canonical OER. - */ -asn_enc_rval_t -BIT_STRING_encode_oer(const asn_TYPE_descriptor_t *td, - const asn_oer_constraints_t *constraints, - const void *sptr, asn_app_consume_bytes_f *cb, - void *app_key) { - const BIT_STRING_t *st = (const BIT_STRING_t *)sptr; - asn_enc_rval_t erval = {0, 0, 0}; - const asn_oer_constraints_t *cts = - constraints ? constraints : td->encoding_constraints.oer_constraints; - ssize_t ct_size = cts ? cts->size : -1; - size_t trailing_zeros = 0; - int fix_last_byte = 0; - - if(!st) ASN__ENCODE_FAILED; - - if(st->bits_unused & ~7) { - ASN_DEBUG("BIT STRING unused bits %d out of 0..7 range", - st->bits_unused); - ASN__ENCODE_FAILED; - } - if(st->bits_unused && !(st->size && st->buf)) { - ASN_DEBUG("BIT STRING %s size 0 can't support unused bits %d", td->name, - st->bits_unused); - ASN__ENCODE_FAILED; - } - - if(ct_size >= 0) { - size_t ct_bytes = (ct_size + 7) >> 3; - if(st->size > ct_bytes) { - ASN_DEBUG("More bits in BIT STRING %s (%" ASN_PRI_SSIZE ") than constrained %" ASN_PRI_SSIZE "", - td->name, 8 * st->size - st->bits_unused, ct_size); - ASN__ENCODE_FAILED; - } - trailing_zeros = ct_bytes - st->size; /* Allow larger constraint */ - } else { - uint8_t ub = st->bits_unused & 7; - ssize_t len_len = oer_serialize_length(1 + st->size, cb, app_key); - if(len_len < 0) ASN__ENCODE_FAILED; - if(cb(&ub, 1, app_key) < 0) { - ASN__ENCODE_FAILED; - } - erval.encoded += len_len + 1; - } - - if(st->bits_unused) { - if(st->buf[st->size - 1] & (0xff << st->bits_unused)) { - fix_last_byte = 1; - } - } - - if(cb(st->buf, st->size - fix_last_byte, app_key) < 0) { - ASN__ENCODE_FAILED; - } - - if(fix_last_byte) { - uint8_t b = st->buf[st->size - 1] & (0xff << st->bits_unused); - if(cb(&b, 1, app_key) < 0) { - ASN__ENCODE_FAILED; - } - } - - erval.encoded += st->size; - - if(trailing_zeros) { - static uint8_t zeros[16]; - while(trailing_zeros > 0) { - int ret; - if(trailing_zeros < sizeof(zeros)) { - ret = cb(zeros, trailing_zeros, app_key); - erval.encoded += trailing_zeros; - } else { - ret = cb(zeros, sizeof(zeros), app_key); - erval.encoded += sizeof(zeros); - } - if(ret < 0) ASN__ENCODE_FAILED; - } - } - - return erval; -} +/* + * Copyright (c) 2017 Lev Walkin . + * All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include + +asn_dec_rval_t +BIT_STRING_decode_oer(const asn_codec_ctx_t *opt_codec_ctx, + const asn_TYPE_descriptor_t *td, + const asn_oer_constraints_t *constraints, void **sptr, + const void *ptr, size_t size) { + BIT_STRING_t *st = (BIT_STRING_t *)*sptr; + const asn_oer_constraints_t *cts = + constraints ? constraints : td->encoding_constraints.oer_constraints; + ssize_t ct_size = cts ? cts->size : -1; + asn_dec_rval_t rval = {RC_OK, 0}; + size_t expected_length = 0; + + (void)opt_codec_ctx; + + if(!st) { + st = (BIT_STRING_t *)(*sptr = CALLOC(1, sizeof(*st))); + if(!st) ASN__DECODE_FAILED; + } + + if(ct_size >= 0) { + expected_length = (ct_size + 7) >> 3; + st->bits_unused = (8 - (ct_size & 7)) & 7; + } else { + /* + * X.696 (08/2015) #13.3.1 + * Encode length determinant as _number of octets_, but only + * if upper bound is not equal to lower bound. + */ + ssize_t len_len = oer_fetch_length(ptr, size, &expected_length); + if(len_len > 0) { + ptr = (const char *)ptr + len_len; + size -= len_len; + } else if(len_len == 0) { + ASN__DECODE_STARVED; + } else if(len_len < 0) { + ASN__DECODE_FAILED; + } + + if(expected_length < 1) { + ASN__DECODE_FAILED; + } else if(expected_length > size) { + ASN__DECODE_STARVED; + } + + st->bits_unused = ((const uint8_t *)ptr)[0]; + if(st->bits_unused & ~7) { + ASN_DEBUG("%s: unused bits outside of 0..7 range", td->name); + ASN__DECODE_FAILED; + } + ptr = (const char *)ptr + 1; + size--; + expected_length--; + rval.consumed = len_len + 1; + } + + if(size < expected_length) { + ASN__DECODE_STARVED; + } else { + uint8_t *buf = MALLOC(expected_length + 1); + if(buf == NULL) { + ASN__DECODE_FAILED; + } else { + memcpy(buf, ptr, expected_length); + buf[expected_length] = '\0'; + } + FREEMEM(st->buf); + st->buf = buf; + st->size = expected_length; + if(expected_length > 0) { + buf[expected_length - 1] &= (0xff << st->bits_unused); + } + + rval.consumed += expected_length; + return rval; + } +} + +/* + * Encode as Canonical OER. + */ +asn_enc_rval_t +BIT_STRING_encode_oer(const asn_TYPE_descriptor_t *td, + const asn_oer_constraints_t *constraints, + const void *sptr, asn_app_consume_bytes_f *cb, + void *app_key) { + const BIT_STRING_t *st = (const BIT_STRING_t *)sptr; + asn_enc_rval_t erval = {0, 0, 0}; + const asn_oer_constraints_t *cts = + constraints ? constraints : td->encoding_constraints.oer_constraints; + ssize_t ct_size = cts ? cts->size : -1; + size_t trailing_zeros = 0; + int fix_last_byte = 0; + + if(!st) ASN__ENCODE_FAILED; + + if(st->bits_unused & ~7) { + ASN_DEBUG("BIT STRING unused bits %d out of 0..7 range", + st->bits_unused); + ASN__ENCODE_FAILED; + } + if(st->bits_unused && !(st->size && st->buf)) { + ASN_DEBUG("BIT STRING %s size 0 can't support unused bits %d", td->name, + st->bits_unused); + ASN__ENCODE_FAILED; + } + + if(ct_size >= 0) { + size_t ct_bytes = (ct_size + 7) >> 3; + if(st->size > ct_bytes) { + ASN_DEBUG("More bits in BIT STRING %s (%" ASN_PRI_SSIZE ") than constrained %" ASN_PRI_SSIZE "", + td->name, 8 * st->size - st->bits_unused, ct_size); + ASN__ENCODE_FAILED; + } + trailing_zeros = ct_bytes - st->size; /* Allow larger constraint */ + } else { + uint8_t ub = st->bits_unused & 7; + ssize_t len_len = oer_serialize_length(1 + st->size, cb, app_key); + if(len_len < 0) ASN__ENCODE_FAILED; + if(cb(&ub, 1, app_key) < 0) { + ASN__ENCODE_FAILED; + } + erval.encoded += len_len + 1; + } + + if(st->bits_unused) { + if(st->buf[st->size - 1] & (0xff << st->bits_unused)) { + fix_last_byte = 1; + } + } + + if(cb(st->buf, st->size - fix_last_byte, app_key) < 0) { + ASN__ENCODE_FAILED; + } + + if(fix_last_byte) { + uint8_t b = st->buf[st->size - 1] & (0xff << st->bits_unused); + if(cb(&b, 1, app_key) < 0) { + ASN__ENCODE_FAILED; + } + } + + erval.encoded += st->size; + + if(trailing_zeros) { + static uint8_t zeros[16]; + while(trailing_zeros > 0) { + int ret; + if(trailing_zeros < sizeof(zeros)) { + ret = cb(zeros, trailing_zeros, app_key); + erval.encoded += trailing_zeros; + } else { + ret = cb(zeros, sizeof(zeros), app_key); + erval.encoded += sizeof(zeros); + } + if(ret < 0) ASN__ENCODE_FAILED; + } + } + + return erval; +} diff --git a/certgen/asncodec/BIT_STRING_print.c b/certgen/asncodec/BIT_STRING_print.c index bab1ea522f9c6b7490356174aa68c84930a1fd8e..3e819a3b003f5c5e7a2eff39dbf171a6df4e834d 100644 --- a/certgen/asncodec/BIT_STRING_print.c +++ b/certgen/asncodec/BIT_STRING_print.c @@ -1,69 +1,69 @@ -/* - * Copyright (c) 2017 Lev Walkin . - * All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include - -/* - * BIT STRING specific contents printer. - */ -int -BIT_STRING_print(const asn_TYPE_descriptor_t *td, const void *sptr, int ilevel, - asn_app_consume_bytes_f *cb, void *app_key) { - const char * const h2c = "0123456789ABCDEF"; - char scratch[64]; - const BIT_STRING_t *st = (const BIT_STRING_t *)sptr; - uint8_t *buf; - uint8_t *end; - char *p = scratch; - - (void)td; /* Unused argument */ - - if(!st || !st->buf) - return (cb("", 8, app_key) < 0) ? -1 : 0; - - ilevel++; - buf = st->buf; - end = buf + st->size; - - /* - * Hexadecimal dump. - */ - for(; buf < end; buf++) { - if((buf - st->buf) % 16 == 0 && (st->size > 16) - && buf != st->buf) { - _i_INDENT(1); - /* Dump the string */ - if(cb(scratch, p - scratch, app_key) < 0) return -1; - p = scratch; - } - *p++ = h2c[*buf >> 4]; - *p++ = h2c[*buf & 0x0F]; - *p++ = 0x20; - } - - if(p > scratch) { - p--; /* Eat the tailing space */ - - if((st->size > 16)) { - _i_INDENT(1); - } - - /* Dump the incomplete 16-bytes row */ - if(cb(scratch, p - scratch, app_key) < 0) - return -1; - } - - if(st->bits_unused) { - int ret = snprintf(scratch, sizeof(scratch), " (%d bit%s unused)", - st->bits_unused, st->bits_unused == 1 ? "" : "s"); - assert(ret > 0 && ret < (ssize_t)sizeof(scratch)); - if(ret > 0 && ret < (ssize_t)sizeof(scratch) - && cb(scratch, ret, app_key) < 0) - return -1; - } - - return 0; -} +/* + * Copyright (c) 2017 Lev Walkin . + * All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include + +/* + * BIT STRING specific contents printer. + */ +int +BIT_STRING_print(const asn_TYPE_descriptor_t *td, const void *sptr, int ilevel, + asn_app_consume_bytes_f *cb, void *app_key) { + const char * const h2c = "0123456789ABCDEF"; + char scratch[64]; + const BIT_STRING_t *st = (const BIT_STRING_t *)sptr; + uint8_t *buf; + uint8_t *end; + char *p = scratch; + + (void)td; /* Unused argument */ + + if(!st || !st->buf) + return (cb("", 8, app_key) < 0) ? -1 : 0; + + ilevel++; + buf = st->buf; + end = buf + st->size; + + /* + * Hexadecimal dump. + */ + for(; buf < end; buf++) { + if((buf - st->buf) % 16 == 0 && (st->size > 16) + && buf != st->buf) { + _i_INDENT(1); + /* Dump the string */ + if(cb(scratch, p - scratch, app_key) < 0) return -1; + p = scratch; + } + *p++ = h2c[*buf >> 4]; + *p++ = h2c[*buf & 0x0F]; + *p++ = 0x20; + } + + if(p > scratch) { + p--; /* Eat the tailing space */ + + if((st->size > 16)) { + _i_INDENT(1); + } + + /* Dump the incomplete 16-bytes row */ + if(cb(scratch, p - scratch, app_key) < 0) + return -1; + } + + if(st->bits_unused) { + int ret = snprintf(scratch, sizeof(scratch), " (%d bit%s unused)", + st->bits_unused, st->bits_unused == 1 ? "" : "s"); + assert(ret > 0 && ret < (ssize_t)sizeof(scratch)); + if(ret > 0 && ret < (ssize_t)sizeof(scratch) + && cb(scratch, ret, app_key) < 0) + return -1; + } + + return 0; +} diff --git a/certgen/asncodec/BIT_STRING_xer.c b/certgen/asncodec/BIT_STRING_xer.c index 67d5cb8db21b18d7afa4ded0b8d1369950bede7b..67b2f85d80c60e9e4af495c6e35ae3a6485f8eee 100644 --- a/certgen/asncodec/BIT_STRING_xer.c +++ b/certgen/asncodec/BIT_STRING_xer.c @@ -1,70 +1,70 @@ -/* - * Copyright (c) 2017 Lev Walkin . - * All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include - -static const char *_bit_pattern[16] = { - "0000", "0001", "0010", "0011", "0100", "0101", "0110", "0111", - "1000", "1001", "1010", "1011", "1100", "1101", "1110", "1111" -}; - -asn_enc_rval_t -BIT_STRING_encode_xer(const asn_TYPE_descriptor_t *td, const void *sptr, - int ilevel, enum xer_encoder_flags_e flags, - asn_app_consume_bytes_f *cb, void *app_key) { - asn_enc_rval_t er = {0, 0, 0}; - char scratch[128]; - char *p = scratch; - char *scend = scratch + (sizeof(scratch) - 10); - const BIT_STRING_t *st = (const BIT_STRING_t *)sptr; - int xcan = (flags & XER_F_CANONICAL); - uint8_t *buf; - uint8_t *end; - - if(!st || !st->buf) - ASN__ENCODE_FAILED; - - er.encoded = 0; - - buf = st->buf; - end = buf + st->size - 1; /* Last byte is special */ - - /* - * Binary dump - */ - for(; buf < end; buf++) { - int v = *buf; - int nline = xcan?0:(((buf - st->buf) % 8) == 0); - if(p >= scend || nline) { - ASN__CALLBACK(scratch, p - scratch); - p = scratch; - if(nline) ASN__TEXT_INDENT(1, ilevel); - } - memcpy(p + 0, _bit_pattern[v >> 4], 4); - memcpy(p + 4, _bit_pattern[v & 0x0f], 4); - p += 8; - } - - if(!xcan && ((buf - st->buf) % 8) == 0) - ASN__TEXT_INDENT(1, ilevel); - ASN__CALLBACK(scratch, p - scratch); - p = scratch; - - if(buf == end) { - int v = *buf; - int ubits = st->bits_unused; - int i; - for(i = 7; i >= ubits; i--) - *p++ = (v & (1 << i)) ? 0x31 : 0x30; - ASN__CALLBACK(scratch, p - scratch); - } - - if(!xcan) ASN__TEXT_INDENT(1, ilevel - 1); - - ASN__ENCODED_OK(er); -cb_failed: - ASN__ENCODE_FAILED; -} +/* + * Copyright (c) 2017 Lev Walkin . + * All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include + +static const char *_bit_pattern[16] = { + "0000", "0001", "0010", "0011", "0100", "0101", "0110", "0111", + "1000", "1001", "1010", "1011", "1100", "1101", "1110", "1111" +}; + +asn_enc_rval_t +BIT_STRING_encode_xer(const asn_TYPE_descriptor_t *td, const void *sptr, + int ilevel, enum xer_encoder_flags_e flags, + asn_app_consume_bytes_f *cb, void *app_key) { + asn_enc_rval_t er = {0, 0, 0}; + char scratch[128]; + char *p = scratch; + char *scend = scratch + (sizeof(scratch) - 10); + const BIT_STRING_t *st = (const BIT_STRING_t *)sptr; + int xcan = (flags & XER_F_CANONICAL); + uint8_t *buf; + uint8_t *end; + + if(!st || !st->buf) + ASN__ENCODE_FAILED; + + er.encoded = 0; + + buf = st->buf; + end = buf + st->size - 1; /* Last byte is special */ + + /* + * Binary dump + */ + for(; buf < end; buf++) { + int v = *buf; + int nline = xcan?0:(((buf - st->buf) % 8) == 0); + if(p >= scend || nline) { + ASN__CALLBACK(scratch, p - scratch); + p = scratch; + if(nline) ASN__TEXT_INDENT(1, ilevel); + } + memcpy(p + 0, _bit_pattern[v >> 4], 4); + memcpy(p + 4, _bit_pattern[v & 0x0f], 4); + p += 8; + } + + if(!xcan && ((buf - st->buf) % 8) == 0) + ASN__TEXT_INDENT(1, ilevel); + ASN__CALLBACK(scratch, p - scratch); + p = scratch; + + if(buf == end) { + int v = *buf; + int ubits = st->bits_unused; + int i; + for(i = 7; i >= ubits; i--) + *p++ = (v & (1 << i)) ? 0x31 : 0x30; + ASN__CALLBACK(scratch, p - scratch); + } + + if(!xcan) ASN__TEXT_INDENT(1, ilevel - 1); + + ASN__ENCODED_OK(er); +cb_failed: + ASN__ENCODE_FAILED; +} diff --git a/certgen/asncodec/BOOLEAN.c b/certgen/asncodec/BOOLEAN.c index 1373a6f15b218a18b2367accfd733ec121b2f1e6..f3939da18cecf468b71db7f53df1d2826404d000 100644 --- a/certgen/asncodec/BOOLEAN.c +++ b/certgen/asncodec/BOOLEAN.c @@ -1,128 +1,128 @@ -/*- - * Copyright (c) 2003, 2005 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include - -/* - * BOOLEAN basic type description. - */ -static const ber_tlv_tag_t asn_DEF_BOOLEAN_tags[] = { - (ASN_TAG_CLASS_UNIVERSAL | (1 << 2)) -}; -asn_TYPE_operation_t asn_OP_BOOLEAN = { - BOOLEAN_free, -#if !defined(ASN_DISABLE_PRINT_SUPPORT) - BOOLEAN_print, -#else - 0, -#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ - BOOLEAN_compare, -#if !defined(ASN_DISABLE_BER_SUPPORT) - BOOLEAN_decode_ber, - BOOLEAN_encode_der, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ -#if !defined(ASN_DISABLE_XER_SUPPORT) - BOOLEAN_decode_xer, - BOOLEAN_encode_xer, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ -#if !defined(ASN_DISABLE_JER_SUPPORT) - BOOLEAN_encode_jer, -#else - 0, -#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ -#if !defined(ASN_DISABLE_OER_SUPPORT) - BOOLEAN_decode_oer, - BOOLEAN_encode_oer, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ -#if !defined(ASN_DISABLE_UPER_SUPPORT) - BOOLEAN_decode_uper, /* Unaligned PER decoder */ - BOOLEAN_encode_uper, /* Unaligned PER encoder */ -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ -#if !defined(ASN_DISABLE_APER_SUPPORT) - BOOLEAN_decode_aper, /* Aligned PER decoder */ - BOOLEAN_encode_aper, /* Aligned PER encoder */ -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ -#if !defined(ASN_DISABLE_RFILL_SUPPORT) - BOOLEAN_random_fill, -#else - 0, -#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ - 0 /* Use generic outmost tag fetcher */ -}; -asn_TYPE_descriptor_t asn_DEF_BOOLEAN = { - "BOOLEAN", - "BOOLEAN", - &asn_OP_BOOLEAN, - asn_DEF_BOOLEAN_tags, - sizeof(asn_DEF_BOOLEAN_tags) / sizeof(asn_DEF_BOOLEAN_tags[0]), - asn_DEF_BOOLEAN_tags, /* Same as above */ - sizeof(asn_DEF_BOOLEAN_tags) / sizeof(asn_DEF_BOOLEAN_tags[0]), - { -#if !defined(ASN_DISABLE_OER_SUPPORT) - 0, -#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ -#if !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) - 0, -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) */ - asn_generic_no_constraint - }, - 0, 0, /* No members */ - 0 /* No specifics */ -}; - -void -BOOLEAN_free(const asn_TYPE_descriptor_t *td, void *ptr, - enum asn_struct_free_method method) { - if(td && ptr) { - switch(method) { - case ASFM_FREE_EVERYTHING: - FREEMEM(ptr); - break; - case ASFM_FREE_UNDERLYING: - break; - case ASFM_FREE_UNDERLYING_AND_RESET: - memset(ptr, 0, sizeof(BOOLEAN_t)); - break; - } - } -} - -int -BOOLEAN_compare(const asn_TYPE_descriptor_t *td, const void *aptr, - const void *bptr) { - const BOOLEAN_t *a = aptr; - const BOOLEAN_t *b = bptr; - - (void)td; - - if(a && b) { - if(!*a == !*b) { /* TRUE can be encoded by any non-zero byte. */ - return 0; - } else if(!*a) { - return -1; - } else { - return 1; - } - } else if(!a) { - return -1; - } else { - return 1; - } -} +/*- + * Copyright (c) 2003, 2005 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include + +/* + * BOOLEAN basic type description. + */ +static const ber_tlv_tag_t asn_DEF_BOOLEAN_tags[] = { + (ASN_TAG_CLASS_UNIVERSAL | (1 << 2)) +}; +asn_TYPE_operation_t asn_OP_BOOLEAN = { + BOOLEAN_free, +#if !defined(ASN_DISABLE_PRINT_SUPPORT) + BOOLEAN_print, +#else + 0, +#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ + BOOLEAN_compare, +#if !defined(ASN_DISABLE_BER_SUPPORT) + BOOLEAN_decode_ber, + BOOLEAN_encode_der, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ +#if !defined(ASN_DISABLE_XER_SUPPORT) + BOOLEAN_decode_xer, + BOOLEAN_encode_xer, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ +#if !defined(ASN_DISABLE_JER_SUPPORT) + BOOLEAN_encode_jer, +#else + 0, +#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ +#if !defined(ASN_DISABLE_OER_SUPPORT) + BOOLEAN_decode_oer, + BOOLEAN_encode_oer, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ +#if !defined(ASN_DISABLE_UPER_SUPPORT) + BOOLEAN_decode_uper, /* Unaligned PER decoder */ + BOOLEAN_encode_uper, /* Unaligned PER encoder */ +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ +#if !defined(ASN_DISABLE_APER_SUPPORT) + BOOLEAN_decode_aper, /* Aligned PER decoder */ + BOOLEAN_encode_aper, /* Aligned PER encoder */ +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ +#if !defined(ASN_DISABLE_RFILL_SUPPORT) + BOOLEAN_random_fill, +#else + 0, +#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ + 0 /* Use generic outmost tag fetcher */ +}; +asn_TYPE_descriptor_t asn_DEF_BOOLEAN = { + "BOOLEAN", + "BOOLEAN", + &asn_OP_BOOLEAN, + asn_DEF_BOOLEAN_tags, + sizeof(asn_DEF_BOOLEAN_tags) / sizeof(asn_DEF_BOOLEAN_tags[0]), + asn_DEF_BOOLEAN_tags, /* Same as above */ + sizeof(asn_DEF_BOOLEAN_tags) / sizeof(asn_DEF_BOOLEAN_tags[0]), + { +#if !defined(ASN_DISABLE_OER_SUPPORT) + 0, +#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ +#if !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) + 0, +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) */ + asn_generic_no_constraint + }, + 0, 0, /* No members */ + 0 /* No specifics */ +}; + +void +BOOLEAN_free(const asn_TYPE_descriptor_t *td, void *ptr, + enum asn_struct_free_method method) { + if(td && ptr) { + switch(method) { + case ASFM_FREE_EVERYTHING: + FREEMEM(ptr); + break; + case ASFM_FREE_UNDERLYING: + break; + case ASFM_FREE_UNDERLYING_AND_RESET: + memset(ptr, 0, sizeof(BOOLEAN_t)); + break; + } + } +} + +int +BOOLEAN_compare(const asn_TYPE_descriptor_t *td, const void *aptr, + const void *bptr) { + const BOOLEAN_t *a = aptr; + const BOOLEAN_t *b = bptr; + + (void)td; + + if(a && b) { + if(!*a == !*b) { /* TRUE can be encoded by any non-zero byte. */ + return 0; + } else if(!*a) { + return -1; + } else { + return 1; + } + } else if(!a) { + return -1; + } else { + return 1; + } +} diff --git a/certgen/asncodec/BOOLEAN.h b/certgen/asncodec/BOOLEAN.h index 2cbbe71011a6f7c3b7163f560b89495fdb8234c5..905c1e8b02e00442f61efdbbe951a00d6b76f1ed 100644 --- a/certgen/asncodec/BOOLEAN.h +++ b/certgen/asncodec/BOOLEAN.h @@ -1,70 +1,70 @@ -/*- - * Copyright (c) 2003-2017 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#ifndef _BOOLEAN_H_ -#define _BOOLEAN_H_ - -#include - -#ifdef __cplusplus -extern "C" { -#endif - -/* - * The underlying integer may contain various values, but everything - * non-zero is capped to 0xff by the DER encoder. The BER decoder may - * yield non-zero values different from 1, beware. - */ -typedef unsigned BOOLEAN_t; - -extern asn_TYPE_descriptor_t asn_DEF_BOOLEAN; -extern asn_TYPE_operation_t asn_OP_BOOLEAN; - -asn_struct_free_f BOOLEAN_free; - -#if !defined(ASN_DISABLE_PRINT_SUPPORT) -asn_struct_print_f BOOLEAN_print; -#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ - -asn_struct_compare_f BOOLEAN_compare; - -#define BOOLEAN_constraint asn_generic_no_constraint - -#if !defined(ASN_DISABLE_BER_SUPPORT) -ber_type_decoder_f BOOLEAN_decode_ber; -der_type_encoder_f BOOLEAN_encode_der; -#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ - -#if !defined(ASN_DISABLE_XER_SUPPORT) -xer_type_decoder_f BOOLEAN_decode_xer; -xer_type_encoder_f BOOLEAN_encode_xer; -#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ - -#if !defined(ASN_DISABLE_JER_SUPPORT) -jer_type_encoder_f BOOLEAN_encode_jer; -#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ - -#if !defined(ASN_DISABLE_OER_SUPPORT) -oer_type_decoder_f BOOLEAN_decode_oer; -oer_type_encoder_f BOOLEAN_encode_oer; -#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ - -#if !defined(ASN_DISABLE_UPER_SUPPORT) -per_type_decoder_f BOOLEAN_decode_uper; -per_type_encoder_f BOOLEAN_encode_uper; -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ -#if !defined(ASN_DISABLE_APER_SUPPORT) -per_type_decoder_f BOOLEAN_decode_aper; -per_type_encoder_f BOOLEAN_encode_aper; -#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ - -#if !defined(ASN_DISABLE_RFILL_SUPPORT) -asn_random_fill_f BOOLEAN_random_fill; -#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ - -#ifdef __cplusplus -} -#endif - -#endif /* _BOOLEAN_H_ */ +/*- + * Copyright (c) 2003-2017 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#ifndef _BOOLEAN_H_ +#define _BOOLEAN_H_ + +#include + +#ifdef __cplusplus +extern "C" { +#endif + +/* + * The underlying integer may contain various values, but everything + * non-zero is capped to 0xff by the DER encoder. The BER decoder may + * yield non-zero values different from 1, beware. + */ +typedef unsigned BOOLEAN_t; + +extern asn_TYPE_descriptor_t asn_DEF_BOOLEAN; +extern asn_TYPE_operation_t asn_OP_BOOLEAN; + +asn_struct_free_f BOOLEAN_free; + +#if !defined(ASN_DISABLE_PRINT_SUPPORT) +asn_struct_print_f BOOLEAN_print; +#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ + +asn_struct_compare_f BOOLEAN_compare; + +#define BOOLEAN_constraint asn_generic_no_constraint + +#if !defined(ASN_DISABLE_BER_SUPPORT) +ber_type_decoder_f BOOLEAN_decode_ber; +der_type_encoder_f BOOLEAN_encode_der; +#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ + +#if !defined(ASN_DISABLE_XER_SUPPORT) +xer_type_decoder_f BOOLEAN_decode_xer; +xer_type_encoder_f BOOLEAN_encode_xer; +#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ + +#if !defined(ASN_DISABLE_JER_SUPPORT) +jer_type_encoder_f BOOLEAN_encode_jer; +#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ + +#if !defined(ASN_DISABLE_OER_SUPPORT) +oer_type_decoder_f BOOLEAN_decode_oer; +oer_type_encoder_f BOOLEAN_encode_oer; +#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ + +#if !defined(ASN_DISABLE_UPER_SUPPORT) +per_type_decoder_f BOOLEAN_decode_uper; +per_type_encoder_f BOOLEAN_encode_uper; +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ +#if !defined(ASN_DISABLE_APER_SUPPORT) +per_type_decoder_f BOOLEAN_decode_aper; +per_type_encoder_f BOOLEAN_encode_aper; +#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ + +#if !defined(ASN_DISABLE_RFILL_SUPPORT) +asn_random_fill_f BOOLEAN_random_fill; +#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ + +#ifdef __cplusplus +} +#endif + +#endif /* _BOOLEAN_H_ */ diff --git a/certgen/asncodec/BOOLEAN_oer.c b/certgen/asncodec/BOOLEAN_oer.c index 0e92e602bd4d52ea3bd4fc990a5fa6cdf4288c62..65dc6979947094e54525ba01660ad33b17110238 100644 --- a/certgen/asncodec/BOOLEAN_oer.c +++ b/certgen/asncodec/BOOLEAN_oer.c @@ -1,54 +1,54 @@ -/* - * Copyright (c) 2017 Lev Walkin . - * All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include - -/* - * Encode as Canonical OER. - */ -asn_enc_rval_t -BOOLEAN_encode_oer(const asn_TYPE_descriptor_t *td, - const asn_oer_constraints_t *constraints, const void *sptr, - asn_app_consume_bytes_f *cb, void *app_key) { - asn_enc_rval_t er = { 1, 0, 0 }; - const BOOLEAN_t *st = sptr; - uint8_t bool_value = *st ? 0xff : 0; /* 0xff mandated by OER */ - - (void)td; - (void)constraints; /* Constraints are unused in OER */ - - if(cb(&bool_value, 1, app_key) < 0) { - ASN__ENCODE_FAILED; - } else { - ASN__ENCODED_OK(er); - } -} - -asn_dec_rval_t -BOOLEAN_decode_oer(const asn_codec_ctx_t *opt_codec_ctx, - const asn_TYPE_descriptor_t *td, - const asn_oer_constraints_t *constraints, void **sptr, - const void *ptr, size_t size) { - asn_dec_rval_t ok = {RC_OK, 1}; - BOOLEAN_t *st; - - (void)opt_codec_ctx; - (void)td; - (void)constraints; /* Constraints are unused in OER */ - - if(size < 1) { - ASN__DECODE_STARVED; - } - - if(!(st = *sptr)) { - st = (BOOLEAN_t *)(*sptr = CALLOC(1, sizeof(*st))); - if(!st) ASN__DECODE_FAILED; - } - - *st = *(const uint8_t *)ptr; - - return ok; -} +/* + * Copyright (c) 2017 Lev Walkin . + * All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include + +/* + * Encode as Canonical OER. + */ +asn_enc_rval_t +BOOLEAN_encode_oer(const asn_TYPE_descriptor_t *td, + const asn_oer_constraints_t *constraints, const void *sptr, + asn_app_consume_bytes_f *cb, void *app_key) { + asn_enc_rval_t er = { 1, 0, 0 }; + const BOOLEAN_t *st = sptr; + uint8_t bool_value = *st ? 0xff : 0; /* 0xff mandated by OER */ + + (void)td; + (void)constraints; /* Constraints are unused in OER */ + + if(cb(&bool_value, 1, app_key) < 0) { + ASN__ENCODE_FAILED; + } else { + ASN__ENCODED_OK(er); + } +} + +asn_dec_rval_t +BOOLEAN_decode_oer(const asn_codec_ctx_t *opt_codec_ctx, + const asn_TYPE_descriptor_t *td, + const asn_oer_constraints_t *constraints, void **sptr, + const void *ptr, size_t size) { + asn_dec_rval_t ok = {RC_OK, 1}; + BOOLEAN_t *st; + + (void)opt_codec_ctx; + (void)td; + (void)constraints; /* Constraints are unused in OER */ + + if(size < 1) { + ASN__DECODE_STARVED; + } + + if(!(st = *sptr)) { + st = (BOOLEAN_t *)(*sptr = CALLOC(1, sizeof(*st))); + if(!st) ASN__DECODE_FAILED; + } + + *st = *(const uint8_t *)ptr; + + return ok; +} diff --git a/certgen/asncodec/BOOLEAN_print.c b/certgen/asncodec/BOOLEAN_print.c index 23aaadea84d09fc5b5abee6bbebbfd636eaec952..31f253ad8512bb97235f06404ac379ace8465caf 100644 --- a/certgen/asncodec/BOOLEAN_print.c +++ b/certgen/asncodec/BOOLEAN_print.c @@ -1,33 +1,33 @@ -/* - * Copyright (c) 2017 Lev Walkin . - * All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include - -int -BOOLEAN_print(const asn_TYPE_descriptor_t *td, const void *sptr, int ilevel, - asn_app_consume_bytes_f *cb, void *app_key) { - const BOOLEAN_t *st = (const BOOLEAN_t *)sptr; - const char *buf; - size_t buflen; - - (void)td; /* Unused argument */ - (void)ilevel; /* Unused argument */ - - if(st) { - if(*st) { - buf = "TRUE"; - buflen = 4; - } else { - buf = "FALSE"; - buflen = 5; - } - } else { - buf = ""; - buflen = 8; - } - - return (cb(buf, buflen, app_key) < 0) ? -1 : 0; -} +/* + * Copyright (c) 2017 Lev Walkin . + * All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include + +int +BOOLEAN_print(const asn_TYPE_descriptor_t *td, const void *sptr, int ilevel, + asn_app_consume_bytes_f *cb, void *app_key) { + const BOOLEAN_t *st = (const BOOLEAN_t *)sptr; + const char *buf; + size_t buflen; + + (void)td; /* Unused argument */ + (void)ilevel; /* Unused argument */ + + if(st) { + if(*st) { + buf = "TRUE"; + buflen = 4; + } else { + buf = "FALSE"; + buflen = 5; + } + } else { + buf = ""; + buflen = 8; + } + + return (cb(buf, buflen, app_key) < 0) ? -1 : 0; +} diff --git a/certgen/asncodec/BOOLEAN_xer.c b/certgen/asncodec/BOOLEAN_xer.c index 7e9d8f8537e880c807711510c31da13575469001..82b41fcab240fdbcd3c8e041775ff2920a052c24 100644 --- a/certgen/asncodec/BOOLEAN_xer.c +++ b/certgen/asncodec/BOOLEAN_xer.c @@ -1,74 +1,74 @@ -/* - * Copyright (c) 2017 Lev Walkin . - * All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include -#include -#include - -/* - * Decode the chunk of XML text encoding INTEGER. - */ -static enum xer_pbd_rval -BOOLEAN__xer_body_decode(const asn_TYPE_descriptor_t *td, void *sptr, - const void *chunk_buf, size_t chunk_size) { - BOOLEAN_t *st = (BOOLEAN_t *)sptr; - const char *p = (const char *)chunk_buf; - - (void)td; - - if(chunk_size && p[0] == 0x3c /* '<' */) { - switch(xer_check_tag(chunk_buf, chunk_size, "false")) { - case XCT_BOTH: - /* "" */ - *st = 0; - break; - case XCT_UNKNOWN_BO: - if(xer_check_tag(chunk_buf, chunk_size, "true") != XCT_BOTH) - return XPBD_BROKEN_ENCODING; - /* "" */ - *st = 1; /* Or 0xff as in DER?.. */ - break; - default: - return XPBD_BROKEN_ENCODING; - } - return XPBD_BODY_CONSUMED; - } else { - return XPBD_BROKEN_ENCODING; - } -} - - -asn_dec_rval_t -BOOLEAN_decode_xer(const asn_codec_ctx_t *opt_codec_ctx, - const asn_TYPE_descriptor_t *td, void **sptr, - const char *opt_mname, const void *buf_ptr, size_t size) { - return xer_decode_primitive(opt_codec_ctx, td, - sptr, sizeof(BOOLEAN_t), opt_mname, buf_ptr, size, - BOOLEAN__xer_body_decode); -} - -asn_enc_rval_t -BOOLEAN_encode_xer(const asn_TYPE_descriptor_t *td, const void *sptr, - int ilevel, enum xer_encoder_flags_e flags, - asn_app_consume_bytes_f *cb, void *app_key) { - const BOOLEAN_t *st = (const BOOLEAN_t *)sptr; - asn_enc_rval_t er = {0, 0, 0}; - - (void)ilevel; - (void)flags; - - if(!st) ASN__ENCODE_FAILED; - - if(*st) { - ASN__CALLBACK("", 7); - } else { - ASN__CALLBACK("", 8); - } - - ASN__ENCODED_OK(er); -cb_failed: - ASN__ENCODE_FAILED; -} +/* + * Copyright (c) 2017 Lev Walkin . + * All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include +#include +#include + +/* + * Decode the chunk of XML text encoding INTEGER. + */ +static enum xer_pbd_rval +BOOLEAN__xer_body_decode(const asn_TYPE_descriptor_t *td, void *sptr, + const void *chunk_buf, size_t chunk_size) { + BOOLEAN_t *st = (BOOLEAN_t *)sptr; + const char *p = (const char *)chunk_buf; + + (void)td; + + if(chunk_size && p[0] == 0x3c /* '<' */) { + switch(xer_check_tag(chunk_buf, chunk_size, "false")) { + case XCT_BOTH: + /* "" */ + *st = 0; + break; + case XCT_UNKNOWN_BO: + if(xer_check_tag(chunk_buf, chunk_size, "true") != XCT_BOTH) + return XPBD_BROKEN_ENCODING; + /* "" */ + *st = 1; /* Or 0xff as in DER?.. */ + break; + default: + return XPBD_BROKEN_ENCODING; + } + return XPBD_BODY_CONSUMED; + } else { + return XPBD_BROKEN_ENCODING; + } +} + + +asn_dec_rval_t +BOOLEAN_decode_xer(const asn_codec_ctx_t *opt_codec_ctx, + const asn_TYPE_descriptor_t *td, void **sptr, + const char *opt_mname, const void *buf_ptr, size_t size) { + return xer_decode_primitive(opt_codec_ctx, td, + sptr, sizeof(BOOLEAN_t), opt_mname, buf_ptr, size, + BOOLEAN__xer_body_decode); +} + +asn_enc_rval_t +BOOLEAN_encode_xer(const asn_TYPE_descriptor_t *td, const void *sptr, + int ilevel, enum xer_encoder_flags_e flags, + asn_app_consume_bytes_f *cb, void *app_key) { + const BOOLEAN_t *st = (const BOOLEAN_t *)sptr; + asn_enc_rval_t er = {0, 0, 0}; + + (void)ilevel; + (void)flags; + + if(!st) ASN__ENCODE_FAILED; + + if(*st) { + ASN__CALLBACK("", 7); + } else { + ASN__CALLBACK("", 8); + } + + ASN__ENCODED_OK(er); +cb_failed: + ASN__ENCODE_FAILED; +} diff --git a/certgen/asncodec/BasePublicEncryptionKey.c b/certgen/asncodec/BasePublicEncryptionKey.c index 35ba5c00dc39e826837d947ce8abcb522ee2c211..692806e97e653e5c79c79cf3c36cfca2c648fd6b 100644 --- a/certgen/asncodec/BasePublicEncryptionKey.c +++ b/certgen/asncodec/BasePublicEncryptionKey.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "BasePublicEncryptionKey.h" diff --git a/certgen/asncodec/BasePublicEncryptionKey.h b/certgen/asncodec/BasePublicEncryptionKey.h index f73f5ebe892bf65d79f8d272613a8af6d5aa2be7..40529ffe8462742b7e0c16b4e323276adb43e538 100644 --- a/certgen/asncodec/BasePublicEncryptionKey.h +++ b/certgen/asncodec/BasePublicEncryptionKey.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/BitmapSsp.c b/certgen/asncodec/BitmapSsp.c index 27be61399879adbbc2841b2164f950610b12d090..968e94371b5e10ea07b8ddd8f4909cae1c0d234c 100644 --- a/certgen/asncodec/BitmapSsp.c +++ b/certgen/asncodec/BitmapSsp.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "BitmapSsp.h" diff --git a/certgen/asncodec/BitmapSsp.h b/certgen/asncodec/BitmapSsp.h index 592ed1bb899ee03e23d3aa4e9e195785bfa8f970..03112389d2030ffd7861f5c1bc4654c8af0e75b6 100644 --- a/certgen/asncodec/BitmapSsp.h +++ b/certgen/asncodec/BitmapSsp.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/BitmapSspRange.c b/certgen/asncodec/BitmapSspRange.c index b02f88f43c8ca5b84708a3a25952348beb5db03f..e934980ca5a5f4d31dce2bdf7b888fdba1e4ebf4 100644 --- a/certgen/asncodec/BitmapSspRange.c +++ b/certgen/asncodec/BitmapSspRange.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "BitmapSspRange.h" diff --git a/certgen/asncodec/BitmapSspRange.h b/certgen/asncodec/BitmapSspRange.h index 47fd99a26c56c202fc62781203bf8e4aebc000d3..f13a51e55b992ae2928a9a48235df33482dd40c7 100644 --- a/certgen/asncodec/BitmapSspRange.h +++ b/certgen/asncodec/BitmapSspRange.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/BlindedKey.c b/certgen/asncodec/BlindedKey.c index cacbb35724e876b4215393cd1fe9976c47cab8ce..95c1635e4d2fb4eeafc0b19cff22c96dd494aee4 100644 --- a/certgen/asncodec/BlindedKey.c +++ b/certgen/asncodec/BlindedKey.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1CamRaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1CamRaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "BlindedKey.h" diff --git a/certgen/asncodec/BlindedKey.h b/certgen/asncodec/BlindedKey.h index 0d46124578153357c75df85056fa1fed8278cefe..f1887a4534657c0f32c5ac2523f8205969bc6c6f 100644 --- a/certgen/asncodec/BlindedKey.h +++ b/certgen/asncodec/BlindedKey.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1CamRaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1CamRaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/ButterflyAtDownloadRequestMessage.c b/certgen/asncodec/ButterflyAtDownloadRequestMessage.c index 2cdae21c927ef0ced6d56ce4e7930ae8b88efa66..0ecc415621f071cec8a9d0b9cfbde886397a6288 100644 --- a/certgen/asncodec/ButterflyAtDownloadRequestMessage.c +++ b/certgen/asncodec/ButterflyAtDownloadRequestMessage.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941MessagesCa" - * found in "asn1/pki_ts102941/EtsiTs102941MessagesCA.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/pki_ts102941/EtsiTs102941MessagesCa.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "ButterflyAtDownloadRequestMessage.h" diff --git a/certgen/asncodec/ButterflyAtDownloadRequestMessage.h b/certgen/asncodec/ButterflyAtDownloadRequestMessage.h index aa2a79277844d76c58f69fa9b8afb65c318dcc0f..86c2b72e3fc0139cc39f3cb362540d96148e6a3b 100644 --- a/certgen/asncodec/ButterflyAtDownloadRequestMessage.h +++ b/certgen/asncodec/ButterflyAtDownloadRequestMessage.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941MessagesCa" - * found in "asn1/pki_ts102941/EtsiTs102941MessagesCA.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/pki_ts102941/EtsiTs102941MessagesCa.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/ButterflyAuthorizationRequestMessage.c b/certgen/asncodec/ButterflyAuthorizationRequestMessage.c index efe297014cc502e333b82359af748414d09b5b3c..3f713be4f1a7b2131e9a9309a6b26960d9c16ae4 100644 --- a/certgen/asncodec/ButterflyAuthorizationRequestMessage.c +++ b/certgen/asncodec/ButterflyAuthorizationRequestMessage.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941MessagesCa" - * found in "asn1/pki_ts102941/EtsiTs102941MessagesCA.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/pki_ts102941/EtsiTs102941MessagesCa.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "ButterflyAuthorizationRequestMessage.h" diff --git a/certgen/asncodec/ButterflyAuthorizationRequestMessage.h b/certgen/asncodec/ButterflyAuthorizationRequestMessage.h index f05d59fa15b32132565a7141ae1833e60dae6fc4..8115513bb757d8253211d8d6f8a3b80ee43852fa 100644 --- a/certgen/asncodec/ButterflyAuthorizationRequestMessage.h +++ b/certgen/asncodec/ButterflyAuthorizationRequestMessage.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941MessagesCa" - * found in "asn1/pki_ts102941/EtsiTs102941MessagesCA.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/pki_ts102941/EtsiTs102941MessagesCa.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/ButterflyAuthorizationResponseMessage.c b/certgen/asncodec/ButterflyAuthorizationResponseMessage.c index 3cc412beb2a10ee49a0f769350ea30fd2358a97b..a71d4020fc7dfa4bce84a2a52a184e808b09ea55 100644 --- a/certgen/asncodec/ButterflyAuthorizationResponseMessage.c +++ b/certgen/asncodec/ButterflyAuthorizationResponseMessage.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941MessagesCa" - * found in "asn1/pki_ts102941/EtsiTs102941MessagesCA.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/pki_ts102941/EtsiTs102941MessagesCa.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "ButterflyAuthorizationResponseMessage.h" diff --git a/certgen/asncodec/ButterflyAuthorizationResponseMessage.h b/certgen/asncodec/ButterflyAuthorizationResponseMessage.h index bb4a3eea91867b85e20311a19635553830dede68..429173a8ce6bbcd86615e914515f92ade1622145 100644 --- a/certgen/asncodec/ButterflyAuthorizationResponseMessage.h +++ b/certgen/asncodec/ButterflyAuthorizationResponseMessage.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941MessagesCa" - * found in "asn1/pki_ts102941/EtsiTs102941MessagesCA.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/pki_ts102941/EtsiTs102941MessagesCa.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/ButterflyCertRequestMessage.c b/certgen/asncodec/ButterflyCertRequestMessage.c index 6beff727c7c1082674b3b8c3f7a0554d9e1ee6c0..72b8a97dbd0444b84fb76e70aa577d44d84f4022 100644 --- a/certgen/asncodec/ButterflyCertRequestMessage.c +++ b/certgen/asncodec/ButterflyCertRequestMessage.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941MessagesCa" - * found in "asn1/pki_ts102941/EtsiTs102941MessagesCA.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/pki_ts102941/EtsiTs102941MessagesCa.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "ButterflyCertRequestMessage.h" diff --git a/certgen/asncodec/ButterflyCertRequestMessage.h b/certgen/asncodec/ButterflyCertRequestMessage.h index 85240f1d3654bdb42bece8d022fffb80e7cea117..24100c9b53cfcb84246a0b768cea19710449dc31 100644 --- a/certgen/asncodec/ButterflyCertRequestMessage.h +++ b/certgen/asncodec/ButterflyCertRequestMessage.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941MessagesCa" - * found in "asn1/pki_ts102941/EtsiTs102941MessagesCA.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/pki_ts102941/EtsiTs102941MessagesCa.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/ButterflyCertResponseMessage.c b/certgen/asncodec/ButterflyCertResponseMessage.c index ecdaff73cd2caf338eddca6f49d014f861af33ef..ee4d4fd79194b1cde5de11d96517abcba3cff7c7 100644 --- a/certgen/asncodec/ButterflyCertResponseMessage.c +++ b/certgen/asncodec/ButterflyCertResponseMessage.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941MessagesCa" - * found in "asn1/pki_ts102941/EtsiTs102941MessagesCA.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/pki_ts102941/EtsiTs102941MessagesCa.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "ButterflyCertResponseMessage.h" diff --git a/certgen/asncodec/ButterflyCertResponseMessage.h b/certgen/asncodec/ButterflyCertResponseMessage.h index d2aee9e7cf5802563e600e16916d11c8c9781d58..f959e71787ea47f6c945514fcf57163587deb7e0 100644 --- a/certgen/asncodec/ButterflyCertResponseMessage.h +++ b/certgen/asncodec/ButterflyCertResponseMessage.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941MessagesCa" - * found in "asn1/pki_ts102941/EtsiTs102941MessagesCA.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/pki_ts102941/EtsiTs102941MessagesCa.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/ButterflyExpansion.c b/certgen/asncodec/ButterflyExpansion.c index a494a2b81fb287e03d28385a2f1232a825f333a5..781416b68868fe6c2e1c9660196d3b4b2d7e68f5 100644 --- a/certgen/asncodec/ButterflyExpansion.c +++ b/certgen/asncodec/ButterflyExpansion.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1EeRaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1EeRaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "ButterflyExpansion.h" diff --git a/certgen/asncodec/ButterflyExpansion.h b/certgen/asncodec/ButterflyExpansion.h index 3ac2b54456edb5379b6f21349a1ea4350d835aec..fc94e928eb97c148f7810e1b1757d9dc416e270d 100644 --- a/certgen/asncodec/ButterflyExpansion.h +++ b/certgen/asncodec/ButterflyExpansion.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1EeRaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1EeRaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/ButterflyParamsOriginal.c b/certgen/asncodec/ButterflyParamsOriginal.c index a33f2c6d92d4da4f5efc2673805905a7a21cc22d..4d6916915bc6dbee740f4733df90e68794569686 100644 --- a/certgen/asncodec/ButterflyParamsOriginal.c +++ b/certgen/asncodec/ButterflyParamsOriginal.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1EeRaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1EeRaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "ButterflyParamsOriginal.h" diff --git a/certgen/asncodec/ButterflyParamsOriginal.h b/certgen/asncodec/ButterflyParamsOriginal.h index 58dd4c81038c9ab3da41c20688dbe9c7af81bec8..5986a77c4bdf3147dee871dd9d61ee3ebeca6303 100644 --- a/certgen/asncodec/ButterflyParamsOriginal.h +++ b/certgen/asncodec/ButterflyParamsOriginal.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1EeRaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1EeRaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/CaCertificateRekeyingMessage.c b/certgen/asncodec/CaCertificateRekeyingMessage.c index eae16cb240a7b3055900f49e16c7a0bc9bb4ea0d..c0ce5152f44605fdacf2198fb97bf8fe028d6728 100644 --- a/certgen/asncodec/CaCertificateRekeyingMessage.c +++ b/certgen/asncodec/CaCertificateRekeyingMessage.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941MessagesCa" - * found in "asn1/pki_ts102941/EtsiTs102941MessagesCA.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/pki_ts102941/EtsiTs102941MessagesCa.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "CaCertificateRekeyingMessage.h" diff --git a/certgen/asncodec/CaCertificateRekeyingMessage.h b/certgen/asncodec/CaCertificateRekeyingMessage.h index 23840950d9dc4e3e119886bc8145538a460855f0..671fc114f061e003aad1eab57ed06218f2b2a8f8 100644 --- a/certgen/asncodec/CaCertificateRekeyingMessage.h +++ b/certgen/asncodec/CaCertificateRekeyingMessage.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941MessagesCa" - * found in "asn1/pki_ts102941/EtsiTs102941MessagesCA.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/pki_ts102941/EtsiTs102941MessagesCa.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/CaCertificateRequest.c b/certgen/asncodec/CaCertificateRequest.c index 7952a89bdc1313988ff3300cf4c1e36672617cdd..cec07d4a7bd28dea413887ab1f0370eff8a80c42 100644 --- a/certgen/asncodec/CaCertificateRequest.c +++ b/certgen/asncodec/CaCertificateRequest.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TypesCaManagement" * found in "asn1/pki_ts102941/EtsiTs102941TypesCaManagement.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "CaCertificateRequest.h" diff --git a/certgen/asncodec/CaCertificateRequest.h b/certgen/asncodec/CaCertificateRequest.h index 3a7b22e1d15eeff76e74f4b920805696840cbaf7..f13ff35cd66ae877dc1c2c1f14a3d101d51fb147 100644 --- a/certgen/asncodec/CaCertificateRequest.h +++ b/certgen/asncodec/CaCertificateRequest.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TypesCaManagement" * found in "asn1/pki_ts102941/EtsiTs102941TypesCaManagement.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/CaCertificateRequestMessage.c b/certgen/asncodec/CaCertificateRequestMessage.c index d99bdea1ee6a03071c5c2a8fdca5ec5c227627e3..c7344c5e25153bad9ba82530d261f94b8c1f214e 100644 --- a/certgen/asncodec/CaCertificateRequestMessage.c +++ b/certgen/asncodec/CaCertificateRequestMessage.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941MessagesCa" - * found in "asn1/pki_ts102941/EtsiTs102941MessagesCA.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/pki_ts102941/EtsiTs102941MessagesCa.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "CaCertificateRequestMessage.h" diff --git a/certgen/asncodec/CaCertificateRequestMessage.h b/certgen/asncodec/CaCertificateRequestMessage.h index 7fd495569e3eb272479c3ce81752e7402386a5de..81488a55dd448e76d48f8edc9db7bb0091d299d0 100644 --- a/certgen/asncodec/CaCertificateRequestMessage.h +++ b/certgen/asncodec/CaCertificateRequestMessage.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941MessagesCa" - * found in "asn1/pki_ts102941/EtsiTs102941MessagesCA.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/pki_ts102941/EtsiTs102941MessagesCa.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/CamRaBatchResponse.c b/certgen/asncodec/CamRaBatchResponse.c index 2f52528c15b4fdcce7212c481204ba26f19c6266..6bf08786a258fc40296494bd92161e1b81c334ae 100644 --- a/certgen/asncodec/CamRaBatchResponse.c +++ b/certgen/asncodec/CamRaBatchResponse.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1CamRaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1CamRaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "CamRaBatchResponse.h" diff --git a/certgen/asncodec/CamRaBatchResponse.h b/certgen/asncodec/CamRaBatchResponse.h index 01421904df77cbfb7c5478a17624a5fb16adb3e3..68029562df501932b8d0c673b3393b59577442ad 100644 --- a/certgen/asncodec/CamRaBatchResponse.h +++ b/certgen/asncodec/CamRaBatchResponse.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1CamRaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1CamRaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/CamRaInterfacePdu.c b/certgen/asncodec/CamRaInterfacePdu.c index a601a1decd840a660d53a881321346a4a830b037..f866eb6487fda296ff4fa41cf7889d4a92e528f1 100644 --- a/certgen/asncodec/CamRaInterfacePdu.c +++ b/certgen/asncodec/CamRaInterfacePdu.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1CamRaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1CamRaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "CamRaInterfacePdu.h" diff --git a/certgen/asncodec/CamRaInterfacePdu.h b/certgen/asncodec/CamRaInterfacePdu.h index 42c3d8044bb9b844fad14ab42dea32c83073c572..78d1e72c9f74eb79770d6e38f20c361885fa32d2 100644 --- a/certgen/asncodec/CamRaInterfacePdu.h +++ b/certgen/asncodec/CamRaInterfacePdu.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1CamRaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1CamRaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/CamSsp.c b/certgen/asncodec/CamSsp.c index a8c7a3599fef76a2f478b3119c04a347db01ae2f..52d0b0363dbbd2be4bb3a456511786dfd219b48d 100644 --- a/certgen/asncodec/CamSsp.c +++ b/certgen/asncodec/CamSsp.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "CamSsp.h" diff --git a/certgen/asncodec/CamSsp.h b/certgen/asncodec/CamSsp.h index 611d76373dac3a0d3d15cbf008645f43f47a9170..5ea903744eeeaadd14b16edec6ed30bfb1414e3a 100644 --- a/certgen/asncodec/CamSsp.h +++ b/certgen/asncodec/CamSsp.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/CertIssueExtension.c b/certgen/asncodec/CertIssueExtension.c index e240c652c7c5314b1161a4e2a4622086b9745216..8e2ef3733f96ab560a5dd031fed16b989c58cacd 100644 --- a/certgen/asncodec/CertIssueExtension.c +++ b/certgen/asncodec/CertIssueExtension.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "CertIssueExtension.h" diff --git a/certgen/asncodec/CertIssueExtension.h b/certgen/asncodec/CertIssueExtension.h index 5a722c785e5d9d62c14fd9a483fdf69e165f196e..12e2fa4bc1ef08ce16f2823bce8b0f198c8399f5 100644 --- a/certgen/asncodec/CertIssueExtension.h +++ b/certgen/asncodec/CertIssueExtension.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/CertManagementPdu.c b/certgen/asncodec/CertManagementPdu.c index ac4cc5ff8e881b9580d619a6683541e277e59b78..45a6efa8ab6419fcfb28fe8de5fc3c757b18c4d2 100644 --- a/certgen/asncodec/CertManagementPdu.c +++ b/certgen/asncodec/CertManagementPdu.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1CertManagement" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1CertManagement.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "CertManagementPdu.h" diff --git a/certgen/asncodec/CertManagementPdu.h b/certgen/asncodec/CertManagementPdu.h index 498321726538d97f27db1067a0566b11de9f4ed3..306c87076a48e99a02396d4fac72a1f3668c5c44 100644 --- a/certgen/asncodec/CertManagementPdu.h +++ b/certgen/asncodec/CertManagementPdu.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1CertManagement" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1CertManagement.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/CertRequestExtension.c b/certgen/asncodec/CertRequestExtension.c index e8887c27f1c42ac07b013c3a29498ff0475c708b..99d461be5471bd057d5384a331b82ba1325f7aec 100644 --- a/certgen/asncodec/CertRequestExtension.c +++ b/certgen/asncodec/CertRequestExtension.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "CertRequestExtension.h" diff --git a/certgen/asncodec/CertRequestExtension.h b/certgen/asncodec/CertRequestExtension.h index 321d5dbd3fbe8e391ef1240532c17dc72900b98f..bfd8994733f24af1d67f14c5092a9868d0a7c15e 100644 --- a/certgen/asncodec/CertRequestExtension.h +++ b/certgen/asncodec/CertRequestExtension.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/Certificate.c b/certgen/asncodec/Certificate.c index ffc208faac72fa1e722e153cc12a76338e693d4c..cd90eee640105d7705e524065244ad5bf017d7b4 100644 --- a/certgen/asncodec/Certificate.c +++ b/certgen/asncodec/Certificate.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "Certificate.h" diff --git a/certgen/asncodec/Certificate.h b/certgen/asncodec/Certificate.h index 3416ab6f5b23014c03ff4f974ab7c45e81b73723..f20238883a266b24012ed9db7bee0825a0de3732 100644 --- a/certgen/asncodec/Certificate.h +++ b/certgen/asncodec/Certificate.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/CertificateBase.c b/certgen/asncodec/CertificateBase.c index 7f8297372953fcaa1ef3b2f479ebd80212825223..2cc0eed8da67802b32fb28a76cd49f34957a9b25 100644 --- a/certgen/asncodec/CertificateBase.c +++ b/certgen/asncodec/CertificateBase.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "CertificateBase.h" diff --git a/certgen/asncodec/CertificateBase.h b/certgen/asncodec/CertificateBase.h index 3cd19316232bdc9b717719e7fa6c401d54531cc3..13134b5e43e12cae17960ba680c25cb8e70108eb 100644 --- a/certgen/asncodec/CertificateBase.h +++ b/certgen/asncodec/CertificateBase.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/CertificateChain.c b/certgen/asncodec/CertificateChain.c index b21bc826f5dea57ea2874b85b358b500568d7eee..2258003b507f7e150478fae688710a6b22bdbe69 100644 --- a/certgen/asncodec/CertificateChain.c +++ b/certgen/asncodec/CertificateChain.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1CertManagement" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1CertManagement.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "CertificateChain.h" diff --git a/certgen/asncodec/CertificateChain.h b/certgen/asncodec/CertificateChain.h index c57e9411fd004e784f49a4db8b72a01f8d798dfc..73344adf573806d634a8ba3af9f0c6943fe89133 100644 --- a/certgen/asncodec/CertificateChain.h +++ b/certgen/asncodec/CertificateChain.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1CertManagement" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1CertManagement.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/CertificateChainSpdu.c b/certgen/asncodec/CertificateChainSpdu.c index 74731f973abf8fe9afdaadc178dd23b2c55b79bf..a5e363625d7a8148b8cc1f181c91ca9af70aaa65 100644 --- a/certgen/asncodec/CertificateChainSpdu.c +++ b/certgen/asncodec/CertificateChainSpdu.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "CertificateChainSpdu.h" diff --git a/certgen/asncodec/CertificateChainSpdu.h b/certgen/asncodec/CertificateChainSpdu.h index b42bca3695db4e4eb815d9531e9c7483e7431155..bf8aa003376f5440c18e8adc57c84934c74e82fe 100644 --- a/certgen/asncodec/CertificateChainSpdu.h +++ b/certgen/asncodec/CertificateChainSpdu.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/CertificateFormat.c b/certgen/asncodec/CertificateFormat.c index f76fbffb50bb8402ceb6d3c900ac5d5025d9f5d9..70498423e23d8667cbb111ba785735affc976482 100644 --- a/certgen/asncodec/CertificateFormat.c +++ b/certgen/asncodec/CertificateFormat.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941BaseTypes" * found in "asn1/pki_ts102941/EtsiTs102941BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "CertificateFormat.h" diff --git a/certgen/asncodec/CertificateFormat.h b/certgen/asncodec/CertificateFormat.h index 0660fd75393d2ced4654065f256883e96c6dab18..cb1a61ef8b19f19e0b89ac2185cd477f84000f79 100644 --- a/certgen/asncodec/CertificateFormat.h +++ b/certgen/asncodec/CertificateFormat.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941BaseTypes" * found in "asn1/pki_ts102941/EtsiTs102941BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/CertificateId.c b/certgen/asncodec/CertificateId.c index bcfaf26436bbd040376d8bdaf13c33704978c87d..66a21b95c9719894355e6ae3e5ae186690ba3158 100644 --- a/certgen/asncodec/CertificateId.c +++ b/certgen/asncodec/CertificateId.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "CertificateId.h" diff --git a/certgen/asncodec/CertificateId.h b/certgen/asncodec/CertificateId.h index 685d9d3c8117864b597be01f37fac495a9f4df05..33f39c7c4360fd1d816bfa6d653bd143205faf58 100644 --- a/certgen/asncodec/CertificateId.h +++ b/certgen/asncodec/CertificateId.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/CertificateManagementInfoStatus.c b/certgen/asncodec/CertificateManagementInfoStatus.c index ffa40d267e6e5da59161b2d5d64156fe4497337d..e2822cac591778f39c517facf439952757ebb669 100644 --- a/certgen/asncodec/CertificateManagementInfoStatus.c +++ b/certgen/asncodec/CertificateManagementInfoStatus.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1CertManagement" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1CertManagement.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "CertificateManagementInfoStatus.h" diff --git a/certgen/asncodec/CertificateManagementInfoStatus.h b/certgen/asncodec/CertificateManagementInfoStatus.h index 25a75316c075de1ead9c27b539dbaa0d6dec5b91..87df224d11fb0db6c3aa7e503391601298d0fa61 100644 --- a/certgen/asncodec/CertificateManagementInfoStatus.h +++ b/certgen/asncodec/CertificateManagementInfoStatus.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1CertManagement" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1CertManagement.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/CertificateManagementInformationStatusSpdu.c b/certgen/asncodec/CertificateManagementInformationStatusSpdu.c index 2c3aaa2aef3e69778b3c0fad40374db71b675ab0..def8ae75eb699838eae2282c7a01c426d83e3046 100644 --- a/certgen/asncodec/CertificateManagementInformationStatusSpdu.c +++ b/certgen/asncodec/CertificateManagementInformationStatusSpdu.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "CertificateManagementInformationStatusSpdu.h" diff --git a/certgen/asncodec/CertificateManagementInformationStatusSpdu.h b/certgen/asncodec/CertificateManagementInformationStatusSpdu.h index 6081b5f0fe724076b9bb85d6ee0043c0ed0796a2..f023042f529ff65e0d23f23bf3b35381f438297e 100644 --- a/certgen/asncodec/CertificateManagementInformationStatusSpdu.h +++ b/certgen/asncodec/CertificateManagementInformationStatusSpdu.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/CertificateRevocationListMessage.c b/certgen/asncodec/CertificateRevocationListMessage.c index b84234ee0c5d7b5511b457472bc3652e1b45412d..64c82dbaac62dc4cf91897f68f561b5c4903b51a 100644 --- a/certgen/asncodec/CertificateRevocationListMessage.c +++ b/certgen/asncodec/CertificateRevocationListMessage.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941MessagesCa" - * found in "asn1/pki_ts102941/EtsiTs102941MessagesCA.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/pki_ts102941/EtsiTs102941MessagesCa.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "CertificateRevocationListMessage.h" diff --git a/certgen/asncodec/CertificateRevocationListMessage.h b/certgen/asncodec/CertificateRevocationListMessage.h index 29a37fd56c6ba3039d2554f7e0bb24a992bc83c2..6bfe9d32ffcffaa3870accd2fe229fe329ea7c63 100644 --- a/certgen/asncodec/CertificateRevocationListMessage.h +++ b/certgen/asncodec/CertificateRevocationListMessage.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941MessagesCa" - * found in "asn1/pki_ts102941/EtsiTs102941MessagesCA.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/pki_ts102941/EtsiTs102941MessagesCa.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/CertificateSubjectAttributes.c b/certgen/asncodec/CertificateSubjectAttributes.c index 4871fda9bcd3f4d7b2217c8ea037fd2f91e65ae9..ba0362d7b411256c22f6eabd76f8cc1dc45316d5 100644 --- a/certgen/asncodec/CertificateSubjectAttributes.c +++ b/certgen/asncodec/CertificateSubjectAttributes.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941BaseTypes" * found in "asn1/pki_ts102941/EtsiTs102941BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "CertificateSubjectAttributes.h" diff --git a/certgen/asncodec/CertificateSubjectAttributes.h b/certgen/asncodec/CertificateSubjectAttributes.h index 65d0da43a44f855518ae8385f6ca57af4a6df859..bac3997fb784b8c11be424ba9e9597810118bee1 100644 --- a/certgen/asncodec/CertificateSubjectAttributes.h +++ b/certgen/asncodec/CertificateSubjectAttributes.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941BaseTypes" * found in "asn1/pki_ts102941/EtsiTs102941BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/CertificateType.c b/certgen/asncodec/CertificateType.c index ff35abff7f1bcdf8d3f237cd289833982238a45d..b04a1477a510c03e1d132dc4dfc905364cc0b2a9 100644 --- a/certgen/asncodec/CertificateType.c +++ b/certgen/asncodec/CertificateType.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "CertificateType.h" diff --git a/certgen/asncodec/CertificateType.h b/certgen/asncodec/CertificateType.h index 8223d3f86f147afb24bb0656b34d6f09fd69e19c..78eecc0c55ea61fe7d66534e691b62d162cd2cf3 100644 --- a/certgen/asncodec/CertificateType.h +++ b/certgen/asncodec/CertificateType.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/CircularRegion.c b/certgen/asncodec/CircularRegion.c index a07c69f4aa88c8f3a980d08e7f530a6a0a99553a..95754385c254ee3b473cb5f34849a401cede3a3f 100644 --- a/certgen/asncodec/CircularRegion.c +++ b/certgen/asncodec/CircularRegion.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "CircularRegion.h" diff --git a/certgen/asncodec/CircularRegion.h b/certgen/asncodec/CircularRegion.h index e616e73688da08b29bd054b6e97c720c4670b70c..0386298880b0f7c96f01e1661d4501b054e849b7 100644 --- a/certgen/asncodec/CircularRegion.h +++ b/certgen/asncodec/CircularRegion.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/CompositeCrl.c b/certgen/asncodec/CompositeCrl.c index 28930a90884dbdac89a7a146ea52d429202b4fab..a0d00321db9abb97bb95ce730872c2a021c3324b 100644 --- a/certgen/asncodec/CompositeCrl.c +++ b/certgen/asncodec/CompositeCrl.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1CertManagement" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1CertManagement.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "CompositeCrl.h" diff --git a/certgen/asncodec/CompositeCrl.h b/certgen/asncodec/CompositeCrl.h index 289014a2103a91fa1996656dc6d2d22d7b5ae44c..cd65764ba45814581d9cbff9dd449dcba02b6629 100644 --- a/certgen/asncodec/CompositeCrl.h +++ b/certgen/asncodec/CompositeCrl.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1CertManagement" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1CertManagement.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/CompositeCrlSpdu.c b/certgen/asncodec/CompositeCrlSpdu.c index 41c25c808adeb505e8568ea34f839ac1eb25a485..a5ff0609d5fb0ca4e9727f93518df1ef48035ad1 100644 --- a/certgen/asncodec/CompositeCrlSpdu.c +++ b/certgen/asncodec/CompositeCrlSpdu.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "CompositeCrlSpdu.h" diff --git a/certgen/asncodec/CompositeCrlSpdu.h b/certgen/asncodec/CompositeCrlSpdu.h index 02d19dc1c63578f6cc939b25d6ce24d00b500a7a..fe7d7c10186e61614e8f22f3cf1b10ac79fbcc81 100644 --- a/certgen/asncodec/CompositeCrlSpdu.h +++ b/certgen/asncodec/CompositeCrlSpdu.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/ContributedExtensionBlock.c b/certgen/asncodec/ContributedExtensionBlock.c index 024821a79ba00c715d790cf8a3f71936fc46ec01..3f82d2af1edc626e909fdcae828ddfc5e5f0faaf 100644 --- a/certgen/asncodec/ContributedExtensionBlock.c +++ b/certgen/asncodec/ContributedExtensionBlock.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "ContributedExtensionBlock.h" diff --git a/certgen/asncodec/ContributedExtensionBlock.h b/certgen/asncodec/ContributedExtensionBlock.h index 5f537dab5d7d98bd8e47fec6cdfd49382fd1bdff..ea9b107ff4b1d9642b7fba47cabd9b3f26bb79f6 100644 --- a/certgen/asncodec/ContributedExtensionBlock.h +++ b/certgen/asncodec/ContributedExtensionBlock.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/ContributedExtensionBlocks.c b/certgen/asncodec/ContributedExtensionBlocks.c index 9ed4a2f7dbebc8893d0bfde9f7427281305328cc..64b9c9bb7a79977e34b29a68795b2007fe7dd1d8 100644 --- a/certgen/asncodec/ContributedExtensionBlocks.c +++ b/certgen/asncodec/ContributedExtensionBlocks.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "ContributedExtensionBlocks.h" diff --git a/certgen/asncodec/ContributedExtensionBlocks.h b/certgen/asncodec/ContributedExtensionBlocks.h index d88944d411fbba37d1f769bb4de2a71433cc66f5..d5d9a106acaeaec5e4a1c0ca6d56db439a28e913 100644 --- a/certgen/asncodec/ContributedExtensionBlocks.h +++ b/certgen/asncodec/ContributedExtensionBlocks.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/Countersignature.c b/certgen/asncodec/Countersignature.c index 1e0a6d780c816c0473b81a6f014bf29de9c9ea94..9c3314709529ba438b01c8f9ebbf205584d017f7 100644 --- a/certgen/asncodec/Countersignature.c +++ b/certgen/asncodec/Countersignature.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "Countersignature.h" diff --git a/certgen/asncodec/Countersignature.h b/certgen/asncodec/Countersignature.h index 11ba1427bf2468278323256f2f445795be2e84e3..94e53246be7b7238baa468ba90e73a623c223f34 100644 --- a/certgen/asncodec/Countersignature.h +++ b/certgen/asncodec/Countersignature.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/CountryAndRegions.c b/certgen/asncodec/CountryAndRegions.c index d6911f39ab0003d2988245eca7df1b68aa01b21e..776848069773906013fac085b85764b3edd3a84d 100644 --- a/certgen/asncodec/CountryAndRegions.c +++ b/certgen/asncodec/CountryAndRegions.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "CountryAndRegions.h" diff --git a/certgen/asncodec/CountryAndRegions.h b/certgen/asncodec/CountryAndRegions.h index c3c3db9212b069ee03a870bd5fcef7fa39fc0910..2dd312401c678c9604f4d1bf3d6863da82f53a2a 100644 --- a/certgen/asncodec/CountryAndRegions.h +++ b/certgen/asncodec/CountryAndRegions.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/CountryAndSubregions.c b/certgen/asncodec/CountryAndSubregions.c index 3bf11df86135589d8e22ce75e60557bfab8dc04f..5451ff561cf34af99cd5c73903d13e2f76a480a9 100644 --- a/certgen/asncodec/CountryAndSubregions.c +++ b/certgen/asncodec/CountryAndSubregions.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "CountryAndSubregions.h" diff --git a/certgen/asncodec/CountryAndSubregions.h b/certgen/asncodec/CountryAndSubregions.h index a0f64c89c8c251c6386c8cee70ec38a589fb5abe..59a6012cbb4272b9d68076be8e43618b71f68d7e 100644 --- a/certgen/asncodec/CountryAndSubregions.h +++ b/certgen/asncodec/CountryAndSubregions.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/CountryOnly.c b/certgen/asncodec/CountryOnly.c index 8390a1906862e823c6870258818bde46b555377c..51951c4a09fce8f7e77b5452879e9d1bdde44b19 100644 --- a/certgen/asncodec/CountryOnly.c +++ b/certgen/asncodec/CountryOnly.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "CountryOnly.h" diff --git a/certgen/asncodec/CountryOnly.h b/certgen/asncodec/CountryOnly.h index 27dd375b9dc904ed87118295e29f96952507cac8..0ce69480cffb0620a2ba9325a38e6752b15d1b61 100644 --- a/certgen/asncodec/CountryOnly.h +++ b/certgen/asncodec/CountryOnly.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/CrlContents.c b/certgen/asncodec/CrlContents.c index c0610565cd1add114e4cc92a5b939ee549247661..86f9d2864882b4b7d95cb200019e94c11e88063f 100644 --- a/certgen/asncodec/CrlContents.c +++ b/certgen/asncodec/CrlContents.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2CrlBaseTypes" * found in "asn1/ieee1609.2/Ieee1609Dot2CrlBaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "CrlContents.h" diff --git a/certgen/asncodec/CrlContents.h b/certgen/asncodec/CrlContents.h index 15c050a5e7640d4636223cd56f9b645568658c65..29c1de8bf893f789afe95dd6bed1b8cf2e2b11dd 100644 --- a/certgen/asncodec/CrlContents.h +++ b/certgen/asncodec/CrlContents.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2CrlBaseTypes" * found in "asn1/ieee1609.2/Ieee1609Dot2CrlBaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/CrlEntry.c b/certgen/asncodec/CrlEntry.c index 4a6a1e10d399da72f1b3977324500df3bd3a0fb2..eb259c91c8478c668de5a01281d810c8b5497211 100644 --- a/certgen/asncodec/CrlEntry.c +++ b/certgen/asncodec/CrlEntry.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TrustLists" * found in "asn1/pki_ts102941/EtsiTs102941TrustLists.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "CrlEntry.h" diff --git a/certgen/asncodec/CrlEntry.h b/certgen/asncodec/CrlEntry.h index 623a008ed8cd4b48a1a7a6c9d0312810acda6299..c287bd8bb5d5663f3378e6d5ea1913a57fb626ba 100644 --- a/certgen/asncodec/CrlEntry.h +++ b/certgen/asncodec/CrlEntry.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TrustLists" * found in "asn1/pki_ts102941/EtsiTs102941TrustLists.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/CrlInfoStatus.c b/certgen/asncodec/CrlInfoStatus.c index dbef66ea054985896ef95060690d55de4fca7404..bf9eb7faad343d5582daf643f8511ccaad763382 100644 --- a/certgen/asncodec/CrlInfoStatus.c +++ b/certgen/asncodec/CrlInfoStatus.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1CertManagement" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1CertManagement.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "CrlInfoStatus.h" diff --git a/certgen/asncodec/CrlInfoStatus.h b/certgen/asncodec/CrlInfoStatus.h index e9e61307228e3b2e301b7af8b2d8ca8716aa83c0..f787f65e23853bf0bde106490c5d99e2e1415153 100644 --- a/certgen/asncodec/CrlInfoStatus.h +++ b/certgen/asncodec/CrlInfoStatus.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1CertManagement" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1CertManagement.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/CrlPriorityInfo.c b/certgen/asncodec/CrlPriorityInfo.c index 19d72eaed7b3c90568cd7c609e8eefd42ee31efa..775b1946c849dbc51c9ac859cb70d782842d59aa 100644 --- a/certgen/asncodec/CrlPriorityInfo.c +++ b/certgen/asncodec/CrlPriorityInfo.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2CrlBaseTypes" * found in "asn1/ieee1609.2/Ieee1609Dot2CrlBaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "CrlPriorityInfo.h" diff --git a/certgen/asncodec/CrlPriorityInfo.h b/certgen/asncodec/CrlPriorityInfo.h index d32302b89fd7d1601c144cad748312dd604eee27..e335a0cd9ed11bf4515242681a0a10c457e20b16 100644 --- a/certgen/asncodec/CrlPriorityInfo.h +++ b/certgen/asncodec/CrlPriorityInfo.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2CrlBaseTypes" * found in "asn1/ieee1609.2/Ieee1609Dot2CrlBaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/CrlPsid.c b/certgen/asncodec/CrlPsid.c index 65d45aeee8ef3454e0d234af8ab89c4f92d8f110..60fb7bcdb239619b3fb6ca1abff804a8e3fe2fa8 100644 --- a/certgen/asncodec/CrlPsid.c +++ b/certgen/asncodec/CrlPsid.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Crl" * found in "asn1/ieee1609.2/Ieee1609Dot2Crl.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "CrlPsid.h" diff --git a/certgen/asncodec/CrlPsid.h b/certgen/asncodec/CrlPsid.h index 63fcdeaf8a0da0a99457c22fd731785d52389008..79bd484377eeb86a5189deb246372c3d9ced7131 100644 --- a/certgen/asncodec/CrlPsid.h +++ b/certgen/asncodec/CrlPsid.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Crl" * found in "asn1/ieee1609.2/Ieee1609Dot2Crl.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/CrlSeries.c b/certgen/asncodec/CrlSeries.c index a1f72cd9dcc7713858b0e9d92ba6cb69b1529f4b..16847f71d308816bb8677e2b6d243bf97d7229ab 100644 --- a/certgen/asncodec/CrlSeries.c +++ b/certgen/asncodec/CrlSeries.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "CrlSeries.h" diff --git a/certgen/asncodec/CrlSeries.h b/certgen/asncodec/CrlSeries.h index 75de711f6a3099bdb5eab0a471703adf7a2821ff..d4e8f583ee7e3a3678753ae05f51f183b473552d 100644 --- a/certgen/asncodec/CrlSeries.h +++ b/certgen/asncodec/CrlSeries.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/CrlSignerSsp.c b/certgen/asncodec/CrlSignerSsp.c index eba8aaf0cf105ecd204bef32cbbe6775e265bd6f..29c03c28eb1e39a8bcfa757eb0abd4ecd4faadbf 100644 --- a/certgen/asncodec/CrlSignerSsp.c +++ b/certgen/asncodec/CrlSignerSsp.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "CrlSignerSsp.h" diff --git a/certgen/asncodec/CrlSignerSsp.h b/certgen/asncodec/CrlSignerSsp.h index f0fc0e517818fd00240c7c28d28635c3151bc10d..a91aaafdaaf115a8d69769b5783c411c93941998 100644 --- a/certgen/asncodec/CrlSignerSsp.h +++ b/certgen/asncodec/CrlSignerSsp.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/CtlCommand.c b/certgen/asncodec/CtlCommand.c index 727fe633a1617f43f967e5a7f1f318425f6286e4..d865bb1730de89298976590562daaf4720a992ac 100644 --- a/certgen/asncodec/CtlCommand.c +++ b/certgen/asncodec/CtlCommand.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TrustLists" * found in "asn1/pki_ts102941/EtsiTs102941TrustLists.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "CtlCommand.h" diff --git a/certgen/asncodec/CtlCommand.h b/certgen/asncodec/CtlCommand.h index c50fc7fb8507aac4e21a958975c13ee561eafd6c..f442eb0728d11e4e7ec3a4e5f0b9bc7ec1855772 100644 --- a/certgen/asncodec/CtlCommand.h +++ b/certgen/asncodec/CtlCommand.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TrustLists" * found in "asn1/pki_ts102941/EtsiTs102941TrustLists.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/CtlDelete.c b/certgen/asncodec/CtlDelete.c index 7fd3b2a8fac4fc52fd87cf63025d32575dd31631..a56077874adcbbff34922069e75ab068dc69f379 100644 --- a/certgen/asncodec/CtlDelete.c +++ b/certgen/asncodec/CtlDelete.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TrustLists" * found in "asn1/pki_ts102941/EtsiTs102941TrustLists.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "CtlDelete.h" diff --git a/certgen/asncodec/CtlDelete.h b/certgen/asncodec/CtlDelete.h index 0b5107d5c9d40d6ef1167d0dc3ba917fd96fa1e7..5ceca5ec17bddb0b618896da4c2cbfffbefc8f77 100644 --- a/certgen/asncodec/CtlDelete.h +++ b/certgen/asncodec/CtlDelete.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TrustLists" * found in "asn1/pki_ts102941/EtsiTs102941TrustLists.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/CtlElectorEntry.c b/certgen/asncodec/CtlElectorEntry.c index 16acba74a57def76676ad249f559b07b413a7004..0cac471bcd1d9e36240f2a2b5e66be8d4a895d48 100644 --- a/certgen/asncodec/CtlElectorEntry.c +++ b/certgen/asncodec/CtlElectorEntry.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1CertManagement" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1CertManagement.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "CtlElectorEntry.h" diff --git a/certgen/asncodec/CtlElectorEntry.h b/certgen/asncodec/CtlElectorEntry.h index b7ac6feb8e75d1e2baa7e62bea93b89407d86db9..4e41110cee5166f0daf301865998e882135a65da 100644 --- a/certgen/asncodec/CtlElectorEntry.h +++ b/certgen/asncodec/CtlElectorEntry.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1CertManagement" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1CertManagement.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/CtlEntry.c b/certgen/asncodec/CtlEntry.c index 9a9d98e1d9d7833c74f0ffc21f43f34d2561e302..7c7d91074822ab7630a6c7073414054eee096bdc 100644 --- a/certgen/asncodec/CtlEntry.c +++ b/certgen/asncodec/CtlEntry.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TrustLists" * found in "asn1/pki_ts102941/EtsiTs102941TrustLists.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "CtlEntry.h" diff --git a/certgen/asncodec/CtlEntry.h b/certgen/asncodec/CtlEntry.h index e9be59e37a465dce4b440715130a60c4a333cdad..1aa8f382b7564cad396f065b6bec28451d605c71 100644 --- a/certgen/asncodec/CtlEntry.h +++ b/certgen/asncodec/CtlEntry.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TrustLists" * found in "asn1/pki_ts102941/EtsiTs102941TrustLists.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/CtlFormat.c b/certgen/asncodec/CtlFormat.c index 33bad27137eebd2ea1bc0776e1d25bed6a01ce78..51bd9a0056cf14a68bcb75a0f2247da8f6e4110e 100644 --- a/certgen/asncodec/CtlFormat.c +++ b/certgen/asncodec/CtlFormat.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TrustLists" * found in "asn1/pki_ts102941/EtsiTs102941TrustLists.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "CtlFormat.h" diff --git a/certgen/asncodec/CtlFormat.h b/certgen/asncodec/CtlFormat.h index 49728ee5fe3056c5a606a70d1eb754a98c1618ed..669bf0035498660513697547521ec7c580f80732 100644 --- a/certgen/asncodec/CtlFormat.h +++ b/certgen/asncodec/CtlFormat.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TrustLists" * found in "asn1/pki_ts102941/EtsiTs102941TrustLists.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/CtlInfoStatus.c b/certgen/asncodec/CtlInfoStatus.c index b4f4c5347b40825fdbd9695ee480b99078108ff2..75eed236813ff96c6f15f1f41d9d3b29f3407ec1 100644 --- a/certgen/asncodec/CtlInfoStatus.c +++ b/certgen/asncodec/CtlInfoStatus.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1CertManagement" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1CertManagement.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "CtlInfoStatus.h" diff --git a/certgen/asncodec/CtlInfoStatus.h b/certgen/asncodec/CtlInfoStatus.h index fcd47ae1f7ec97a7f1861b39ec97f2629dc5ddfa..f0cb3bb273bd2c067cee3874ade6e57db1216925 100644 --- a/certgen/asncodec/CtlInfoStatus.h +++ b/certgen/asncodec/CtlInfoStatus.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1CertManagement" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1CertManagement.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/CtlRootCaEntry.c b/certgen/asncodec/CtlRootCaEntry.c index a30b067a9446ffa0cce287684910542330399441..99b1344e57108f258e816241957cad0541f62025 100644 --- a/certgen/asncodec/CtlRootCaEntry.c +++ b/certgen/asncodec/CtlRootCaEntry.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1CertManagement" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1CertManagement.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "CtlRootCaEntry.h" diff --git a/certgen/asncodec/CtlRootCaEntry.h b/certgen/asncodec/CtlRootCaEntry.h index 6d04240256749b7aeb8f89d2ebac3b2ae139d857..79c47fbca157c82df9e5928af81a4f86a39fc101 100644 --- a/certgen/asncodec/CtlRootCaEntry.h +++ b/certgen/asncodec/CtlRootCaEntry.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1CertManagement" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1CertManagement.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/CtlSequenceNumber.c b/certgen/asncodec/CtlSequenceNumber.c index 9e85e3081c7b432160570598bfb6ef257167b88b..5ebf35bbc7eda81870e6a98536b39321d21bbb60 100644 --- a/certgen/asncodec/CtlSequenceNumber.c +++ b/certgen/asncodec/CtlSequenceNumber.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1CertManagement" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1CertManagement.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "CtlSequenceNumber.h" diff --git a/certgen/asncodec/CtlSequenceNumber.h b/certgen/asncodec/CtlSequenceNumber.h index c7f2fa66a45196eb6fbdafecced50d9ac51139da..7e5131de9f0cf3a9806acb753a638194fec699b6 100644 --- a/certgen/asncodec/CtlSequenceNumber.h +++ b/certgen/asncodec/CtlSequenceNumber.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1CertManagement" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1CertManagement.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/CtlSeriesId.c b/certgen/asncodec/CtlSeriesId.c index 9f97ef65c9ecf753adc30ad44906209c2d0b74d7..7a75245a22aece64ac7d3d60156a16ab2034e41e 100644 --- a/certgen/asncodec/CtlSeriesId.c +++ b/certgen/asncodec/CtlSeriesId.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1CertManagement" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1CertManagement.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "CtlSeriesId.h" diff --git a/certgen/asncodec/CtlSeriesId.h b/certgen/asncodec/CtlSeriesId.h index 97f74a88a97730602fda0fa008075a32510fe713..557811414f2211c413b760096edbb2eebee72164 100644 --- a/certgen/asncodec/CtlSeriesId.h +++ b/certgen/asncodec/CtlSeriesId.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1CertManagement" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1CertManagement.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/CtlSignatureSpdu.c b/certgen/asncodec/CtlSignatureSpdu.c index 7aadf7d9d4dbbdd6fa42acf45ee752fe1ecd2328..d46ebe3989f8434206ad992738a572ec5077975d 100644 --- a/certgen/asncodec/CtlSignatureSpdu.c +++ b/certgen/asncodec/CtlSignatureSpdu.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "CtlSignatureSpdu.h" diff --git a/certgen/asncodec/CtlSignatureSpdu.h b/certgen/asncodec/CtlSignatureSpdu.h index 7517af3853edb16003568dc7db61fccb892a4104..651efcf38d8535f58c0611441f5ddaafc917433b 100644 --- a/certgen/asncodec/CtlSignatureSpdu.h +++ b/certgen/asncodec/CtlSignatureSpdu.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/DATE-ENCODING.c b/certgen/asncodec/DATE-ENCODING.c index 63102f420388644398253211848fa0c7e6f84bd3..ce83b9963f8e354b0080dfe814bd6fbf6c7a547d 100644 --- a/certgen/asncodec/DATE-ENCODING.c +++ b/certgen/asncodec/DATE-ENCODING.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "ASN1C-DATE" - * found in "../../../../asn1c-fillabs2/skeletons/standard-modules/date.asn1" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "../../../../asn1c-fillabs/skeletons/standard-modules/date.asn1" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "DATE-ENCODING.h" diff --git a/certgen/asncodec/DATE-ENCODING.h b/certgen/asncodec/DATE-ENCODING.h index f40ab526fc4bfdebb8fbff951b96cd5cb6333fb3..352acc61bdd01c69e70c49f8a43c27411a257c65 100644 --- a/certgen/asncodec/DATE-ENCODING.h +++ b/certgen/asncodec/DATE-ENCODING.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "ASN1C-DATE" - * found in "../../../../asn1c-fillabs2/skeletons/standard-modules/date.asn1" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "../../../../asn1c-fillabs/skeletons/standard-modules/date.asn1" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/DATE.c b/certgen/asncodec/DATE.c index 895f88cc8fe28c0e5e691241d2374be31db58656..bb74675913d3e649eb2b5727875d87c01b0e23a7 100644 --- a/certgen/asncodec/DATE.c +++ b/certgen/asncodec/DATE.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "ASN1C-DATE" - * found in "../../../../asn1c-fillabs2/skeletons/standard-modules/date.asn1" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "../../../../asn1c-fillabs/skeletons/standard-modules/date.asn1" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "DATE.h" diff --git a/certgen/asncodec/DATE.h b/certgen/asncodec/DATE.h index 88f55e0623be123f8408374003d03560fb2d8e9d..fb02cfbd49d8b8734649e3ba5752c55012ef86aa 100644 --- a/certgen/asncodec/DATE.h +++ b/certgen/asncodec/DATE.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "ASN1C-DATE" - * found in "../../../../asn1c-fillabs2/skeletons/standard-modules/date.asn1" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "../../../../asn1c-fillabs/skeletons/standard-modules/date.asn1" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/DcDelete.c b/certgen/asncodec/DcDelete.c index 726be281c68586f73df128890494c7586fd8649a..c00c9b464cce1461b78c51dcc11f2b33c778c358 100644 --- a/certgen/asncodec/DcDelete.c +++ b/certgen/asncodec/DcDelete.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TrustLists" * found in "asn1/pki_ts102941/EtsiTs102941TrustLists.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "DcDelete.h" diff --git a/certgen/asncodec/DcDelete.h b/certgen/asncodec/DcDelete.h index 37aaae1c08afd31d54ab09d51580684f08fb71de..a7d737d47da7ebd4ab49ccafb59b9ab2e1272aff 100644 --- a/certgen/asncodec/DcDelete.h +++ b/certgen/asncodec/DcDelete.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TrustLists" * found in "asn1/pki_ts102941/EtsiTs102941TrustLists.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/DcEntry.c b/certgen/asncodec/DcEntry.c index 3d77f01526446caf70caa69182d674e36489d2e6..bd80deb48580e71d5d57a45920f3e7896abb11e6 100644 --- a/certgen/asncodec/DcEntry.c +++ b/certgen/asncodec/DcEntry.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TrustLists" * found in "asn1/pki_ts102941/EtsiTs102941TrustLists.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "DcEntry.h" diff --git a/certgen/asncodec/DcEntry.h b/certgen/asncodec/DcEntry.h index 2036095acc75abaad02d119a232074234dbd48d0..d87bfaf3b4af1f1968481cd6e5456f05255dd257 100644 --- a/certgen/asncodec/DcEntry.h +++ b/certgen/asncodec/DcEntry.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TrustLists" * found in "asn1/pki_ts102941/EtsiTs102941TrustLists.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/DcSsp.c b/certgen/asncodec/DcSsp.c index 2afa859d3006b9c747f76e9f07c619f88348eb62..7fa278c2bf5d84145573fd7c826e1a3483509018 100644 --- a/certgen/asncodec/DcSsp.c +++ b/certgen/asncodec/DcSsp.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "DcSsp.h" diff --git a/certgen/asncodec/DcSsp.h b/certgen/asncodec/DcSsp.h index 1997fa509d960f4eb3d8d694b58fde7b1f8df9e8..04b9e9b2bbb4c3f046d6d655d1203036875ab8a0 100644 --- a/certgen/asncodec/DcSsp.h +++ b/certgen/asncodec/DcSsp.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/DcmSsp.c b/certgen/asncodec/DcmSsp.c index 593231d6a9d3ad81fc5975f84daeed6c39da2286..40b83e373d565b5268a8cb8698131e0ff43526bc 100644 --- a/certgen/asncodec/DcmSsp.c +++ b/certgen/asncodec/DcmSsp.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "DcmSsp.h" diff --git a/certgen/asncodec/DcmSsp.h b/certgen/asncodec/DcmSsp.h index 30235b1cec9f7abbb3b2978ff81dc24020c50b8f..2a000224fdc88761d7d3bb294eb7789ba510e98f 100644 --- a/certgen/asncodec/DcmSsp.h +++ b/certgen/asncodec/DcmSsp.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/DeltaCtl.c b/certgen/asncodec/DeltaCtl.c index 6eeb628f0466ebbca329d98e544f07063b40d5e4..bbaaebfe2cc3f6dc7a24e25a38508e88cc9c4f3d 100644 --- a/certgen/asncodec/DeltaCtl.c +++ b/certgen/asncodec/DeltaCtl.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TrustLists" * found in "asn1/pki_ts102941/EtsiTs102941TrustLists.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "DeltaCtl.h" diff --git a/certgen/asncodec/DeltaCtl.h b/certgen/asncodec/DeltaCtl.h index 6959c5b48a16c7cad3b845aa11be2bb8c8ab8a33..a09116e7459ab02b6beab0cf4f2a55210f4b56c9 100644 --- a/certgen/asncodec/DeltaCtl.h +++ b/certgen/asncodec/DeltaCtl.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TrustLists" * found in "asn1/pki_ts102941/EtsiTs102941TrustLists.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/Duration.c b/certgen/asncodec/Duration.c index 70a01046233744b488480426585927152797e51d..c44e7a1339eaea41096b4bf43173d14c0d72057f 100644 --- a/certgen/asncodec/Duration.c +++ b/certgen/asncodec/Duration.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "Duration.h" diff --git a/certgen/asncodec/Duration.h b/certgen/asncodec/Duration.h index bbd9ce5a7ab7aea2d65daf383cfc876e93e90307..d53a0e09e8eb9c3272e828f18e4e3cf995aac177 100644 --- a/certgen/asncodec/Duration.h +++ b/certgen/asncodec/Duration.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/EXTERNAL.c b/certgen/asncodec/EXTERNAL.c index d81c2ea8822285fde6668d8606612c85b035a45f..5065a9f98b2d757cd9c79e0f18f03d2b58fb5c38 100644 --- a/certgen/asncodec/EXTERNAL.c +++ b/certgen/asncodec/EXTERNAL.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "ASN1C-UsefulInformationObjectClasses" - * found in "../../../../asn1c-fillabs2/skeletons/standard-modules/ASN1C-UsefulInformationObjectClasses.asn1" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "../../../../asn1c-fillabs/skeletons/standard-modules/ASN1C-UsefulInformationObjectClasses.asn1" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EXTERNAL.h" diff --git a/certgen/asncodec/EXTERNAL.h b/certgen/asncodec/EXTERNAL.h index 667ec00f005040252aaba1af30cc3934c011b85d..fdb92fd4c193009e79dd6cb82a5a3898a9858348 100644 --- a/certgen/asncodec/EXTERNAL.h +++ b/certgen/asncodec/EXTERNAL.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "ASN1C-UsefulInformationObjectClasses" - * found in "../../../../asn1c-fillabs2/skeletons/standard-modules/ASN1C-UsefulInformationObjectClasses.asn1" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "../../../../asn1c-fillabs/skeletons/standard-modules/ASN1C-UsefulInformationObjectClasses.asn1" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/EaEntry.c b/certgen/asncodec/EaEntry.c index 4ba5bc2ee6fada93c9ff43069a2ba38f99a608a4..142194ec03330602f92bf444b8a5c9ea72a13763 100644 --- a/certgen/asncodec/EaEntry.c +++ b/certgen/asncodec/EaEntry.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TrustLists" * found in "asn1/pki_ts102941/EtsiTs102941TrustLists.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EaEntry.h" diff --git a/certgen/asncodec/EaEntry.h b/certgen/asncodec/EaEntry.h index aa43b44d747b81163fc0df13587daaa522dd0cb9..a5693a3466763f0e7059d76d5d396463e2e64ee8 100644 --- a/certgen/asncodec/EaEntry.h +++ b/certgen/asncodec/EaEntry.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TrustLists" * found in "asn1/pki_ts102941/EtsiTs102941TrustLists.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/EcSignature.c b/certgen/asncodec/EcSignature.c index bd687765d1b9f11deb885525606136fa7014c69b..1f622e17ee62e4e78ef5210a43fdb484dc9b5609 100644 --- a/certgen/asncodec/EcSignature.c +++ b/certgen/asncodec/EcSignature.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941BaseTypes" * found in "asn1/pki_ts102941/EtsiTs102941BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EcSignature.h" diff --git a/certgen/asncodec/EcSignature.h b/certgen/asncodec/EcSignature.h index c33c3c60f838e1fd7883dd25ff69abb034bda158..27f2a5072db82904a52972fb1f68ca12af1a41a2 100644 --- a/certgen/asncodec/EcSignature.h +++ b/certgen/asncodec/EcSignature.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941BaseTypes" * found in "asn1/pki_ts102941/EtsiTs102941BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/EcaEeCertResponse.c b/certgen/asncodec/EcaEeCertResponse.c index b429b20790dfd45149a53a4dd632a12374255a47..cd9c339d5eefa04793820452e5ca97a206dc289a 100644 --- a/certgen/asncodec/EcaEeCertResponse.c +++ b/certgen/asncodec/EcaEeCertResponse.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1EcaEeInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1EcaEeInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EcaEeCertResponse.h" diff --git a/certgen/asncodec/EcaEeCertResponse.h b/certgen/asncodec/EcaEeCertResponse.h index ab10d1028515809b33b936f47562525bd12ad923..e45a59866d97b707b6d9e5f53da287ca0df60fbc 100644 --- a/certgen/asncodec/EcaEeCertResponse.h +++ b/certgen/asncodec/EcaEeCertResponse.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1EcaEeInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1EcaEeInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/EcaEeCertResponseSpdu.c b/certgen/asncodec/EcaEeCertResponseSpdu.c index 49e1a99323e72cf9ea5af2fbc765c71ce147d686..b006361fa7c485df1fe5723cbe2d7bba2b1385fd 100644 --- a/certgen/asncodec/EcaEeCertResponseSpdu.c +++ b/certgen/asncodec/EcaEeCertResponseSpdu.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EcaEeCertResponseSpdu.h" diff --git a/certgen/asncodec/EcaEeCertResponseSpdu.h b/certgen/asncodec/EcaEeCertResponseSpdu.h index a84aec3b909a1adad2b3b1e7a8d67cc1b11922a3..3fc235ed0564f4905b985d7cea0e8a8eac99c7fb 100644 --- a/certgen/asncodec/EcaEeCertResponseSpdu.h +++ b/certgen/asncodec/EcaEeCertResponseSpdu.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/EcaEeInterfacePdu.c b/certgen/asncodec/EcaEeInterfacePdu.c index 362ed2d0bddc6e3f3cf863bf1e2de68283784de8..4d757a930f61066db7e0bb382e4264c434f8f8e1 100644 --- a/certgen/asncodec/EcaEeInterfacePdu.c +++ b/certgen/asncodec/EcaEeInterfacePdu.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1EcaEeInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1EcaEeInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EcaEeInterfacePdu.h" diff --git a/certgen/asncodec/EcaEeInterfacePdu.h b/certgen/asncodec/EcaEeInterfacePdu.h index 1aebcdcee8bd8d45749289c0e1dfcea6ec908359..1dd849cd4c48d60bc05e5075b69b9da3dc0d6ee2 100644 --- a/certgen/asncodec/EcaEeInterfacePdu.h +++ b/certgen/asncodec/EcaEeInterfacePdu.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1EcaEeInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1EcaEeInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/EcaSsp.c b/certgen/asncodec/EcaSsp.c index 1f2d7020cff8f92254da5711eabdfba8a48458c9..f52965cb16f4db8ba892f308b41c4fba4f5a8e8c 100644 --- a/certgen/asncodec/EcaSsp.c +++ b/certgen/asncodec/EcaSsp.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EcaSsp.h" diff --git a/certgen/asncodec/EcaSsp.h b/certgen/asncodec/EcaSsp.h index d943d85a4ca601f023eddfb34923aa59c7980312..06fef4333bc99e1ce58ef689b89100a5ef40b978 100644 --- a/certgen/asncodec/EcaSsp.h +++ b/certgen/asncodec/EcaSsp.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/EccP256CurvePoint.c b/certgen/asncodec/EccP256CurvePoint.c index f18342749dbb7a19bcdcd64783241c9bd2e43113..eda99e2e0b1698af44876b932d9ee0e67c282066 100644 --- a/certgen/asncodec/EccP256CurvePoint.c +++ b/certgen/asncodec/EccP256CurvePoint.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EccP256CurvePoint.h" diff --git a/certgen/asncodec/EccP256CurvePoint.h b/certgen/asncodec/EccP256CurvePoint.h index 09dda865782fda30c4c149c9d13b0a40b76a93fb..32648e70bb3f2347be0161082d04d3b56cde227f 100644 --- a/certgen/asncodec/EccP256CurvePoint.h +++ b/certgen/asncodec/EccP256CurvePoint.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/EccP384CurvePoint.c b/certgen/asncodec/EccP384CurvePoint.c index dbbaf63eca9db5fe01ee229d1ed2614955c49e5e..8e40791b801961081eff5eb3269ddac15f33eb34 100644 --- a/certgen/asncodec/EccP384CurvePoint.c +++ b/certgen/asncodec/EccP384CurvePoint.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EccP384CurvePoint.h" diff --git a/certgen/asncodec/EccP384CurvePoint.h b/certgen/asncodec/EccP384CurvePoint.h index cfeb6db62a8cc0b38a5aaa41d9d9dbfd3c9fc803..31331ec06fc1b78a2dab5615d1bfd193e5306329 100644 --- a/certgen/asncodec/EccP384CurvePoint.h +++ b/certgen/asncodec/EccP384CurvePoint.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/EcdsaP256Signature.c b/certgen/asncodec/EcdsaP256Signature.c index 8f66576ea5c8f07f3b4ff1d140dc61a3b54e562b..af18230f82528bf2ff9345523b264af42ab97777 100644 --- a/certgen/asncodec/EcdsaP256Signature.c +++ b/certgen/asncodec/EcdsaP256Signature.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EcdsaP256Signature.h" diff --git a/certgen/asncodec/EcdsaP256Signature.h b/certgen/asncodec/EcdsaP256Signature.h index f9962edfc940683d558472522a5699989e6a07b0..b8a4473b639de588a326cd8b2f9b4875c4679798 100644 --- a/certgen/asncodec/EcdsaP256Signature.h +++ b/certgen/asncodec/EcdsaP256Signature.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/EcdsaP384Signature.c b/certgen/asncodec/EcdsaP384Signature.c index 16f6a41261f9b857d6eed69fc30f7fc3602df5a7..2d91fad4b629c92eba94fd4f70356cc02e80157e 100644 --- a/certgen/asncodec/EcdsaP384Signature.c +++ b/certgen/asncodec/EcdsaP384Signature.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EcdsaP384Signature.h" diff --git a/certgen/asncodec/EcdsaP384Signature.h b/certgen/asncodec/EcdsaP384Signature.h index 926343934217cee5c95b20477f47f5317830e7bf..03ded0e01e85adf87dceffbe73c525d9f18f8f89 100644 --- a/certgen/asncodec/EcdsaP384Signature.h +++ b/certgen/asncodec/EcdsaP384Signature.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/EcencP256EncryptedKey.c b/certgen/asncodec/EcencP256EncryptedKey.c index ada2c99e8d1d05f0a3064381048f7a71545212ee..7348fa4d593c4ede2abc51813135fb2e9834836f 100644 --- a/certgen/asncodec/EcencP256EncryptedKey.c +++ b/certgen/asncodec/EcencP256EncryptedKey.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EcencP256EncryptedKey.h" diff --git a/certgen/asncodec/EcencP256EncryptedKey.h b/certgen/asncodec/EcencP256EncryptedKey.h index e3c4589531a98312b5bda699199f18a550eae56b..11a6e0daaec65a6dc068f1b729bab39d9d940e2d 100644 --- a/certgen/asncodec/EcencP256EncryptedKey.h +++ b/certgen/asncodec/EcencP256EncryptedKey.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/EciesP256EncryptedKey.c b/certgen/asncodec/EciesP256EncryptedKey.c index 755e67de687e171ea98e419256b4b1692f1bafcb..98b6ef56de9abee1e520ef2e796dbdc887271895 100644 --- a/certgen/asncodec/EciesP256EncryptedKey.c +++ b/certgen/asncodec/EciesP256EncryptedKey.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EciesP256EncryptedKey.h" diff --git a/certgen/asncodec/EciesP256EncryptedKey.h b/certgen/asncodec/EciesP256EncryptedKey.h index 628c864c2348e1e3a242cf50af1f538dd31f708f..46fd41f33831b8a3558807ddc6e312dbea99170b 100644 --- a/certgen/asncodec/EciesP256EncryptedKey.h +++ b/certgen/asncodec/EciesP256EncryptedKey.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/EcsigP256Signature.c b/certgen/asncodec/EcsigP256Signature.c index aa100fcac52a95ebdb7a7621edb9c2a86605f335..8b44ab3aceb6aebc411ca81569ed2dfbfed00219 100644 --- a/certgen/asncodec/EcsigP256Signature.c +++ b/certgen/asncodec/EcsigP256Signature.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EcsigP256Signature.h" diff --git a/certgen/asncodec/EcsigP256Signature.h b/certgen/asncodec/EcsigP256Signature.h index 901c3a066244d8d28b46b16295921b2ddd185eb5..a471beef2640194bf9c3069d835acfd025e710d6 100644 --- a/certgen/asncodec/EcsigP256Signature.h +++ b/certgen/asncodec/EcsigP256Signature.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/EeEcaCertRequest.c b/certgen/asncodec/EeEcaCertRequest.c index 644b720d6be5eef95c513aa3825e8f053ca218f3..627b637b4194746e8c0e9f5dc490a092f63752f2 100644 --- a/certgen/asncodec/EeEcaCertRequest.c +++ b/certgen/asncodec/EeEcaCertRequest.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1EcaEeInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1EcaEeInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EeEcaCertRequest.h" diff --git a/certgen/asncodec/EeEcaCertRequest.h b/certgen/asncodec/EeEcaCertRequest.h index 7f404cc1694724dbedf897c377be4a798375ee29..8cf11c583f470cd852977fc384021ff09138a228 100644 --- a/certgen/asncodec/EeEcaCertRequest.h +++ b/certgen/asncodec/EeEcaCertRequest.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1EcaEeInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1EcaEeInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/EeEcaCertRequestSpdu.c b/certgen/asncodec/EeEcaCertRequestSpdu.c index 25177dc3b967690052440a10dbdeba621f63717c..491970580f5665bf6c14995be1da4a2517c3814a 100644 --- a/certgen/asncodec/EeEcaCertRequestSpdu.c +++ b/certgen/asncodec/EeEcaCertRequestSpdu.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EeEcaCertRequestSpdu.h" diff --git a/certgen/asncodec/EeEcaCertRequestSpdu.h b/certgen/asncodec/EeEcaCertRequestSpdu.h index fd09e0b23adbb6faa0f079a05252275ace65aedc..0f7c2accf84c9a551a68beb2c376079457fd0444 100644 --- a/certgen/asncodec/EeEcaCertRequestSpdu.h +++ b/certgen/asncodec/EeEcaCertRequestSpdu.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/EeMaInterfacePdu.c b/certgen/asncodec/EeMaInterfacePdu.c index b2a491da2bdf128ab885a068f5fd11e065a8a673..bcb0c1c8d766dfe74286a58d637f9bb7a21bb0d5 100644 --- a/certgen/asncodec/EeMaInterfacePdu.c +++ b/certgen/asncodec/EeMaInterfacePdu.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1EeMaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1EeMaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EeMaInterfacePdu.h" diff --git a/certgen/asncodec/EeMaInterfacePdu.h b/certgen/asncodec/EeMaInterfacePdu.h index 8bfe50764b2db71b0978a0397e2467c4688a57bd..8b30df5d9e4d15dcd9d362d95be0afe9887828d3 100644 --- a/certgen/asncodec/EeMaInterfacePdu.h +++ b/certgen/asncodec/EeMaInterfacePdu.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1EeMaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1EeMaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/EeRa1609Dot2AuthenticatedCertRequestSpdu.c b/certgen/asncodec/EeRa1609Dot2AuthenticatedCertRequestSpdu.c index 7d578d9fcde35411529ff744f055526543a7999b..e7785a8ab82d16ce8733abd0f4125f9e8a686e05 100644 --- a/certgen/asncodec/EeRa1609Dot2AuthenticatedCertRequestSpdu.c +++ b/certgen/asncodec/EeRa1609Dot2AuthenticatedCertRequestSpdu.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EeRa1609Dot2AuthenticatedCertRequestSpdu.h" diff --git a/certgen/asncodec/EeRa1609Dot2AuthenticatedCertRequestSpdu.h b/certgen/asncodec/EeRa1609Dot2AuthenticatedCertRequestSpdu.h index 58de1a0f406bf6d1d268f0c817560e010a589fb8..02e36ddacd9e51b0af1122a68efb3456a5cf8edd 100644 --- a/certgen/asncodec/EeRa1609Dot2AuthenticatedCertRequestSpdu.h +++ b/certgen/asncodec/EeRa1609Dot2AuthenticatedCertRequestSpdu.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/EeRaCertRequest.c b/certgen/asncodec/EeRaCertRequest.c index c1a695e5bbf383fddb8ca6432a4223a6de7d98bc..bc9b6c932e1293a639f878aeca37a4d3472a5241 100644 --- a/certgen/asncodec/EeRaCertRequest.c +++ b/certgen/asncodec/EeRaCertRequest.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1EeRaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1EeRaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EeRaCertRequest.h" diff --git a/certgen/asncodec/EeRaCertRequest.h b/certgen/asncodec/EeRaCertRequest.h index 9b3567e7c21e9e5dc5bb36dde5bfe3d75472ce86..50d6c6cae1f857e9160563e93ea2b55a20ef3821 100644 --- a/certgen/asncodec/EeRaCertRequest.h +++ b/certgen/asncodec/EeRaCertRequest.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1EeRaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1EeRaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/EeRaCertRequestSpdu.c b/certgen/asncodec/EeRaCertRequestSpdu.c index 8bde0c0e066859c5809fb3482040a4eca2cbe110..424a16f1986db9f07e6a114026c6012ab5d63052 100644 --- a/certgen/asncodec/EeRaCertRequestSpdu.c +++ b/certgen/asncodec/EeRaCertRequestSpdu.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EeRaCertRequestSpdu.h" diff --git a/certgen/asncodec/EeRaCertRequestSpdu.h b/certgen/asncodec/EeRaCertRequestSpdu.h index 30ac7f88c91d4c8bc9a8afdeb4d293b43a00a367..cc0672b2bf383d20eae313ef877951c2d4a6fac7 100644 --- a/certgen/asncodec/EeRaCertRequestSpdu.h +++ b/certgen/asncodec/EeRaCertRequestSpdu.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/EeRaDownloadRequest.c b/certgen/asncodec/EeRaDownloadRequest.c index ea1759f3fe9950653746b48a54c342677b7156c1..6ec4b4a6e97f1c06d2042659835c218a73e4f514 100644 --- a/certgen/asncodec/EeRaDownloadRequest.c +++ b/certgen/asncodec/EeRaDownloadRequest.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1EeRaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1EeRaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EeRaDownloadRequest.h" diff --git a/certgen/asncodec/EeRaDownloadRequest.h b/certgen/asncodec/EeRaDownloadRequest.h index a4c4cb3145e9f020f067884a00a96c9babf7d6fa..996824826ca8a18cd6e866362edade9827f9ecb3 100644 --- a/certgen/asncodec/EeRaDownloadRequest.h +++ b/certgen/asncodec/EeRaDownloadRequest.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1EeRaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1EeRaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/EeRaDownloadRequestPlainSpdu.c b/certgen/asncodec/EeRaDownloadRequestPlainSpdu.c index f2307ddf2220803b26636f5fa8d57d925372747c..35e1da821ed2723872931246c547f2d4c07f7689 100644 --- a/certgen/asncodec/EeRaDownloadRequestPlainSpdu.c +++ b/certgen/asncodec/EeRaDownloadRequestPlainSpdu.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EeRaDownloadRequestPlainSpdu.h" diff --git a/certgen/asncodec/EeRaDownloadRequestPlainSpdu.h b/certgen/asncodec/EeRaDownloadRequestPlainSpdu.h index 27c81c0972a4068dca2e7d405d96f651589fc920..535cf9c56ac358d998f797138a76d3f65a510fde 100644 --- a/certgen/asncodec/EeRaDownloadRequestPlainSpdu.h +++ b/certgen/asncodec/EeRaDownloadRequestPlainSpdu.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/EeRaDownloadRequestSpdu.c b/certgen/asncodec/EeRaDownloadRequestSpdu.c index b61a010b23278345b39cbf0a04ffa2112f7c30c1..dcbbb0be3797a1fa073153eb9ad39953c043c992 100644 --- a/certgen/asncodec/EeRaDownloadRequestSpdu.c +++ b/certgen/asncodec/EeRaDownloadRequestSpdu.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EeRaDownloadRequestSpdu.h" diff --git a/certgen/asncodec/EeRaDownloadRequestSpdu.h b/certgen/asncodec/EeRaDownloadRequestSpdu.h index b9bec02f38b5d48bdd54faa9a4acae4e23ed053b..61ec44970730b545a174c823590772bcdcbea3cd 100644 --- a/certgen/asncodec/EeRaDownloadRequestSpdu.h +++ b/certgen/asncodec/EeRaDownloadRequestSpdu.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/EeRaInterfacePdu.c b/certgen/asncodec/EeRaInterfacePdu.c index 802f2c8114f40bc8e71ce35a334d695c695a933d..cbaa4730775d468a9b58d7c3643b0642dffaa8a5 100644 --- a/certgen/asncodec/EeRaInterfacePdu.c +++ b/certgen/asncodec/EeRaInterfacePdu.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1EeRaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1EeRaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EeRaInterfacePdu.h" diff --git a/certgen/asncodec/EeRaInterfacePdu.h b/certgen/asncodec/EeRaInterfacePdu.h index 5e380fa96de3c88e5f89635eec90f94d60cfa10b..ef209795b04bc2d884c19ea1b580d54bf09b3551 100644 --- a/certgen/asncodec/EeRaInterfacePdu.h +++ b/certgen/asncodec/EeRaInterfacePdu.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1EeRaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1EeRaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/EeRaSuccessorEnrollmentCertRequestSpdu.c b/certgen/asncodec/EeRaSuccessorEnrollmentCertRequestSpdu.c index 77d58fc80445fb680279e488a67c371f113befc6..8f847cec426231a1d5d13efa6d0978d1b24487c7 100644 --- a/certgen/asncodec/EeRaSuccessorEnrollmentCertRequestSpdu.c +++ b/certgen/asncodec/EeRaSuccessorEnrollmentCertRequestSpdu.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EeRaSuccessorEnrollmentCertRequestSpdu.h" diff --git a/certgen/asncodec/EeRaSuccessorEnrollmentCertRequestSpdu.h b/certgen/asncodec/EeRaSuccessorEnrollmentCertRequestSpdu.h index 1aa4b5c53a0cc9f44fb2b1375f10a1b199255ce9..50519f59ed8f1b9017fbc059a9b0cf37508325d7 100644 --- a/certgen/asncodec/EeRaSuccessorEnrollmentCertRequestSpdu.h +++ b/certgen/asncodec/EeRaSuccessorEnrollmentCertRequestSpdu.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/EeRaX509AuthenticatedCertRequestSpdu.c b/certgen/asncodec/EeRaX509AuthenticatedCertRequestSpdu.c index e5f2869d81c0e58b853c76e1f975cec824bab761..c07b9beca10b58aef765afdcbe6b446a496df120 100644 --- a/certgen/asncodec/EeRaX509AuthenticatedCertRequestSpdu.c +++ b/certgen/asncodec/EeRaX509AuthenticatedCertRequestSpdu.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EeRaX509AuthenticatedCertRequestSpdu.h" diff --git a/certgen/asncodec/EeRaX509AuthenticatedCertRequestSpdu.h b/certgen/asncodec/EeRaX509AuthenticatedCertRequestSpdu.h index 7e01bb5d4ac30eee50bcacf4ee9d52ec2069d498..69f8a5434124737a991ec657d60b0f9981a0b7a7 100644 --- a/certgen/asncodec/EeRaX509AuthenticatedCertRequestSpdu.h +++ b/certgen/asncodec/EeRaX509AuthenticatedCertRequestSpdu.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/EeSsp.c b/certgen/asncodec/EeSsp.c index c15516cbf528c1e053ff7112f8bad4ec3f2c8bd1..47c5f81f3523ab3ce450d7021a512f4d0203a077 100644 --- a/certgen/asncodec/EeSsp.c +++ b/certgen/asncodec/EeSsp.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EeSsp.h" diff --git a/certgen/asncodec/EeSsp.h b/certgen/asncodec/EeSsp.h index 2f5922da88e7eeb7b477aeb2c4c8ac7edf694364..0223f09ccf2114c4af94b19f013069fb368de170 100644 --- a/certgen/asncodec/EeSsp.h +++ b/certgen/asncodec/EeSsp.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/ElectorSsp.c b/certgen/asncodec/ElectorSsp.c index 4dc6807d0b4957342c10da2e7bc3baadbbe2cb11..4c8083ca77ddb0815b48be35d355f7bf23a84c9b 100644 --- a/certgen/asncodec/ElectorSsp.c +++ b/certgen/asncodec/ElectorSsp.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "ElectorSsp.h" diff --git a/certgen/asncodec/ElectorSsp.h b/certgen/asncodec/ElectorSsp.h index c59679e926dda171dce173858ae80021908ad6ee..864312b111ff0f461b10ce880c946cff1cb60d27 100644 --- a/certgen/asncodec/ElectorSsp.h +++ b/certgen/asncodec/ElectorSsp.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/Elevation.c b/certgen/asncodec/Elevation.c index 1b73534af5bf37be748a4b4e78f59b7864ec4113..2061e2c2d60b4fcdd6a9a0d9d84708b00c9b2682 100644 --- a/certgen/asncodec/Elevation.c +++ b/certgen/asncodec/Elevation.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "Elevation.h" diff --git a/certgen/asncodec/Elevation.h b/certgen/asncodec/Elevation.h index 513a88ac8d443d28e9945216cb5ac1c5643bf8ff..a67b49e496db4e4bbe7e78971d8e525df3ba840b 100644 --- a/certgen/asncodec/Elevation.h +++ b/certgen/asncodec/Elevation.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/EncryptedData.c b/certgen/asncodec/EncryptedData.c index e160c12f9dce2fd4bf851cf6da654c269fc63ad8..e89a83193c81a1a3e16285886704336315dcfffd 100644 --- a/certgen/asncodec/EncryptedData.c +++ b/certgen/asncodec/EncryptedData.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EncryptedData.h" diff --git a/certgen/asncodec/EncryptedData.h b/certgen/asncodec/EncryptedData.h index 22f9f145789bd2e5610773ae55986e75e8529508..39afffd7790d327c9c0ef988aa818d38729fe550 100644 --- a/certgen/asncodec/EncryptedData.h +++ b/certgen/asncodec/EncryptedData.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/EncryptedDataEncryptionKey.c b/certgen/asncodec/EncryptedDataEncryptionKey.c index a76afed2192673db8960b9389810c813d77df4f1..5e0bac87813edf64cdb91efebfa83ca0e32ebf07 100644 --- a/certgen/asncodec/EncryptedDataEncryptionKey.c +++ b/certgen/asncodec/EncryptedDataEncryptionKey.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EncryptedDataEncryptionKey.h" diff --git a/certgen/asncodec/EncryptedDataEncryptionKey.h b/certgen/asncodec/EncryptedDataEncryptionKey.h index 418d6c13f5fbd0ed7673a7bfc69086fa74040c04..645d0049f147a82943bc1af5a0bd05b69e7e9571 100644 --- a/certgen/asncodec/EncryptedDataEncryptionKey.h +++ b/certgen/asncodec/EncryptedDataEncryptionKey.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/EncryptedIndividualPLV.c b/certgen/asncodec/EncryptedIndividualPLV.c index ed11956673b432c871a6894490e7e21aadcad706..498567126442b9090dbc2e43be5a52285ba4d8a0 100644 --- a/certgen/asncodec/EncryptedIndividualPLV.c +++ b/certgen/asncodec/EncryptedIndividualPLV.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1AcaRaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1AcaRaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EncryptedIndividualPLV.h" diff --git a/certgen/asncodec/EncryptedIndividualPLV.h b/certgen/asncodec/EncryptedIndividualPLV.h index d267fefb3acd2b2998e12b989138bb425e5613fd..9bbb5c60389f9cbbc99704be4288251ade1dd945 100644 --- a/certgen/asncodec/EncryptedIndividualPLV.h +++ b/certgen/asncodec/EncryptedIndividualPLV.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1AcaRaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1AcaRaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/EncryptionKey.c b/certgen/asncodec/EncryptionKey.c index 9a04c658d01673dac536686fadd9ac6420a3d02e..1306b1301c1733941b2dd95a4ae56bb68fdc0320 100644 --- a/certgen/asncodec/EncryptionKey.c +++ b/certgen/asncodec/EncryptionKey.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EncryptionKey.h" diff --git a/certgen/asncodec/EncryptionKey.h b/certgen/asncodec/EncryptionKey.h index 73fdc2b58751b91a336c30abd1e37562a592b25b..fbc2579bbd7443b8bf139962fb7c09b053cff1c7 100644 --- a/certgen/asncodec/EncryptionKey.h +++ b/certgen/asncodec/EncryptionKey.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/EndEntityType.c b/certgen/asncodec/EndEntityType.c index 2d6b9fcf06bcfbe1c9205e0658d596697de5ac2b..2cae8dd5da4096e61d0e88ea9b4a4b44e605c10c 100644 --- a/certgen/asncodec/EndEntityType.c +++ b/certgen/asncodec/EndEntityType.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EndEntityType.h" diff --git a/certgen/asncodec/EndEntityType.h b/certgen/asncodec/EndEntityType.h index 010517665ce90b870078433e104d231c569a0727..1849a3063c7687294ce67697fbc9d95e69ad8bbc 100644 --- a/certgen/asncodec/EndEntityType.h +++ b/certgen/asncodec/EndEntityType.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/EnrolmentRequestMessage.c b/certgen/asncodec/EnrolmentRequestMessage.c index 3e2b006e9fe61f858ab8c4e7772f13aaacaed7fb..73895b11d02492bdcf38c22794d44951a22423f8 100644 --- a/certgen/asncodec/EnrolmentRequestMessage.c +++ b/certgen/asncodec/EnrolmentRequestMessage.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941MessagesCa" - * found in "asn1/pki_ts102941/EtsiTs102941MessagesCA.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/pki_ts102941/EtsiTs102941MessagesCa.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EnrolmentRequestMessage.h" diff --git a/certgen/asncodec/EnrolmentRequestMessage.h b/certgen/asncodec/EnrolmentRequestMessage.h index 00b587cc64ed0eb03dc8761edc58f53924d839c7..1bf8d21cecd73161a88e298d58cec7f3d99fd702 100644 --- a/certgen/asncodec/EnrolmentRequestMessage.h +++ b/certgen/asncodec/EnrolmentRequestMessage.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941MessagesCa" - * found in "asn1/pki_ts102941/EtsiTs102941MessagesCA.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/pki_ts102941/EtsiTs102941MessagesCa.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/EnrolmentResponseCode.c b/certgen/asncodec/EnrolmentResponseCode.c index fd1fc6602964658aac6a2ecb34c6194deadfa606..8e03e4571b96033cfa3751d8f81f463d16595401 100644 --- a/certgen/asncodec/EnrolmentResponseCode.c +++ b/certgen/asncodec/EnrolmentResponseCode.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TypesEnrolment" * found in "asn1/pki_ts102941/EtsiTs102941TypesEnrolment.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EnrolmentResponseCode.h" diff --git a/certgen/asncodec/EnrolmentResponseCode.h b/certgen/asncodec/EnrolmentResponseCode.h index ac981a7c838d1cdfbaaf1b69ac8e22653bd04584..b318009246be8f6a90ffd56b6eb8bd5a08461841 100644 --- a/certgen/asncodec/EnrolmentResponseCode.h +++ b/certgen/asncodec/EnrolmentResponseCode.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TypesEnrolment" * found in "asn1/pki_ts102941/EtsiTs102941TypesEnrolment.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/EnrolmentResponseMessage.c b/certgen/asncodec/EnrolmentResponseMessage.c index c61550eef12956e586e883d3780662c0fd8000f5..4cca0234b72631dcd6d5860cc791fa1e22639889 100644 --- a/certgen/asncodec/EnrolmentResponseMessage.c +++ b/certgen/asncodec/EnrolmentResponseMessage.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941MessagesCa" - * found in "asn1/pki_ts102941/EtsiTs102941MessagesCA.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/pki_ts102941/EtsiTs102941MessagesCa.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EnrolmentResponseMessage.h" diff --git a/certgen/asncodec/EnrolmentResponseMessage.h b/certgen/asncodec/EnrolmentResponseMessage.h index 130a707cbd1271c6c889ccfc96a318a9d7f8f513..e3a24d47fbd84f133f830348f5383e93bbb41150 100644 --- a/certgen/asncodec/EnrolmentResponseMessage.h +++ b/certgen/asncodec/EnrolmentResponseMessage.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941MessagesCa" - * found in "asn1/pki_ts102941/EtsiTs102941MessagesCA.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/pki_ts102941/EtsiTs102941MessagesCa.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/EtsiOriginatingHeaderInfoExtension.c b/certgen/asncodec/EtsiOriginatingHeaderInfoExtension.c index a8a4215aa62780552f0a4eeaf03d5a1fbbc08c29..d7a333019bb256e8839be091b2e33403d3042d99 100644 --- a/certgen/asncodec/EtsiOriginatingHeaderInfoExtension.c +++ b/certgen/asncodec/EtsiOriginatingHeaderInfoExtension.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs103097ExtensionModule" * found in "asn1/sec_ts103097/EtsiTs103097ExtensionModule.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EtsiOriginatingHeaderInfoExtension.h" diff --git a/certgen/asncodec/EtsiOriginatingHeaderInfoExtension.h b/certgen/asncodec/EtsiOriginatingHeaderInfoExtension.h index cea855df4623380b3f30538237e63703ccb7537e..e72cc58205a1bd75410a2cf7b10f4cc76a136a7f 100644 --- a/certgen/asncodec/EtsiOriginatingHeaderInfoExtension.h +++ b/certgen/asncodec/EtsiOriginatingHeaderInfoExtension.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs103097ExtensionModule" * found in "asn1/sec_ts103097/EtsiTs103097ExtensionModule.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/EtsiTs102941ButterflyAuthorizationRequest-X509Signed.c b/certgen/asncodec/EtsiTs102941ButterflyAuthorizationRequest-X509Signed.c index 60851187c12a40999dc197dc1abbf43db3206f62..300db74dc6b467e259db16f310ead090230b393f 100644 --- a/certgen/asncodec/EtsiTs102941ButterflyAuthorizationRequest-X509Signed.c +++ b/certgen/asncodec/EtsiTs102941ButterflyAuthorizationRequest-X509Signed.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TypesAuthorization" * found in "asn1/pki_ts102941/EtsiTs102941TypesAuthorization.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EtsiTs102941ButterflyAuthorizationRequest-X509Signed.h" diff --git a/certgen/asncodec/EtsiTs102941ButterflyAuthorizationRequest-X509Signed.h b/certgen/asncodec/EtsiTs102941ButterflyAuthorizationRequest-X509Signed.h index 017b18fc14b575dd9631de32b44d24481f68bca2..a7fb3781e23f7f5b7872b49564ab88192a2dcfbc 100644 --- a/certgen/asncodec/EtsiTs102941ButterflyAuthorizationRequest-X509Signed.h +++ b/certgen/asncodec/EtsiTs102941ButterflyAuthorizationRequest-X509Signed.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TypesAuthorization" * found in "asn1/pki_ts102941/EtsiTs102941TypesAuthorization.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/EtsiTs102941CrlRequest.c b/certgen/asncodec/EtsiTs102941CrlRequest.c index 590622814da04a7817716edfc0af7be6beb0ab67..007f126071ab5e9e2148aa3f6348258f1602b741 100644 --- a/certgen/asncodec/EtsiTs102941CrlRequest.c +++ b/certgen/asncodec/EtsiTs102941CrlRequest.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs103097ExtensionModule" * found in "asn1/sec_ts103097/EtsiTs103097ExtensionModule.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EtsiTs102941CrlRequest.h" diff --git a/certgen/asncodec/EtsiTs102941CrlRequest.h b/certgen/asncodec/EtsiTs102941CrlRequest.h index 54073d4174d3f070b3bf3a149bb4725243d56e67..c4e6d9d38e40178c6240e5439e706de0c8b4bf24 100644 --- a/certgen/asncodec/EtsiTs102941CrlRequest.h +++ b/certgen/asncodec/EtsiTs102941CrlRequest.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs103097ExtensionModule" * found in "asn1/sec_ts103097/EtsiTs103097ExtensionModule.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/EtsiTs102941CtlRequest.c b/certgen/asncodec/EtsiTs102941CtlRequest.c index 9eef90ec38feb81b02a6d431dc3635124fa9ae22..10d76ba3a934d8b7d6d38d568d00c9245065cee6 100644 --- a/certgen/asncodec/EtsiTs102941CtlRequest.c +++ b/certgen/asncodec/EtsiTs102941CtlRequest.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs103097ExtensionModule" * found in "asn1/sec_ts103097/EtsiTs103097ExtensionModule.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EtsiTs102941CtlRequest.h" diff --git a/certgen/asncodec/EtsiTs102941CtlRequest.h b/certgen/asncodec/EtsiTs102941CtlRequest.h index f7e751ace2c459f47c043aa71c46ed184f2c3771..4086ecfe04f96729613adfc1ef5dfd546d38e17e 100644 --- a/certgen/asncodec/EtsiTs102941CtlRequest.h +++ b/certgen/asncodec/EtsiTs102941CtlRequest.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs103097ExtensionModule" * found in "asn1/sec_ts103097/EtsiTs103097ExtensionModule.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/EtsiTs102941Data.c b/certgen/asncodec/EtsiTs102941Data.c index da0d20985cc3a21bbd341c65a40660580095a717..5b27c02edb362fa49814e27647c5a7546e19171f 100644 --- a/certgen/asncodec/EtsiTs102941Data.c +++ b/certgen/asncodec/EtsiTs102941Data.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941MessagesCa" - * found in "asn1/pki_ts102941/EtsiTs102941MessagesCA.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/pki_ts102941/EtsiTs102941MessagesCa.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EtsiTs102941Data.h" diff --git a/certgen/asncodec/EtsiTs102941Data.h b/certgen/asncodec/EtsiTs102941Data.h index d92b31eaab5d4530c5fd80bcd039c4e41f46dbaf..20964d31db63b5c520f7a8f28a99877b168765c9 100644 --- a/certgen/asncodec/EtsiTs102941Data.h +++ b/certgen/asncodec/EtsiTs102941Data.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941MessagesCa" - * found in "asn1/pki_ts102941/EtsiTs102941MessagesCA.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/pki_ts102941/EtsiTs102941MessagesCa.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/EtsiTs102941DataContent.c b/certgen/asncodec/EtsiTs102941DataContent.c index d53e47a93ef13c358eb7fd8ce0442e10cc9468e1..d839cc7eb752593426447f5035aa441e6e1a3562 100644 --- a/certgen/asncodec/EtsiTs102941DataContent.c +++ b/certgen/asncodec/EtsiTs102941DataContent.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941MessagesCa" - * found in "asn1/pki_ts102941/EtsiTs102941MessagesCA.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/pki_ts102941/EtsiTs102941MessagesCa.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EtsiTs102941DataContent.h" @@ -12,11 +12,11 @@ static asn_oer_constraints_t asn_OER_type_EtsiTs102941DataContent_constr_1 CC_NO { 0, 0 }, -1}; #endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ -static asn_TYPE_member_t asn_MBR_ext1_16[] = { - { ATF_NOFLAGS, 0, offsetof(struct EtsiTs102941DataContent__ext1, butterflyAuthorizationRequest), +asn_TYPE_member_t asn_MBR_EtsiTs102941DataContent_1[] = { + { ATF_NOFLAGS, 0, offsetof(struct EtsiTs102941DataContent, choice.enrolmentRequest), (ASN_TAG_CLASS_CONTEXT | (0 << 2)), -1, /* IMPLICIT tag at current level */ - &asn_DEF_EeRaCertRequest, + &asn_DEF_InnerEcRequestSignedForPop, 0, { #if !defined(ASN_DISABLE_OER_SUPPORT) @@ -28,12 +28,12 @@ static asn_TYPE_member_t asn_MBR_ext1_16[] = { 0 }, 0, 0, /* No default value */ - "butterflyAuthorizationRequest" + "enrolmentRequest" }, - { ATF_NOFLAGS, 0, offsetof(struct EtsiTs102941DataContent__ext1, x509SignedbutterflyAuthorizationRequest), + { ATF_NOFLAGS, 0, offsetof(struct EtsiTs102941DataContent, choice.enrolmentResponse), (ASN_TAG_CLASS_CONTEXT | (1 << 2)), -1, /* IMPLICIT tag at current level */ - &asn_DEF_EtsiTs102941ButterflyAuthorizationRequest_X509Signed, + &asn_DEF_InnerEcResponse, 0, { #if !defined(ASN_DISABLE_OER_SUPPORT) @@ -45,12 +45,12 @@ static asn_TYPE_member_t asn_MBR_ext1_16[] = { 0 }, 0, 0, /* No default value */ - "x509SignedbutterflyAuthorizationRequest" + "enrolmentResponse" }, - { ATF_NOFLAGS, 0, offsetof(struct EtsiTs102941DataContent__ext1, butterflyAuthorizationResponse), + { ATF_NOFLAGS, 0, offsetof(struct EtsiTs102941DataContent, choice.authorizationRequest), (ASN_TAG_CLASS_CONTEXT | (2 << 2)), -1, /* IMPLICIT tag at current level */ - &asn_DEF_RaEeCertInfo, + &asn_DEF_InnerAtRequest, 0, { #if !defined(ASN_DISABLE_OER_SUPPORT) @@ -62,12 +62,12 @@ static asn_TYPE_member_t asn_MBR_ext1_16[] = { 0 }, 0, 0, /* No default value */ - "butterflyAuthorizationResponse" + "authorizationRequest" }, - { ATF_NOFLAGS, 0, offsetof(struct EtsiTs102941DataContent__ext1, butterflyCertificateRequest), + { ATF_NOFLAGS, 0, offsetof(struct EtsiTs102941DataContent, choice.authorizationResponse), (ASN_TAG_CLASS_CONTEXT | (3 << 2)), -1, /* IMPLICIT tag at current level */ - &asn_DEF_RaAcaCertRequest, + &asn_DEF_InnerAtResponse, 0, { #if !defined(ASN_DISABLE_OER_SUPPORT) @@ -79,12 +79,12 @@ static asn_TYPE_member_t asn_MBR_ext1_16[] = { 0 }, 0, 0, /* No default value */ - "butterflyCertificateRequest" + "authorizationResponse" }, - { ATF_NOFLAGS, 0, offsetof(struct EtsiTs102941DataContent__ext1, butterflyCertificateResponse), + { ATF_NOFLAGS, 0, offsetof(struct EtsiTs102941DataContent, choice.certificateRevocationList), (ASN_TAG_CLASS_CONTEXT | (4 << 2)), -1, /* IMPLICIT tag at current level */ - &asn_DEF_AcaRaCertResponse, + &asn_DEF_ToBeSignedCrl, 0, { #if !defined(ASN_DISABLE_OER_SUPPORT) @@ -96,12 +96,12 @@ static asn_TYPE_member_t asn_MBR_ext1_16[] = { 0 }, 0, 0, /* No default value */ - "butterflyCertificateResponse" + "certificateRevocationList" }, - { ATF_NOFLAGS, 0, offsetof(struct EtsiTs102941DataContent__ext1, butterflyAtDownloadRequest), + { ATF_NOFLAGS, 0, offsetof(struct EtsiTs102941DataContent, choice.certificateTrustListTlm), (ASN_TAG_CLASS_CONTEXT | (5 << 2)), -1, /* IMPLICIT tag at current level */ - &asn_DEF_EeRaDownloadRequest, + &asn_DEF_ToBeSignedTlmCtl, 0, { #if !defined(ASN_DISABLE_OER_SUPPORT) @@ -113,59 +113,12 @@ static asn_TYPE_member_t asn_MBR_ext1_16[] = { 0 }, 0, 0, /* No default value */ - "butterflyAtDownloadRequest" + "certificateTrustListTlm" }, -}; -static const ber_tlv_tag_t asn_DEF_ext1_tags_16[] = { - (ASN_TAG_CLASS_CONTEXT | (13 << 2)), - (ASN_TAG_CLASS_UNIVERSAL | (16 << 2)) -}; -static const asn_TYPE_tag2member_t asn_MAP_ext1_tag2el_16[] = { - { (ASN_TAG_CLASS_CONTEXT | (0 << 2)), 0, 0, 0 }, /* butterflyAuthorizationRequest */ - { (ASN_TAG_CLASS_CONTEXT | (1 << 2)), 1, 0, 0 }, /* x509SignedbutterflyAuthorizationRequest */ - { (ASN_TAG_CLASS_CONTEXT | (2 << 2)), 2, 0, 0 }, /* butterflyAuthorizationResponse */ - { (ASN_TAG_CLASS_CONTEXT | (3 << 2)), 3, 0, 0 }, /* butterflyCertificateRequest */ - { (ASN_TAG_CLASS_CONTEXT | (4 << 2)), 4, 0, 0 }, /* butterflyCertificateResponse */ - { (ASN_TAG_CLASS_CONTEXT | (5 << 2)), 5, 0, 0 } /* butterflyAtDownloadRequest */ -}; -static asn_SEQUENCE_specifics_t asn_SPC_ext1_specs_16 = { - sizeof(struct EtsiTs102941DataContent__ext1), - offsetof(struct EtsiTs102941DataContent__ext1, _asn_ctx), - asn_MAP_ext1_tag2el_16, - 6, /* Count of tags in the map */ - 0, 0, 0, /* Optional elements (not needed) */ - -1, /* First extension addition */ -}; -static /* Use -fall-defs-global to expose */ -asn_TYPE_descriptor_t asn_DEF_ext1_16 = { - "ext1", - "ext1", - &asn_OP_SEQUENCE, - asn_DEF_ext1_tags_16, - sizeof(asn_DEF_ext1_tags_16) - /sizeof(asn_DEF_ext1_tags_16[0]) - 1, /* 1 */ - asn_DEF_ext1_tags_16, /* Same as above */ - sizeof(asn_DEF_ext1_tags_16) - /sizeof(asn_DEF_ext1_tags_16[0]), /* 2 */ - { -#if !defined(ASN_DISABLE_OER_SUPPORT) - 0, -#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ -#if !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) - 0, -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) */ - SEQUENCE_constraint - }, - asn_MBR_ext1_16, - 6, /* Elements count */ - &asn_SPC_ext1_specs_16 /* Additional specs */ -}; - -asn_TYPE_member_t asn_MBR_EtsiTs102941DataContent_1[] = { - { ATF_NOFLAGS, 0, offsetof(struct EtsiTs102941DataContent, choice.enrolmentRequest), - (ASN_TAG_CLASS_CONTEXT | (0 << 2)), + { ATF_NOFLAGS, 0, offsetof(struct EtsiTs102941DataContent, choice.certificateTrustListRca), + (ASN_TAG_CLASS_CONTEXT | (6 << 2)), -1, /* IMPLICIT tag at current level */ - &asn_DEF_InnerEcRequestSignedForPop, + &asn_DEF_ToBeSignedRcaCtl, 0, { #if !defined(ASN_DISABLE_OER_SUPPORT) @@ -177,12 +130,12 @@ asn_TYPE_member_t asn_MBR_EtsiTs102941DataContent_1[] = { 0 }, 0, 0, /* No default value */ - "enrolmentRequest" + "certificateTrustListRca" }, - { ATF_NOFLAGS, 0, offsetof(struct EtsiTs102941DataContent, choice.enrolmentResponse), - (ASN_TAG_CLASS_CONTEXT | (1 << 2)), + { ATF_NOFLAGS, 0, offsetof(struct EtsiTs102941DataContent, choice.authorizationValidationRequest), + (ASN_TAG_CLASS_CONTEXT | (7 << 2)), -1, /* IMPLICIT tag at current level */ - &asn_DEF_InnerEcResponse, + &asn_DEF_AuthorizationValidationRequest, 0, { #if !defined(ASN_DISABLE_OER_SUPPORT) @@ -194,12 +147,12 @@ asn_TYPE_member_t asn_MBR_EtsiTs102941DataContent_1[] = { 0 }, 0, 0, /* No default value */ - "enrolmentResponse" + "authorizationValidationRequest" }, - { ATF_NOFLAGS, 0, offsetof(struct EtsiTs102941DataContent, choice.authorizationRequest), - (ASN_TAG_CLASS_CONTEXT | (2 << 2)), + { ATF_NOFLAGS, 0, offsetof(struct EtsiTs102941DataContent, choice.authorizationValidationResponse), + (ASN_TAG_CLASS_CONTEXT | (8 << 2)), -1, /* IMPLICIT tag at current level */ - &asn_DEF_InnerAtRequest, + &asn_DEF_AuthorizationValidationResponse, 0, { #if !defined(ASN_DISABLE_OER_SUPPORT) @@ -211,12 +164,12 @@ asn_TYPE_member_t asn_MBR_EtsiTs102941DataContent_1[] = { 0 }, 0, 0, /* No default value */ - "authorizationRequest" + "authorizationValidationResponse" }, - { ATF_NOFLAGS, 0, offsetof(struct EtsiTs102941DataContent, choice.authorizationResponse), - (ASN_TAG_CLASS_CONTEXT | (3 << 2)), + { ATF_NOFLAGS, 0, offsetof(struct EtsiTs102941DataContent, choice.caCertificateRequest), + (ASN_TAG_CLASS_CONTEXT | (9 << 2)), -1, /* IMPLICIT tag at current level */ - &asn_DEF_InnerAtResponse, + &asn_DEF_CaCertificateRequest, 0, { #if !defined(ASN_DISABLE_OER_SUPPORT) @@ -228,12 +181,12 @@ asn_TYPE_member_t asn_MBR_EtsiTs102941DataContent_1[] = { 0 }, 0, 0, /* No default value */ - "authorizationResponse" + "caCertificateRequest" }, - { ATF_NOFLAGS, 0, offsetof(struct EtsiTs102941DataContent, choice.certificateRevocationList), - (ASN_TAG_CLASS_CONTEXT | (4 << 2)), + { ATF_NOFLAGS, 0, offsetof(struct EtsiTs102941DataContent, choice.linkCertificateTlm), + (ASN_TAG_CLASS_CONTEXT | (10 << 2)), -1, /* IMPLICIT tag at current level */ - &asn_DEF_ToBeSignedCrl, + &asn_DEF_ToBeSignedLinkCertificateTlm, 0, { #if !defined(ASN_DISABLE_OER_SUPPORT) @@ -245,12 +198,12 @@ asn_TYPE_member_t asn_MBR_EtsiTs102941DataContent_1[] = { 0 }, 0, 0, /* No default value */ - "certificateRevocationList" + "linkCertificateTlm" }, - { ATF_NOFLAGS, 0, offsetof(struct EtsiTs102941DataContent, choice.certificateTrustListTlm), - (ASN_TAG_CLASS_CONTEXT | (5 << 2)), + { ATF_NOFLAGS, 0, offsetof(struct EtsiTs102941DataContent, choice.singleSignedLinkCertificateRca), + (ASN_TAG_CLASS_CONTEXT | (11 << 2)), -1, /* IMPLICIT tag at current level */ - &asn_DEF_ToBeSignedTlmCtl, + &asn_DEF_ToBeSignedLinkCertificateRca, 0, { #if !defined(ASN_DISABLE_OER_SUPPORT) @@ -262,12 +215,12 @@ asn_TYPE_member_t asn_MBR_EtsiTs102941DataContent_1[] = { 0 }, 0, 0, /* No default value */ - "certificateTrustListTlm" + "singleSignedLinkCertificateRca" }, - { ATF_NOFLAGS, 0, offsetof(struct EtsiTs102941DataContent, choice.certificateTrustListRca), - (ASN_TAG_CLASS_CONTEXT | (6 << 2)), + { ATF_NOFLAGS, 0, offsetof(struct EtsiTs102941DataContent, choice.doubleSignedlinkCertificateRca), + (ASN_TAG_CLASS_CONTEXT | (12 << 2)), -1, /* IMPLICIT tag at current level */ - &asn_DEF_ToBeSignedRcaCtl, + &asn_DEF_RcaSingleSignedLinkCertificateMessage, 0, { #if !defined(ASN_DISABLE_OER_SUPPORT) @@ -279,12 +232,12 @@ asn_TYPE_member_t asn_MBR_EtsiTs102941DataContent_1[] = { 0 }, 0, 0, /* No default value */ - "certificateTrustListRca" + "doubleSignedlinkCertificateRca" }, - { ATF_NOFLAGS, 0, offsetof(struct EtsiTs102941DataContent, choice.authorizationValidationRequest), - (ASN_TAG_CLASS_CONTEXT | (7 << 2)), + { ATF_NOFLAGS, 0, offsetof(struct EtsiTs102941DataContent, choice.butterflyAuthorizationRequest), + (ASN_TAG_CLASS_CONTEXT | (13 << 2)), -1, /* IMPLICIT tag at current level */ - &asn_DEF_AuthorizationValidationRequest, + &asn_DEF_EeRaCertRequest, 0, { #if !defined(ASN_DISABLE_OER_SUPPORT) @@ -296,12 +249,12 @@ asn_TYPE_member_t asn_MBR_EtsiTs102941DataContent_1[] = { 0 }, 0, 0, /* No default value */ - "authorizationValidationRequest" + "butterflyAuthorizationRequest" }, - { ATF_NOFLAGS, 0, offsetof(struct EtsiTs102941DataContent, choice.authorizationValidationResponse), - (ASN_TAG_CLASS_CONTEXT | (8 << 2)), + { ATF_NOFLAGS, 0, offsetof(struct EtsiTs102941DataContent, choice.x509SignedbutterflyAuthorizationRequest), + (ASN_TAG_CLASS_CONTEXT | (14 << 2)), -1, /* IMPLICIT tag at current level */ - &asn_DEF_AuthorizationValidationResponse, + &asn_DEF_EtsiTs102941ButterflyAuthorizationRequest_X509Signed, 0, { #if !defined(ASN_DISABLE_OER_SUPPORT) @@ -313,12 +266,12 @@ asn_TYPE_member_t asn_MBR_EtsiTs102941DataContent_1[] = { 0 }, 0, 0, /* No default value */ - "authorizationValidationResponse" + "x509SignedbutterflyAuthorizationRequest" }, - { ATF_NOFLAGS, 0, offsetof(struct EtsiTs102941DataContent, choice.caCertificateRequest), - (ASN_TAG_CLASS_CONTEXT | (9 << 2)), + { ATF_NOFLAGS, 0, offsetof(struct EtsiTs102941DataContent, choice.butterflyAuthorizationResponse), + (ASN_TAG_CLASS_CONTEXT | (15 << 2)), -1, /* IMPLICIT tag at current level */ - &asn_DEF_CaCertificateRequest, + &asn_DEF_RaEeCertInfo, 0, { #if !defined(ASN_DISABLE_OER_SUPPORT) @@ -330,12 +283,12 @@ asn_TYPE_member_t asn_MBR_EtsiTs102941DataContent_1[] = { 0 }, 0, 0, /* No default value */ - "caCertificateRequest" + "butterflyAuthorizationResponse" }, - { ATF_NOFLAGS, 0, offsetof(struct EtsiTs102941DataContent, choice.linkCertificateTlm), - (ASN_TAG_CLASS_CONTEXT | (10 << 2)), + { ATF_NOFLAGS, 0, offsetof(struct EtsiTs102941DataContent, choice.butterflyCertificateRequest), + (ASN_TAG_CLASS_CONTEXT | (16 << 2)), -1, /* IMPLICIT tag at current level */ - &asn_DEF_ToBeSignedLinkCertificateTlm, + &asn_DEF_RaAcaCertRequest, 0, { #if !defined(ASN_DISABLE_OER_SUPPORT) @@ -347,12 +300,12 @@ asn_TYPE_member_t asn_MBR_EtsiTs102941DataContent_1[] = { 0 }, 0, 0, /* No default value */ - "linkCertificateTlm" + "butterflyCertificateRequest" }, - { ATF_NOFLAGS, 0, offsetof(struct EtsiTs102941DataContent, choice.singleSignedLinkCertificateRca), - (ASN_TAG_CLASS_CONTEXT | (11 << 2)), + { ATF_NOFLAGS, 0, offsetof(struct EtsiTs102941DataContent, choice.butterflyCertificateResponse), + (ASN_TAG_CLASS_CONTEXT | (17 << 2)), -1, /* IMPLICIT tag at current level */ - &asn_DEF_ToBeSignedLinkCertificateRca, + &asn_DEF_AcaRaCertResponse, 0, { #if !defined(ASN_DISABLE_OER_SUPPORT) @@ -364,29 +317,12 @@ asn_TYPE_member_t asn_MBR_EtsiTs102941DataContent_1[] = { 0 }, 0, 0, /* No default value */ - "singleSignedLinkCertificateRca" + "butterflyCertificateResponse" }, - { ATF_NOFLAGS, 0, offsetof(struct EtsiTs102941DataContent, choice.doubleSignedlinkCertificateRca), - (ASN_TAG_CLASS_CONTEXT | (12 << 2)), + { ATF_NOFLAGS, 0, offsetof(struct EtsiTs102941DataContent, choice.butterflyAtDownloadRequest), + (ASN_TAG_CLASS_CONTEXT | (18 << 2)), -1, /* IMPLICIT tag at current level */ - &asn_DEF_RcaSingleSignedLinkCertificateMessage, - 0, - { -#if !defined(ASN_DISABLE_OER_SUPPORT) - 0, -#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ -#if !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) - 0, -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) */ - 0 - }, - 0, 0, /* No default value */ - "doubleSignedlinkCertificateRca" - }, - { ATF_POINTER, 1, offsetof(struct EtsiTs102941DataContent, choice.ext1), - (ASN_TAG_CLASS_CONTEXT | (13 << 2)), - 0, - &asn_DEF_ext1_16, + &asn_DEF_EeRaDownloadRequest, 0, { #if !defined(ASN_DISABLE_OER_SUPPORT) @@ -398,7 +334,7 @@ asn_TYPE_member_t asn_MBR_EtsiTs102941DataContent_1[] = { 0 }, 0, 0, /* No default value */ - "ext1" + "butterflyAtDownloadRequest" }, }; static const asn_TYPE_tag2member_t asn_MAP_EtsiTs102941DataContent_tag2el_1[] = { @@ -415,7 +351,12 @@ static const asn_TYPE_tag2member_t asn_MAP_EtsiTs102941DataContent_tag2el_1[] = { (ASN_TAG_CLASS_CONTEXT | (10 << 2)), 10, 0, 0 }, /* linkCertificateTlm */ { (ASN_TAG_CLASS_CONTEXT | (11 << 2)), 11, 0, 0 }, /* singleSignedLinkCertificateRca */ { (ASN_TAG_CLASS_CONTEXT | (12 << 2)), 12, 0, 0 }, /* doubleSignedlinkCertificateRca */ - { (ASN_TAG_CLASS_CONTEXT | (13 << 2)), 13, 0, 0 } /* ext1 */ + { (ASN_TAG_CLASS_CONTEXT | (13 << 2)), 13, 0, 0 }, /* butterflyAuthorizationRequest */ + { (ASN_TAG_CLASS_CONTEXT | (14 << 2)), 14, 0, 0 }, /* x509SignedbutterflyAuthorizationRequest */ + { (ASN_TAG_CLASS_CONTEXT | (15 << 2)), 15, 0, 0 }, /* butterflyAuthorizationResponse */ + { (ASN_TAG_CLASS_CONTEXT | (16 << 2)), 16, 0, 0 }, /* butterflyCertificateRequest */ + { (ASN_TAG_CLASS_CONTEXT | (17 << 2)), 17, 0, 0 }, /* butterflyCertificateResponse */ + { (ASN_TAG_CLASS_CONTEXT | (18 << 2)), 18, 0, 0 } /* butterflyAtDownloadRequest */ }; asn_CHOICE_specifics_t asn_SPC_EtsiTs102941DataContent_specs_1 = { sizeof(struct EtsiTs102941DataContent), @@ -423,7 +364,7 @@ asn_CHOICE_specifics_t asn_SPC_EtsiTs102941DataContent_specs_1 = { offsetof(struct EtsiTs102941DataContent, present), sizeof(((struct EtsiTs102941DataContent *)0)->present), asn_MAP_EtsiTs102941DataContent_tag2el_1, - 14, /* Count of tags in the map */ + 19, /* Count of tags in the map */ 0, 0, 10 /* Extensions start */ }; @@ -445,7 +386,7 @@ asn_TYPE_descriptor_t asn_DEF_EtsiTs102941DataContent = { CHOICE_constraint }, asn_MBR_EtsiTs102941DataContent_1, - 14, /* Elements count */ + 19, /* Elements count */ &asn_SPC_EtsiTs102941DataContent_specs_1 /* Additional specs */ }; diff --git a/certgen/asncodec/EtsiTs102941DataContent.h b/certgen/asncodec/EtsiTs102941DataContent.h index c5da275b96ea5a529ad12e12b991d5e42fb4687e..e3c64019c40552582c46da2a51fb6c3e289e143d 100644 --- a/certgen/asncodec/EtsiTs102941DataContent.h +++ b/certgen/asncodec/EtsiTs102941DataContent.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941MessagesCa" - * found in "asn1/pki_ts102941/EtsiTs102941MessagesCA.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/pki_ts102941/EtsiTs102941MessagesCa.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ @@ -26,7 +26,6 @@ #include "RaAcaCertRequest.h" #include "AcaRaCertResponse.h" #include "EeRaDownloadRequest.h" -#include #include #ifndef _EtsiTs102941DataContent_H_ #define _EtsiTs102941DataContent_H_ @@ -55,7 +54,12 @@ typedef enum EtsiTs102941DataContent_PR { EtsiTs102941DataContent_PR_linkCertificateTlm, EtsiTs102941DataContent_PR_singleSignedLinkCertificateRca, EtsiTs102941DataContent_PR_doubleSignedlinkCertificateRca, - EtsiTs102941DataContent_PR_ext1 + EtsiTs102941DataContent_PR_butterflyAuthorizationRequest, + EtsiTs102941DataContent_PR_x509SignedbutterflyAuthorizationRequest, + EtsiTs102941DataContent_PR_butterflyAuthorizationResponse, + EtsiTs102941DataContent_PR_butterflyCertificateRequest, + EtsiTs102941DataContent_PR_butterflyCertificateResponse, + EtsiTs102941DataContent_PR_butterflyAtDownloadRequest } EtsiTs102941DataContent_PR; /* EtsiTs102941DataContent */ @@ -79,17 +83,12 @@ typedef struct EtsiTs102941DataContent { ToBeSignedLinkCertificateTlm_t linkCertificateTlm; ToBeSignedLinkCertificateRca_t singleSignedLinkCertificateRca; RcaSingleSignedLinkCertificateMessage_t doubleSignedlinkCertificateRca; - struct EtsiTs102941DataContent__ext1 { - EeRaCertRequest_t butterflyAuthorizationRequest; - EtsiTs102941ButterflyAuthorizationRequest_X509Signed_t x509SignedbutterflyAuthorizationRequest; - RaEeCertInfo_t butterflyAuthorizationResponse; - RaAcaCertRequest_t butterflyCertificateRequest; - AcaRaCertResponse_t butterflyCertificateResponse; - EeRaDownloadRequest_t butterflyAtDownloadRequest; - - /* Context for parsing across buffer boundaries */ - asn_struct_ctx_t _asn_ctx; - } *ext1; + EeRaCertRequest_t butterflyAuthorizationRequest; + EtsiTs102941ButterflyAuthorizationRequest_X509Signed_t x509SignedbutterflyAuthorizationRequest; + RaEeCertInfo_t butterflyAuthorizationResponse; + RaAcaCertRequest_t butterflyCertificateRequest; + AcaRaCertResponse_t butterflyCertificateResponse; + EeRaDownloadRequest_t butterflyAtDownloadRequest; } choice; /* Context for parsing across buffer boundaries */ @@ -99,7 +98,7 @@ typedef struct EtsiTs102941DataContent { /* Implementation */ extern asn_TYPE_descriptor_t asn_DEF_EtsiTs102941DataContent; extern asn_CHOICE_specifics_t asn_SPC_EtsiTs102941DataContent_specs_1; -extern asn_TYPE_member_t asn_MBR_EtsiTs102941DataContent_1[14]; +extern asn_TYPE_member_t asn_MBR_EtsiTs102941DataContent_1[19]; #ifdef __cplusplus } diff --git a/certgen/asncodec/EtsiTs102941DeltaCtlRequest.c b/certgen/asncodec/EtsiTs102941DeltaCtlRequest.c index 034fa034e1f822c56e929cecc111198c2907f56d..aea2e9756e49574f24704f3752ae528ab04dd5a0 100644 --- a/certgen/asncodec/EtsiTs102941DeltaCtlRequest.c +++ b/certgen/asncodec/EtsiTs102941DeltaCtlRequest.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs103097ExtensionModule" * found in "asn1/sec_ts103097/EtsiTs103097ExtensionModule.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EtsiTs102941DeltaCtlRequest.h" diff --git a/certgen/asncodec/EtsiTs102941DeltaCtlRequest.h b/certgen/asncodec/EtsiTs102941DeltaCtlRequest.h index 881bfdfe179314f4cd4920a6138307ef81597268..59666a93a6d4940ef8a966ebde5d19e9bd9f10a4 100644 --- a/certgen/asncodec/EtsiTs102941DeltaCtlRequest.h +++ b/certgen/asncodec/EtsiTs102941DeltaCtlRequest.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs103097ExtensionModule" * found in "asn1/sec_ts103097/EtsiTs103097ExtensionModule.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/EtsiTs103097Certificate.c b/certgen/asncodec/EtsiTs103097Certificate.c index 7dad2cf1c91c864e31e211ddbbb6689392025608..86f89bb820829ac7b1ab35029b652d153972726e 100644 --- a/certgen/asncodec/EtsiTs103097Certificate.c +++ b/certgen/asncodec/EtsiTs103097Certificate.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs103097Module" * found in "asn1/sec_ts103097/EtsiTs103097Module.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EtsiTs103097Certificate.h" diff --git a/certgen/asncodec/EtsiTs103097Certificate.h b/certgen/asncodec/EtsiTs103097Certificate.h index c9400346d64576d8e76cae22bdc0db15f5370d07..4eccaf67d38fac3b1dad271ba0e8cb8d7fb9c58c 100644 --- a/certgen/asncodec/EtsiTs103097Certificate.h +++ b/certgen/asncodec/EtsiTs103097Certificate.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs103097Module" * found in "asn1/sec_ts103097/EtsiTs103097Module.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/EtsiTs103097Data-Encrypted-Unicast.c b/certgen/asncodec/EtsiTs103097Data-Encrypted-Unicast.c index 8eecbcfbfd634667a96714c7b903278b59de56a1..d266567226da8c16eeab255bfcc906faae4151de 100644 --- a/certgen/asncodec/EtsiTs103097Data-Encrypted-Unicast.c +++ b/certgen/asncodec/EtsiTs103097Data-Encrypted-Unicast.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs103097Module" * found in "asn1/sec_ts103097/EtsiTs103097Module.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EtsiTs103097Data-Encrypted-Unicast.h" diff --git a/certgen/asncodec/EtsiTs103097Data-Encrypted-Unicast.h b/certgen/asncodec/EtsiTs103097Data-Encrypted-Unicast.h index 585f45233727cbac9661f0b031e352703794703a..736ce39e881a56d487b3d49c02ceb54f66f80f15 100644 --- a/certgen/asncodec/EtsiTs103097Data-Encrypted-Unicast.h +++ b/certgen/asncodec/EtsiTs103097Data-Encrypted-Unicast.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs103097Module" * found in "asn1/sec_ts103097/EtsiTs103097Module.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/EtsiTs103097Data-Encrypted.c b/certgen/asncodec/EtsiTs103097Data-Encrypted.c index 2a8524ea9dfbc091cd349d8d8ee3b00eaa77775c..3d5a75e0815b1db4aee44b9e7317b7999685701d 100644 --- a/certgen/asncodec/EtsiTs103097Data-Encrypted.c +++ b/certgen/asncodec/EtsiTs103097Data-Encrypted.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs103097Module" * found in "asn1/sec_ts103097/EtsiTs103097Module.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EtsiTs103097Data-Encrypted.h" diff --git a/certgen/asncodec/EtsiTs103097Data-Encrypted.h b/certgen/asncodec/EtsiTs103097Data-Encrypted.h index 4c40a652daca45d7c0d822fbbfdc6357e706d52c..4fe401cbfc13c6e1a30d2d8f70cb528469c230eb 100644 --- a/certgen/asncodec/EtsiTs103097Data-Encrypted.h +++ b/certgen/asncodec/EtsiTs103097Data-Encrypted.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs103097Module" * found in "asn1/sec_ts103097/EtsiTs103097Module.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/EtsiTs103097Data-Signed.c b/certgen/asncodec/EtsiTs103097Data-Signed.c index 106ce3cf7ce18c4d1b302a878d453b178ad757b5..bbdd9772d4a34f7515c26d2a879820c0d0b288c7 100644 --- a/certgen/asncodec/EtsiTs103097Data-Signed.c +++ b/certgen/asncodec/EtsiTs103097Data-Signed.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs103097Module" * found in "asn1/sec_ts103097/EtsiTs103097Module.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EtsiTs103097Data-Signed.h" diff --git a/certgen/asncodec/EtsiTs103097Data-Signed.h b/certgen/asncodec/EtsiTs103097Data-Signed.h index ee8ae8afcd7a2e0a52bd8f60fc830a6535356c3c..f30f0411cc3499d19453590f8e6716422604c452 100644 --- a/certgen/asncodec/EtsiTs103097Data-Signed.h +++ b/certgen/asncodec/EtsiTs103097Data-Signed.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs103097Module" * found in "asn1/sec_ts103097/EtsiTs103097Module.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/EtsiTs103097Data-SignedAndEncrypted-Unicast.c b/certgen/asncodec/EtsiTs103097Data-SignedAndEncrypted-Unicast.c index 78b8d806615eb2cc6b81c3ce7920d01602bd8c59..02ed2b5c20db931aeb14b34a591cf0d8bc78374b 100644 --- a/certgen/asncodec/EtsiTs103097Data-SignedAndEncrypted-Unicast.c +++ b/certgen/asncodec/EtsiTs103097Data-SignedAndEncrypted-Unicast.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs103097Module" * found in "asn1/sec_ts103097/EtsiTs103097Module.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EtsiTs103097Data-SignedAndEncrypted-Unicast.h" diff --git a/certgen/asncodec/EtsiTs103097Data-SignedAndEncrypted-Unicast.h b/certgen/asncodec/EtsiTs103097Data-SignedAndEncrypted-Unicast.h index bba4c68f0698fef1e70644d59cf3c7c45ca74c48..94bc53c1f9abef4b49c14500249fe976aac19e71 100644 --- a/certgen/asncodec/EtsiTs103097Data-SignedAndEncrypted-Unicast.h +++ b/certgen/asncodec/EtsiTs103097Data-SignedAndEncrypted-Unicast.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs103097Module" * found in "asn1/sec_ts103097/EtsiTs103097Module.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/EtsiTs103097Data-SignedAndEncrypted.c b/certgen/asncodec/EtsiTs103097Data-SignedAndEncrypted.c index f71605dd106555ed9c46d27dd16e8a3f7f82bced..0b00c8cbf85699dcac1f1ed91f625c5548a672ca 100644 --- a/certgen/asncodec/EtsiTs103097Data-SignedAndEncrypted.c +++ b/certgen/asncodec/EtsiTs103097Data-SignedAndEncrypted.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs103097Module" * found in "asn1/sec_ts103097/EtsiTs103097Module.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EtsiTs103097Data-SignedAndEncrypted.h" diff --git a/certgen/asncodec/EtsiTs103097Data-SignedAndEncrypted.h b/certgen/asncodec/EtsiTs103097Data-SignedAndEncrypted.h index 19d6530ea6b97437c09bc00c22502a3bdc2a2d26..5584b1637167b583a287c65a650ea56345529cf2 100644 --- a/certgen/asncodec/EtsiTs103097Data-SignedAndEncrypted.h +++ b/certgen/asncodec/EtsiTs103097Data-SignedAndEncrypted.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs103097Module" * found in "asn1/sec_ts103097/EtsiTs103097Module.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #ifndef _EtsiTs103097Data_SignedAndEncrypted_H_ diff --git a/certgen/asncodec/EtsiTs103097Data-SignedExternalPayload.c b/certgen/asncodec/EtsiTs103097Data-SignedExternalPayload.c index 3140b60590dd9bc267006e79412ebe0b8f7fdfaf..4f414d200ddd01c4ac06c83145f7ccbcbd725bf6 100644 --- a/certgen/asncodec/EtsiTs103097Data-SignedExternalPayload.c +++ b/certgen/asncodec/EtsiTs103097Data-SignedExternalPayload.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs103097Module" * found in "asn1/sec_ts103097/EtsiTs103097Module.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EtsiTs103097Data-SignedExternalPayload.h" diff --git a/certgen/asncodec/EtsiTs103097Data-SignedExternalPayload.h b/certgen/asncodec/EtsiTs103097Data-SignedExternalPayload.h index 3b0a6c79734ce084c675eefc4a698dd0c0e8aeaf..0c3cde94867c7ff1f26efbff4c79009436b948d8 100644 --- a/certgen/asncodec/EtsiTs103097Data-SignedExternalPayload.h +++ b/certgen/asncodec/EtsiTs103097Data-SignedExternalPayload.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs103097Module" * found in "asn1/sec_ts103097/EtsiTs103097Module.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/EtsiTs103097Data-Unsecured.c b/certgen/asncodec/EtsiTs103097Data-Unsecured.c index 8f387a25d8789de7f26e0e61076594bb960beb2e..8f003df9ba681df002ac6fbd117819800c8fddcd 100644 --- a/certgen/asncodec/EtsiTs103097Data-Unsecured.c +++ b/certgen/asncodec/EtsiTs103097Data-Unsecured.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs103097Module" * found in "asn1/sec_ts103097/EtsiTs103097Module.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EtsiTs103097Data-Unsecured.h" diff --git a/certgen/asncodec/EtsiTs103097Data-Unsecured.h b/certgen/asncodec/EtsiTs103097Data-Unsecured.h index be45d345a34d0e4fb2ed4f489b6fbf0615c189b4..7b174a5a3d1a88c9e8bb90be11f42f000e1bfd6f 100644 --- a/certgen/asncodec/EtsiTs103097Data-Unsecured.h +++ b/certgen/asncodec/EtsiTs103097Data-Unsecured.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs103097Module" * found in "asn1/sec_ts103097/EtsiTs103097Module.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #ifndef _EtsiTs103097Data_Unsecured_H_ diff --git a/certgen/asncodec/EtsiTs103097Data.c b/certgen/asncodec/EtsiTs103097Data.c index 950ef910896563604e3b24c9aa164c58338a64e4..2c59b9302bde15de123ef75ad5e5b4c52baa8260 100644 --- a/certgen/asncodec/EtsiTs103097Data.c +++ b/certgen/asncodec/EtsiTs103097Data.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs103097Module" * found in "asn1/sec_ts103097/EtsiTs103097Module.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EtsiTs103097Data.h" diff --git a/certgen/asncodec/EtsiTs103097Data.h b/certgen/asncodec/EtsiTs103097Data.h index cbdf09ae23ad89ed529dd87a1cf7ded1e5a9aba8..21b7f98f95edeedfcd3b59e9b1f714dd9967964d 100644 --- a/certgen/asncodec/EtsiTs103097Data.h +++ b/certgen/asncodec/EtsiTs103097Data.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs103097Module" * found in "asn1/sec_ts103097/EtsiTs103097Module.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/EtsiTs103097HeaderInfoExtensionId.c b/certgen/asncodec/EtsiTs103097HeaderInfoExtensionId.c index c6a5c8bba0cdae3cb2eb0de380329d618a309cfa..a7d1636f55e953cafa910ee0d7914410a838b2bb 100644 --- a/certgen/asncodec/EtsiTs103097HeaderInfoExtensionId.c +++ b/certgen/asncodec/EtsiTs103097HeaderInfoExtensionId.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs103097ExtensionModule" * found in "asn1/sec_ts103097/EtsiTs103097ExtensionModule.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "EtsiTs103097HeaderInfoExtensionId.h" diff --git a/certgen/asncodec/EtsiTs103097HeaderInfoExtensionId.h b/certgen/asncodec/EtsiTs103097HeaderInfoExtensionId.h index ed34827de5fd691642353128000ae444f9901d7c..20b63f495e66a4fb4b73d4f53eb8b8261e6c259d 100644 --- a/certgen/asncodec/EtsiTs103097HeaderInfoExtensionId.h +++ b/certgen/asncodec/EtsiTs103097HeaderInfoExtensionId.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs103097ExtensionModule" * found in "asn1/sec_ts103097/EtsiTs103097ExtensionModule.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/ExpansionAlgorithmIdentifier.c b/certgen/asncodec/ExpansionAlgorithmIdentifier.c index 97d6b6c15a3fb9793a2a414763e6eeda3d389cb0..81189ff35ffcd5d12b2f84496a4e672ca5a52f15 100644 --- a/certgen/asncodec/ExpansionAlgorithmIdentifier.c +++ b/certgen/asncodec/ExpansionAlgorithmIdentifier.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2CrlBaseTypes" * found in "asn1/ieee1609.2/Ieee1609Dot2CrlBaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "ExpansionAlgorithmIdentifier.h" diff --git a/certgen/asncodec/ExpansionAlgorithmIdentifier.h b/certgen/asncodec/ExpansionAlgorithmIdentifier.h index 837d3ff7d8d7541ed472ec0d1e01cc38ea806324..4df3e0362faac428156bfffa4d66e46da1b81e56 100644 --- a/certgen/asncodec/ExpansionAlgorithmIdentifier.h +++ b/certgen/asncodec/ExpansionAlgorithmIdentifier.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2CrlBaseTypes" * found in "asn1/ieee1609.2/Ieee1609Dot2CrlBaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/ExplicitCertificate.c b/certgen/asncodec/ExplicitCertificate.c index 165283cf0f5821e3753538be0daa956fc4d380e4..80628da204a434d895a4ab1bddd9fa4cf358fe46 100644 --- a/certgen/asncodec/ExplicitCertificate.c +++ b/certgen/asncodec/ExplicitCertificate.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "ExplicitCertificate.h" diff --git a/certgen/asncodec/ExplicitCertificate.h b/certgen/asncodec/ExplicitCertificate.h index 4ccc68a01688c6a8e77aa7a22a8846937147d160..ff3ce8e7793a8f351726b8e3f371503417994e28 100644 --- a/certgen/asncodec/ExplicitCertificate.h +++ b/certgen/asncodec/ExplicitCertificate.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/ExtId.c b/certgen/asncodec/ExtId.c index efdf872142704465ea78dc69dfb1020c5074c179..7a63f7117a9c6b4473509a9b23f2dede278a43f0 100644 --- a/certgen/asncodec/ExtId.c +++ b/certgen/asncodec/ExtId.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "ExtId.h" diff --git a/certgen/asncodec/ExtId.h b/certgen/asncodec/ExtId.h index cadc8e5b195e3e3c7ca4c1a2484ab9b28f2c93c2..40c454b342292be5bef13d8bd51f43ad62b7cd44 100644 --- a/certgen/asncodec/ExtId.h +++ b/certgen/asncodec/ExtId.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/Extension.c b/certgen/asncodec/Extension.c index 4d651b93e403b803a62052160dc0f03b169c5748..5b212ff8b6ab089e55011d47b34ed79e45c33a19 100644 --- a/certgen/asncodec/Extension.c +++ b/certgen/asncodec/Extension.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "Extension.h" diff --git a/certgen/asncodec/Extension.h b/certgen/asncodec/Extension.h index e9b5a9765d112b4f7bc7ab1c22a41b8fe55fc9dd..fe7e738cc90a0ce94bd730ae5a3ce6c93b5542d4 100644 --- a/certgen/asncodec/Extension.h +++ b/certgen/asncodec/Extension.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/ExtensionModuleVersion.c b/certgen/asncodec/ExtensionModuleVersion.c index 6ea505e31e1a6ee8397662bd3d99991c0e18c589..627776d02cb25b864d997537328ecc41401b6898 100644 --- a/certgen/asncodec/ExtensionModuleVersion.c +++ b/certgen/asncodec/ExtensionModuleVersion.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs103097ExtensionModule" * found in "asn1/sec_ts103097/EtsiTs103097ExtensionModule.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "ExtensionModuleVersion.h" diff --git a/certgen/asncodec/ExtensionModuleVersion.h b/certgen/asncodec/ExtensionModuleVersion.h index 060625144109722e913e203597ffacdb1513406d..933c26134546c7f944ac163c802abbcad01a4d15 100644 --- a/certgen/asncodec/ExtensionModuleVersion.h +++ b/certgen/asncodec/ExtensionModuleVersion.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs103097ExtensionModule" * found in "asn1/sec_ts103097/EtsiTs103097ExtensionModule.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/FullCtl.c b/certgen/asncodec/FullCtl.c index c68d643ec850387de3539e360cbe5188275ec9b9..36d36b45973d5462cc2f5099fd813966e211dae8 100644 --- a/certgen/asncodec/FullCtl.c +++ b/certgen/asncodec/FullCtl.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TrustLists" * found in "asn1/pki_ts102941/EtsiTs102941TrustLists.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "FullCtl.h" diff --git a/certgen/asncodec/FullCtl.h b/certgen/asncodec/FullCtl.h index 75ba881ace1a7da267a91168c60b50ce5dd06171..b4aa09c43eca05d58e6490d955f3c9b2c153cce3 100644 --- a/certgen/asncodec/FullCtl.h +++ b/certgen/asncodec/FullCtl.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TrustLists" * found in "asn1/pki_ts102941/EtsiTs102941TrustLists.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/FullIeeeTbsCtl.c b/certgen/asncodec/FullIeeeTbsCtl.c index 94c63cc490133c22586eaf9114a0c21e165012f9..32400e42dddd39ab13c803e3c1bb0c4f02208947 100644 --- a/certgen/asncodec/FullIeeeTbsCtl.c +++ b/certgen/asncodec/FullIeeeTbsCtl.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1CertManagement" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1CertManagement.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "FullIeeeTbsCtl.h" diff --git a/certgen/asncodec/FullIeeeTbsCtl.h b/certgen/asncodec/FullIeeeTbsCtl.h index 2d6dfac5737c5572d6445edb081413934b221144..9f36bda0bd4b3a04a870c9cd4db32a50d4a5e871 100644 --- a/certgen/asncodec/FullIeeeTbsCtl.h +++ b/certgen/asncodec/FullIeeeTbsCtl.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1CertManagement" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1CertManagement.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/GeographicRegion.c b/certgen/asncodec/GeographicRegion.c index 7d616fcb53a796b0dfb803433442cc62af2be97f..afd1638a337a2d8ff0d00ffb67f9b7d1f2aa9237 100644 --- a/certgen/asncodec/GeographicRegion.c +++ b/certgen/asncodec/GeographicRegion.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "GeographicRegion.h" diff --git a/certgen/asncodec/GeographicRegion.h b/certgen/asncodec/GeographicRegion.h index feef15de495168760c5de7ec8af42fe4e4ad9310..d24a45e0bc795368a8a1560209db6e0c4f05239e 100644 --- a/certgen/asncodec/GeographicRegion.h +++ b/certgen/asncodec/GeographicRegion.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/GraphicString.c b/certgen/asncodec/GraphicString.c index b76118710ac2dd92c155f6e3b057dfaab158a151..70a780c572489455584b9fa849447115127a22aa 100644 --- a/certgen/asncodec/GraphicString.c +++ b/certgen/asncodec/GraphicString.c @@ -1,91 +1,91 @@ -/*- - * Copyright (c) 2003 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include - -/* - * GraphicString basic type description. - */ -static const ber_tlv_tag_t asn_DEF_GraphicString_tags[] = { - (ASN_TAG_CLASS_UNIVERSAL | (25 << 2)), /* [UNIVERSAL 25] IMPLICIT ...*/ - (ASN_TAG_CLASS_UNIVERSAL | (4 << 2)) /* ... OCTET STRING */ -}; -asn_TYPE_operation_t asn_OP_GraphicString = { - OCTET_STRING_free, -#if !defined(ASN_DISABLE_PRINT_SUPPORT) - OCTET_STRING_print, /* non-ascii string */ -#else - 0, -#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ - OCTET_STRING_compare, -#if !defined(ASN_DISABLE_BER_SUPPORT) - OCTET_STRING_decode_ber, /* Implemented in terms of OCTET STRING */ - OCTET_STRING_encode_der, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ -#if !defined(ASN_DISABLE_XER_SUPPORT) - OCTET_STRING_decode_xer_hex, - OCTET_STRING_encode_xer, /* Can't expect it to be ASCII/UTF8 */ -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ -#if !defined(ASN_DISABLE_JER_SUPPORT) - OCTET_STRING_encode_jer, /* Can't expect it to be ASCII/UTF8 */ -#else - 0, -#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ -#if !defined(ASN_DISABLE_OER_SUPPORT) - OCTET_STRING_decode_oer, - OCTET_STRING_encode_oer, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ -#if !defined(ASN_DISABLE_UPER_SUPPORT) - OCTET_STRING_decode_uper, /* Implemented in terms of OCTET STRING */ - OCTET_STRING_encode_uper, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ -#if !defined(ASN_DISABLE_APER_SUPPORT) - OCTET_STRING_decode_aper, /* Implemented in terms of OCTET STRING */ - OCTET_STRING_encode_aper, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ -#if !defined(ASN_DISABLE_RFILL_SUPPORT) - OCTET_STRING_random_fill, -#else - 0, -#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ - 0 /* Use generic outmost tag fetcher */ -}; -asn_TYPE_descriptor_t asn_DEF_GraphicString = { - "GraphicString", - "GraphicString", - &asn_OP_GraphicString, - asn_DEF_GraphicString_tags, - sizeof(asn_DEF_GraphicString_tags) - / sizeof(asn_DEF_GraphicString_tags[0]) - 1, - asn_DEF_GraphicString_tags, - sizeof(asn_DEF_GraphicString_tags) - / sizeof(asn_DEF_GraphicString_tags[0]), - { -#if !defined(ASN_DISABLE_OER_SUPPORT) - 0, -#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ -#if !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) - 0, -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) */ - asn_generic_unknown_constraint - }, - 0, 0, /* No members */ - 0 /* No specifics */ -}; +/*- + * Copyright (c) 2003 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include + +/* + * GraphicString basic type description. + */ +static const ber_tlv_tag_t asn_DEF_GraphicString_tags[] = { + (ASN_TAG_CLASS_UNIVERSAL | (25 << 2)), /* [UNIVERSAL 25] IMPLICIT ...*/ + (ASN_TAG_CLASS_UNIVERSAL | (4 << 2)) /* ... OCTET STRING */ +}; +asn_TYPE_operation_t asn_OP_GraphicString = { + OCTET_STRING_free, +#if !defined(ASN_DISABLE_PRINT_SUPPORT) + OCTET_STRING_print, /* non-ascii string */ +#else + 0, +#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ + OCTET_STRING_compare, +#if !defined(ASN_DISABLE_BER_SUPPORT) + OCTET_STRING_decode_ber, /* Implemented in terms of OCTET STRING */ + OCTET_STRING_encode_der, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ +#if !defined(ASN_DISABLE_XER_SUPPORT) + OCTET_STRING_decode_xer_hex, + OCTET_STRING_encode_xer, /* Can't expect it to be ASCII/UTF8 */ +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ +#if !defined(ASN_DISABLE_JER_SUPPORT) + OCTET_STRING_encode_jer, /* Can't expect it to be ASCII/UTF8 */ +#else + 0, +#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ +#if !defined(ASN_DISABLE_OER_SUPPORT) + OCTET_STRING_decode_oer, + OCTET_STRING_encode_oer, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ +#if !defined(ASN_DISABLE_UPER_SUPPORT) + OCTET_STRING_decode_uper, /* Implemented in terms of OCTET STRING */ + OCTET_STRING_encode_uper, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ +#if !defined(ASN_DISABLE_APER_SUPPORT) + OCTET_STRING_decode_aper, /* Implemented in terms of OCTET STRING */ + OCTET_STRING_encode_aper, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ +#if !defined(ASN_DISABLE_RFILL_SUPPORT) + OCTET_STRING_random_fill, +#else + 0, +#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ + 0 /* Use generic outmost tag fetcher */ +}; +asn_TYPE_descriptor_t asn_DEF_GraphicString = { + "GraphicString", + "GraphicString", + &asn_OP_GraphicString, + asn_DEF_GraphicString_tags, + sizeof(asn_DEF_GraphicString_tags) + / sizeof(asn_DEF_GraphicString_tags[0]) - 1, + asn_DEF_GraphicString_tags, + sizeof(asn_DEF_GraphicString_tags) + / sizeof(asn_DEF_GraphicString_tags[0]), + { +#if !defined(ASN_DISABLE_OER_SUPPORT) + 0, +#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ +#if !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) + 0, +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) */ + asn_generic_unknown_constraint + }, + 0, 0, /* No members */ + 0 /* No specifics */ +}; diff --git a/certgen/asncodec/GraphicString.h b/certgen/asncodec/GraphicString.h index 807e9d6b01f8c288fd4b6f825ea04af99ffa362f..08a001746f643886ab0183b024b7100e47a34126 100644 --- a/certgen/asncodec/GraphicString.h +++ b/certgen/asncodec/GraphicString.h @@ -1,56 +1,56 @@ -/*- - * Copyright (c) 2003-2017 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#ifndef _GraphicString_H_ -#define _GraphicString_H_ - -#include - -#ifdef __cplusplus -extern "C" { -#endif - -typedef OCTET_STRING_t GraphicString_t; /* Implemented via OCTET STRING */ - -extern asn_TYPE_descriptor_t asn_DEF_GraphicString; -extern asn_TYPE_operation_t asn_OP_GraphicString; - -#define GraphicString_free OCTET_STRING_free - -#if !defined(ASN_DISABLE_PRINT_SUPPORT) -#define GraphicString_print OCTET_STRING_print -#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ - -#define GraphicString_compare OCTET_STRING_compare - -#define GraphicString_constraint asn_generic_unknown_constraint - -#if !defined(ASN_DISABLE_BER_SUPPORT) -#define GraphicString_decode_ber OCTET_STRING_decode_ber -#define GraphicString_encode_der OCTET_STRING_encode_der -#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ - -#if !defined(ASN_DISABLE_XER_SUPPORT) -#define GraphicString_decode_xer OCTET_STRING_decode_xer_hex -#define GraphicString_encode_xer OCTET_STRING_encode_xer -#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ - -#if !defined(ASN_DISABLE_JER_SUPPORT) -#define GraphicString_encode_jer OCTET_STRING_encode_jer -#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ - -#if !defined(ASN_DISABLE_UPER_SUPPORT) -#define GraphicString_decode_uper OCTET_STRING_decode_uper -#define GraphicString_encode_uper OCTET_STRING_encode_uper -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ -#if !defined(ASN_DISABLE_APER_SUPPORT) -#define GraphicString_decode_aper OCTET_STRING_decode_aper -#define GraphicString_encode_aper OCTET_STRING_encode_aper -#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ - -#ifdef __cplusplus -} -#endif - -#endif /* _GraphicString_H_ */ +/*- + * Copyright (c) 2003-2017 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#ifndef _GraphicString_H_ +#define _GraphicString_H_ + +#include + +#ifdef __cplusplus +extern "C" { +#endif + +typedef OCTET_STRING_t GraphicString_t; /* Implemented via OCTET STRING */ + +extern asn_TYPE_descriptor_t asn_DEF_GraphicString; +extern asn_TYPE_operation_t asn_OP_GraphicString; + +#define GraphicString_free OCTET_STRING_free + +#if !defined(ASN_DISABLE_PRINT_SUPPORT) +#define GraphicString_print OCTET_STRING_print +#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ + +#define GraphicString_compare OCTET_STRING_compare + +#define GraphicString_constraint asn_generic_unknown_constraint + +#if !defined(ASN_DISABLE_BER_SUPPORT) +#define GraphicString_decode_ber OCTET_STRING_decode_ber +#define GraphicString_encode_der OCTET_STRING_encode_der +#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ + +#if !defined(ASN_DISABLE_XER_SUPPORT) +#define GraphicString_decode_xer OCTET_STRING_decode_xer_hex +#define GraphicString_encode_xer OCTET_STRING_encode_xer +#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ + +#if !defined(ASN_DISABLE_JER_SUPPORT) +#define GraphicString_encode_jer OCTET_STRING_encode_jer +#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ + +#if !defined(ASN_DISABLE_UPER_SUPPORT) +#define GraphicString_decode_uper OCTET_STRING_decode_uper +#define GraphicString_encode_uper OCTET_STRING_encode_uper +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ +#if !defined(ASN_DISABLE_APER_SUPPORT) +#define GraphicString_decode_aper OCTET_STRING_decode_aper +#define GraphicString_encode_aper OCTET_STRING_encode_aper +#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ + +#ifdef __cplusplus +} +#endif + +#endif /* _GraphicString_H_ */ diff --git a/certgen/asncodec/GroupCrlEntry.c b/certgen/asncodec/GroupCrlEntry.c index ba343c030df8a1c0a7a1f0ae632a6c961cde400c..d5f040de19f34d5f06a55d4743a3b39f691db5ee 100644 --- a/certgen/asncodec/GroupCrlEntry.c +++ b/certgen/asncodec/GroupCrlEntry.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2CrlBaseTypes" * found in "asn1/ieee1609.2/Ieee1609Dot2CrlBaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "GroupCrlEntry.h" diff --git a/certgen/asncodec/GroupCrlEntry.h b/certgen/asncodec/GroupCrlEntry.h index 701d99053a34d805a918ea293db7b2ce3e00761d..6ccd87cc56be2a196c45aad7718034b1c7dd45f7 100644 --- a/certgen/asncodec/GroupCrlEntry.h +++ b/certgen/asncodec/GroupCrlEntry.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2CrlBaseTypes" * found in "asn1/ieee1609.2/Ieee1609Dot2CrlBaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/GroupLinkageValue.c b/certgen/asncodec/GroupLinkageValue.c index fd43483785614fc507d51cb58800ecd2856835a4..2bd4ff314d8c2c656ecca26dbe63ab250d2321fd 100644 --- a/certgen/asncodec/GroupLinkageValue.c +++ b/certgen/asncodec/GroupLinkageValue.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "GroupLinkageValue.h" diff --git a/certgen/asncodec/GroupLinkageValue.h b/certgen/asncodec/GroupLinkageValue.h index 2a9fcdd540b5526fe27e41b8bf83612f0202e21f..ebd07eac5efc141dad017e3d336d9df6b42a5ae6 100644 --- a/certgen/asncodec/GroupLinkageValue.h +++ b/certgen/asncodec/GroupLinkageValue.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/GroupSingleSeedCrlEntry.c b/certgen/asncodec/GroupSingleSeedCrlEntry.c index 68592b87ee76a0400286dba885aa484c385099ef..f3aa0dcbe043dbc73e61b6930c083af9575186f5 100644 --- a/certgen/asncodec/GroupSingleSeedCrlEntry.c +++ b/certgen/asncodec/GroupSingleSeedCrlEntry.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2CrlBaseTypes" * found in "asn1/ieee1609.2/Ieee1609Dot2CrlBaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "GroupSingleSeedCrlEntry.h" diff --git a/certgen/asncodec/GroupSingleSeedCrlEntry.h b/certgen/asncodec/GroupSingleSeedCrlEntry.h index e80fc6dcaad159f510f9f70f5fe6753c56b6e32c..a43283acb10bcd459668d68769675b448d194217 100644 --- a/certgen/asncodec/GroupSingleSeedCrlEntry.h +++ b/certgen/asncodec/GroupSingleSeedCrlEntry.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2CrlBaseTypes" * found in "asn1/ieee1609.2/Ieee1609Dot2CrlBaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/HashAlgorithm.c b/certgen/asncodec/HashAlgorithm.c index 52f93dd415d5d1993468fbc6829d0a807654254e..4215c9bc685941d99accd74df75a385c06df5122 100644 --- a/certgen/asncodec/HashAlgorithm.c +++ b/certgen/asncodec/HashAlgorithm.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "HashAlgorithm.h" diff --git a/certgen/asncodec/HashAlgorithm.h b/certgen/asncodec/HashAlgorithm.h index fb61dcadc00ae92ea4af18370fe2d4ce3fb5bbd3..e511700e2f7044ffb993a7e45f1a3fc175bb003d 100644 --- a/certgen/asncodec/HashAlgorithm.h +++ b/certgen/asncodec/HashAlgorithm.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/HashBasedRevocationInfo.c b/certgen/asncodec/HashBasedRevocationInfo.c index d7558443984fa2c9095602f1577217589c5b3795..1cc10b22c904084f3dbaaa1778a27a21cdce406e 100644 --- a/certgen/asncodec/HashBasedRevocationInfo.c +++ b/certgen/asncodec/HashBasedRevocationInfo.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2CrlBaseTypes" * found in "asn1/ieee1609.2/Ieee1609Dot2CrlBaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "HashBasedRevocationInfo.h" diff --git a/certgen/asncodec/HashBasedRevocationInfo.h b/certgen/asncodec/HashBasedRevocationInfo.h index 2bc06e6125f8224a5f6458d425518d651c70fdbd..e7240c9ebd8ebbc7e8f740f0184e2e390bf098e0 100644 --- a/certgen/asncodec/HashBasedRevocationInfo.h +++ b/certgen/asncodec/HashBasedRevocationInfo.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2CrlBaseTypes" * found in "asn1/ieee1609.2/Ieee1609Dot2CrlBaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/HashedData.c b/certgen/asncodec/HashedData.c index 5d9ba24e9a92ad81b4a568f0a73794cfeab357b8..c7979fc5b9a872ec7e73b64b56c776625b6ff14f 100644 --- a/certgen/asncodec/HashedData.c +++ b/certgen/asncodec/HashedData.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "HashedData.h" diff --git a/certgen/asncodec/HashedData.h b/certgen/asncodec/HashedData.h index b016eea5642ab713f506a0e40905f9987ca8490d..6fd789be5fd78406286023e0ae47f66919871568 100644 --- a/certgen/asncodec/HashedData.h +++ b/certgen/asncodec/HashedData.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/HashedId10.c b/certgen/asncodec/HashedId10.c index ac47a0bce7e5b7281611194b8409ce88a9b25383..bee9d48bd5c9c52061a4a0bd3eaaefae65a790ed 100644 --- a/certgen/asncodec/HashedId10.c +++ b/certgen/asncodec/HashedId10.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "HashedId10.h" diff --git a/certgen/asncodec/HashedId10.h b/certgen/asncodec/HashedId10.h index e3f97a4b9184fe95291d09698f9746f73091f7eb..95feeb759917435870094690e4def1f7b9d0ace4 100644 --- a/certgen/asncodec/HashedId10.h +++ b/certgen/asncodec/HashedId10.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/HashedId3.c b/certgen/asncodec/HashedId3.c index 842ac5c98d08b81c7491cc9fb1b0183286b91ad3..cce218598501a2cb72288a2b56ce3da749312ed0 100644 --- a/certgen/asncodec/HashedId3.c +++ b/certgen/asncodec/HashedId3.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "HashedId3.h" diff --git a/certgen/asncodec/HashedId3.h b/certgen/asncodec/HashedId3.h index 9759572543fac1c0dca77a6b3a90d814c89ebe57..664d9a9dc0f818cb5887927ca2978785559e3e32 100644 --- a/certgen/asncodec/HashedId3.h +++ b/certgen/asncodec/HashedId3.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/HashedId32.c b/certgen/asncodec/HashedId32.c index 88bf09a5bfe17bbbea38c0abc96c3e0a65e21708..17b94ceb85351af4965f81edc59d63430c8c6f5f 100644 --- a/certgen/asncodec/HashedId32.c +++ b/certgen/asncodec/HashedId32.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "HashedId32.h" diff --git a/certgen/asncodec/HashedId32.h b/certgen/asncodec/HashedId32.h index 988c7ab429a3a89cc215b66f86b50ce61b27143e..17628bf9b59a4811fef02918c69df61a280d0ae9 100644 --- a/certgen/asncodec/HashedId32.h +++ b/certgen/asncodec/HashedId32.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/HashedId48.c b/certgen/asncodec/HashedId48.c index dd1db73f14c93b9b7e6c8265a548bf2265be32e4..d7410def8132bbf38b3481ba4cb4a23ba93bafc9 100644 --- a/certgen/asncodec/HashedId48.c +++ b/certgen/asncodec/HashedId48.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "HashedId48.h" diff --git a/certgen/asncodec/HashedId48.h b/certgen/asncodec/HashedId48.h index e8f26dd77eedfc5d31e25c04584ce43f445561d2..0ffac1ac7fdc92cda2d90ab0c95c99f62e3bc5ff 100644 --- a/certgen/asncodec/HashedId48.h +++ b/certgen/asncodec/HashedId48.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/HashedId8.c b/certgen/asncodec/HashedId8.c index bf66db09301e990a418d0ecd789151fa020252c6..81ad7b1aa3a97b5710ad8968445a4844765786d1 100644 --- a/certgen/asncodec/HashedId8.c +++ b/certgen/asncodec/HashedId8.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "HashedId8.h" diff --git a/certgen/asncodec/HashedId8.h b/certgen/asncodec/HashedId8.h index 9c42c0297c91d2fef73962f3b487ac4de1dbeed7..fff65574566cde3d6d57577274157f72da9edb99 100644 --- a/certgen/asncodec/HashedId8.h +++ b/certgen/asncodec/HashedId8.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/HeaderInfo.c b/certgen/asncodec/HeaderInfo.c index 2ea55a3558bcf2f6bdd66edfa3c0a7a8f48bd1a9..8ebf7adb0bbdc1e51802cec0c61001e7bbdc03ea 100644 --- a/certgen/asncodec/HeaderInfo.c +++ b/certgen/asncodec/HeaderInfo.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "HeaderInfo.h" diff --git a/certgen/asncodec/HeaderInfo.h b/certgen/asncodec/HeaderInfo.h index 009b61ec46b6e912b88e097d5a428e087e3e71cc..48c0047ab80cd507741a1c7f52df2e0c8e81eb75 100644 --- a/certgen/asncodec/HeaderInfo.h +++ b/certgen/asncodec/HeaderInfo.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/HeaderInfoContributorId.c b/certgen/asncodec/HeaderInfoContributorId.c index a2c8644be82f7e9cc5cf8edc93a56bbefeb21a4e..cae3b61d7e60806191a32230810ef1b1f59c3570 100644 --- a/certgen/asncodec/HeaderInfoContributorId.c +++ b/certgen/asncodec/HeaderInfoContributorId.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "HeaderInfoContributorId.h" diff --git a/certgen/asncodec/HeaderInfoContributorId.h b/certgen/asncodec/HeaderInfoContributorId.h index 2fd3a62844cee9d704d13047e427314116e8f8d4..076cca59c1dfd17492dcdc37d950e14a8f3e200a 100644 --- a/certgen/asncodec/HeaderInfoContributorId.h +++ b/certgen/asncodec/HeaderInfoContributorId.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/Hostname.c b/certgen/asncodec/Hostname.c index 3da23087478b537324451b376214cc6f35312194..cd12f2c15eeca8f4e0b096c886c00207ccfac852 100644 --- a/certgen/asncodec/Hostname.c +++ b/certgen/asncodec/Hostname.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "Hostname.h" diff --git a/certgen/asncodec/Hostname.h b/certgen/asncodec/Hostname.h index 0d55a4b9a6fd759ca11d7cd63ec8f5b0d12de902..1a324b608e14f73a09506bb5607da29967b2e585 100644 --- a/certgen/asncodec/Hostname.h +++ b/certgen/asncodec/Hostname.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/IA5String.c b/certgen/asncodec/IA5String.c index 876142d39816ad77f5d6d7f4089badc3549d2402..fc8e5ff4e916380761d2afc07d12cce14a05a272 100644 --- a/certgen/asncodec/IA5String.c +++ b/certgen/asncodec/IA5String.c @@ -1,133 +1,133 @@ -/*- - * Copyright (c) 2003 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include - -/* - * IA5String basic type description. - */ -static const ber_tlv_tag_t asn_DEF_IA5String_tags[] = { - (ASN_TAG_CLASS_UNIVERSAL | (22 << 2)), /* [UNIVERSAL 22] IMPLICIT ...*/ - (ASN_TAG_CLASS_UNIVERSAL | (4 << 2)) /* ... OCTET STRING */ -}; -#if !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) -static asn_per_constraints_t asn_DEF_IA5String_per_constraints = { - { APC_CONSTRAINED, 7, 7, 0, 0x7f }, /* Value */ - { APC_SEMI_CONSTRAINED, -1, -1, 0, 0 }, /* Size */ - 0, 0 -}; -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) */ -asn_TYPE_operation_t asn_OP_IA5String = { - OCTET_STRING_free, -#if !defined(ASN_DISABLE_PRINT_SUPPORT) - OCTET_STRING_print_utf8, /* ASCII subset */ -#else - 0, -#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ - OCTET_STRING_compare, -#if !defined(ASN_DISABLE_BER_SUPPORT) - OCTET_STRING_decode_ber, /* Implemented in terms of OCTET STRING */ - OCTET_STRING_encode_der, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ -#if !defined(ASN_DISABLE_XER_SUPPORT) - OCTET_STRING_decode_xer_utf8, - OCTET_STRING_encode_xer_utf8, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ -#if !defined(ASN_DISABLE_JER_SUPPORT) - OCTET_STRING_encode_jer_utf8, -#else - 0, -#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ -#if !defined(ASN_DISABLE_OER_SUPPORT) - OCTET_STRING_decode_oer, - OCTET_STRING_encode_oer, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ -#if !defined(ASN_DISABLE_UPER_SUPPORT) - OCTET_STRING_decode_uper, - OCTET_STRING_encode_uper, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ -#if !defined(ASN_DISABLE_APER_SUPPORT) - OCTET_STRING_decode_aper, - OCTET_STRING_encode_aper, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ -#if !defined(ASN_DISABLE_RFILL_SUPPORT) - OCTET_STRING_random_fill, -#else - 0, -#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ - 0 /* Use generic outmost tag fetcher */ -}; -asn_TYPE_descriptor_t asn_DEF_IA5String = { - "IA5String", - "IA5String", - &asn_OP_IA5String, - asn_DEF_IA5String_tags, - sizeof(asn_DEF_IA5String_tags) - / sizeof(asn_DEF_IA5String_tags[0]) - 1, - asn_DEF_IA5String_tags, - sizeof(asn_DEF_IA5String_tags) - / sizeof(asn_DEF_IA5String_tags[0]), - { -#if !defined(ASN_DISABLE_OER_SUPPORT) - 0, -#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ -#if !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) - &asn_DEF_IA5String_per_constraints, -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) */ - IA5String_constraint - }, - 0, 0, /* No members */ - 0 /* No specifics */ -}; - -int -IA5String_constraint(const asn_TYPE_descriptor_t *td, const void *sptr, - asn_app_constraint_failed_f *ctfailcb, void *app_key) { - const IA5String_t *st = (const IA5String_t *)sptr; - - if(st && st->buf) { - uint8_t *buf = st->buf; - uint8_t *end = buf + st->size; - /* - * IA5String is generally equivalent to 7bit ASCII. - * ISO/ITU-T T.50, 1963. - */ - for(; buf < end; buf++) { - if(*buf > 0x7F) { - ASN__CTFAIL(app_key, td, sptr, - "%s: value byte %ld out of range: " - "%d > 127 (%s:%d)", - td->name, - (long)((buf - st->buf) + 1), - *buf, - __FILE__, __LINE__); - return -1; - } - } - } else { - ASN__CTFAIL(app_key, td, sptr, - "%s: value not given (%s:%d)", - td->name, __FILE__, __LINE__); - return -1; - } - - return 0; -} - +/*- + * Copyright (c) 2003 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include + +/* + * IA5String basic type description. + */ +static const ber_tlv_tag_t asn_DEF_IA5String_tags[] = { + (ASN_TAG_CLASS_UNIVERSAL | (22 << 2)), /* [UNIVERSAL 22] IMPLICIT ...*/ + (ASN_TAG_CLASS_UNIVERSAL | (4 << 2)) /* ... OCTET STRING */ +}; +#if !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) +static asn_per_constraints_t asn_DEF_IA5String_per_constraints = { + { APC_CONSTRAINED, 7, 7, 0, 0x7f }, /* Value */ + { APC_SEMI_CONSTRAINED, -1, -1, 0, 0 }, /* Size */ + 0, 0 +}; +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) */ +asn_TYPE_operation_t asn_OP_IA5String = { + OCTET_STRING_free, +#if !defined(ASN_DISABLE_PRINT_SUPPORT) + OCTET_STRING_print_utf8, /* ASCII subset */ +#else + 0, +#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ + OCTET_STRING_compare, +#if !defined(ASN_DISABLE_BER_SUPPORT) + OCTET_STRING_decode_ber, /* Implemented in terms of OCTET STRING */ + OCTET_STRING_encode_der, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ +#if !defined(ASN_DISABLE_XER_SUPPORT) + OCTET_STRING_decode_xer_utf8, + OCTET_STRING_encode_xer_utf8, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ +#if !defined(ASN_DISABLE_JER_SUPPORT) + OCTET_STRING_encode_jer_utf8, +#else + 0, +#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ +#if !defined(ASN_DISABLE_OER_SUPPORT) + OCTET_STRING_decode_oer, + OCTET_STRING_encode_oer, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ +#if !defined(ASN_DISABLE_UPER_SUPPORT) + OCTET_STRING_decode_uper, + OCTET_STRING_encode_uper, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ +#if !defined(ASN_DISABLE_APER_SUPPORT) + OCTET_STRING_decode_aper, + OCTET_STRING_encode_aper, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ +#if !defined(ASN_DISABLE_RFILL_SUPPORT) + OCTET_STRING_random_fill, +#else + 0, +#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ + 0 /* Use generic outmost tag fetcher */ +}; +asn_TYPE_descriptor_t asn_DEF_IA5String = { + "IA5String", + "IA5String", + &asn_OP_IA5String, + asn_DEF_IA5String_tags, + sizeof(asn_DEF_IA5String_tags) + / sizeof(asn_DEF_IA5String_tags[0]) - 1, + asn_DEF_IA5String_tags, + sizeof(asn_DEF_IA5String_tags) + / sizeof(asn_DEF_IA5String_tags[0]), + { +#if !defined(ASN_DISABLE_OER_SUPPORT) + 0, +#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ +#if !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) + &asn_DEF_IA5String_per_constraints, +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) */ + IA5String_constraint + }, + 0, 0, /* No members */ + 0 /* No specifics */ +}; + +int +IA5String_constraint(const asn_TYPE_descriptor_t *td, const void *sptr, + asn_app_constraint_failed_f *ctfailcb, void *app_key) { + const IA5String_t *st = (const IA5String_t *)sptr; + + if(st && st->buf) { + uint8_t *buf = st->buf; + uint8_t *end = buf + st->size; + /* + * IA5String is generally equivalent to 7bit ASCII. + * ISO/ITU-T T.50, 1963. + */ + for(; buf < end; buf++) { + if(*buf > 0x7F) { + ASN__CTFAIL(app_key, td, sptr, + "%s: value byte %ld out of range: " + "%d > 127 (%s:%d)", + td->name, + (long)((buf - st->buf) + 1), + *buf, + __FILE__, __LINE__); + return -1; + } + } + } else { + ASN__CTFAIL(app_key, td, sptr, + "%s: value not given (%s:%d)", + td->name, __FILE__, __LINE__); + return -1; + } + + return 0; +} + diff --git a/certgen/asncodec/IA5String.h b/certgen/asncodec/IA5String.h index 195f474a19f520c0728ff4018e9c701763a6af93..d3ed0ed1ea363853a572032ed9e02295508c0fe9 100644 --- a/certgen/asncodec/IA5String.h +++ b/certgen/asncodec/IA5String.h @@ -1,59 +1,59 @@ -/*- - * Copyright (c) 2003-2017 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#ifndef _IA5String_H_ -#define _IA5String_H_ - -#include - -#ifdef __cplusplus -extern "C" { -#endif - -typedef OCTET_STRING_t IA5String_t; /* Implemented via OCTET STRING */ - -/* - * IA5String ASN.1 type definition. - */ -extern asn_TYPE_descriptor_t asn_DEF_IA5String; -extern asn_TYPE_operation_t asn_OP_IA5String; - -#define IA5String_free OCTET_STRING_free - -#if !defined(ASN_DISABLE_PRINT_SUPPORT) -#define IA5String_print OCTET_STRING_print_utf8 -#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ - -#define IA5String_compare OCTET_STRING_compare - -asn_constr_check_f IA5String_constraint; - -#if !defined(ASN_DISABLE_BER_SUPPORT) -#define IA5String_decode_ber OCTET_STRING_decode_ber -#define IA5String_encode_der OCTET_STRING_encode_der -#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ - -#if !defined(ASN_DISABLE_XER_SUPPORT) -#define IA5String_decode_xer OCTET_STRING_decode_xer_utf8 -#define IA5String_encode_xer OCTET_STRING_encode_xer_utf8 -#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ - -#if !defined(ASN_DISABLE_JER_SUPPORT) -#define IA5String_encode_jer OCTET_STRING_encode_jer_utf8 -#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ - -#if !defined(ASN_DISABLE_UPER_SUPPORT) -#define IA5String_decode_uper OCTET_STRING_decode_uper -#define IA5String_encode_uper OCTET_STRING_encode_uper -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ -#if !defined(ASN_DISABLE_APER_SUPPORT) -#define IA5String_decode_aper OCTET_STRING_decode_aper -#define IA5String_encode_aper OCTET_STRING_encode_aper -#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ - -#ifdef __cplusplus -} -#endif - -#endif /* _IA5String_H_ */ +/*- + * Copyright (c) 2003-2017 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#ifndef _IA5String_H_ +#define _IA5String_H_ + +#include + +#ifdef __cplusplus +extern "C" { +#endif + +typedef OCTET_STRING_t IA5String_t; /* Implemented via OCTET STRING */ + +/* + * IA5String ASN.1 type definition. + */ +extern asn_TYPE_descriptor_t asn_DEF_IA5String; +extern asn_TYPE_operation_t asn_OP_IA5String; + +#define IA5String_free OCTET_STRING_free + +#if !defined(ASN_DISABLE_PRINT_SUPPORT) +#define IA5String_print OCTET_STRING_print_utf8 +#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ + +#define IA5String_compare OCTET_STRING_compare + +asn_constr_check_f IA5String_constraint; + +#if !defined(ASN_DISABLE_BER_SUPPORT) +#define IA5String_decode_ber OCTET_STRING_decode_ber +#define IA5String_encode_der OCTET_STRING_encode_der +#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ + +#if !defined(ASN_DISABLE_XER_SUPPORT) +#define IA5String_decode_xer OCTET_STRING_decode_xer_utf8 +#define IA5String_encode_xer OCTET_STRING_encode_xer_utf8 +#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ + +#if !defined(ASN_DISABLE_JER_SUPPORT) +#define IA5String_encode_jer OCTET_STRING_encode_jer_utf8 +#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ + +#if !defined(ASN_DISABLE_UPER_SUPPORT) +#define IA5String_decode_uper OCTET_STRING_decode_uper +#define IA5String_encode_uper OCTET_STRING_encode_uper +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ +#if !defined(ASN_DISABLE_APER_SUPPORT) +#define IA5String_decode_aper OCTET_STRING_decode_aper +#define IA5String_encode_aper OCTET_STRING_encode_aper +#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ + +#ifdef __cplusplus +} +#endif + +#endif /* _IA5String_H_ */ diff --git a/certgen/asncodec/IMaxGroup.c b/certgen/asncodec/IMaxGroup.c index d877d082f14b6ca786f09674a4f017fee41e3944..31a5d311c3fc75df648e596173052bd4af7e2b14 100644 --- a/certgen/asncodec/IMaxGroup.c +++ b/certgen/asncodec/IMaxGroup.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2CrlBaseTypes" * found in "asn1/ieee1609.2/Ieee1609Dot2CrlBaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "IMaxGroup.h" diff --git a/certgen/asncodec/IMaxGroup.h b/certgen/asncodec/IMaxGroup.h index 536a19de9e32bd971c25870f9c36380d237c3dcb..a5587a80efbbb8ea1fef9481cff869e0278884fe 100644 --- a/certgen/asncodec/IMaxGroup.h +++ b/certgen/asncodec/IMaxGroup.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2CrlBaseTypes" * found in "asn1/ieee1609.2/Ieee1609Dot2CrlBaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/INTEGER.c b/certgen/asncodec/INTEGER.c index 095063fefdaef304b3329aa0663474abee75ac6a..05c4b1300db51f61fa92cedffd4290e6a36627b5 100644 --- a/certgen/asncodec/INTEGER.c +++ b/certgen/asncodec/INTEGER.c @@ -1,738 +1,738 @@ -/* - * Copyright (c) 2003-2019 Lev Walkin . - * All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include -#include -#include - -/* - * INTEGER basic type description. - */ -static const ber_tlv_tag_t asn_DEF_INTEGER_tags[] = { - (ASN_TAG_CLASS_UNIVERSAL | (2 << 2)) -}; -asn_TYPE_operation_t asn_OP_INTEGER = { - INTEGER_free, -#if !defined(ASN_DISABLE_PRINT_SUPPORT) - INTEGER_print, -#else - 0, -#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ - INTEGER_compare, -#if !defined(ASN_DISABLE_BER_SUPPORT) - ber_decode_primitive, - INTEGER_encode_der, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ -#if !defined(ASN_DISABLE_XER_SUPPORT) - INTEGER_decode_xer, - INTEGER_encode_xer, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ -#if !defined(ASN_DISABLE_JER_SUPPORT) - INTEGER_encode_jer, -#else - 0, -#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ -#if !defined(ASN_DISABLE_OER_SUPPORT) - INTEGER_decode_oer, /* OER decoder */ - INTEGER_encode_oer, /* Canonical OER encoder */ -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ -#if !defined(ASN_DISABLE_UPER_SUPPORT) - INTEGER_decode_uper, /* Unaligned PER decoder */ - INTEGER_encode_uper, /* Unaligned PER encoder */ -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ -#if !defined(ASN_DISABLE_APER_SUPPORT) - INTEGER_decode_aper, /* Aligned PER decoder */ - INTEGER_encode_aper, /* Aligned PER encoder */ -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ -#if !defined(ASN_DISABLE_RFILL_SUPPORT) - INTEGER_random_fill, -#else - 0, -#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ -0 /* Use generic outmost tag fetcher */ -}; -asn_TYPE_descriptor_t asn_DEF_INTEGER = { - "INTEGER", - "INTEGER", - &asn_OP_INTEGER, - asn_DEF_INTEGER_tags, - sizeof(asn_DEF_INTEGER_tags) / sizeof(asn_DEF_INTEGER_tags[0]), - asn_DEF_INTEGER_tags, /* Same as above */ - sizeof(asn_DEF_INTEGER_tags) / sizeof(asn_DEF_INTEGER_tags[0]), - { -#if !defined(ASN_DISABLE_OER_SUPPORT) - 0, -#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ -#if !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) - 0, -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) */ - asn_generic_no_constraint - }, - 0, 0, /* No members */ - 0 /* No specifics */ -}; - -/* - * INTEGER specific human-readable output. - */ -ssize_t -INTEGER__dump(const asn_TYPE_descriptor_t *td, const INTEGER_t *st, asn_app_consume_bytes_f *cb, void *app_key, int plainOrXER) { - const asn_INTEGER_specifics_t *specs = - (const asn_INTEGER_specifics_t *)td->specifics; - char scratch[32]; - uint8_t *buf = st->buf; - uint8_t *buf_end = st->buf + st->size; - intmax_t value; - ssize_t wrote = 0; - char *p; - int ret; - - if(specs && specs->field_unsigned) - ret = asn_INTEGER2umax(st, (uintmax_t *)&value); - else - ret = asn_INTEGER2imax(st, &value); - - /* Simple case: the integer size is small */ - if(ret == 0) { - const asn_INTEGER_enum_map_t *el; - el = (value >= 0 || !specs || !specs->field_unsigned) - ? INTEGER_map_value2enum(specs, value) : 0; - if(el) { - if(plainOrXER == 0) - return asn__format_to_callback(cb, app_key, - "%" ASN_PRIdMAX " (%s)", value, el->enum_name); - else - return asn__format_to_callback(cb, app_key, - "<%s/>", el->enum_name); - } else if(plainOrXER && specs && specs->strict_enumeration) { - ASN_DEBUG("ASN.1 forbids dealing with " - "unknown value of ENUMERATED type"); - errno = EPERM; - return -1; - } else { - return asn__format_to_callback(cb, app_key, - (specs && specs->field_unsigned) - ? "%" ASN_PRIuMAX - : "%" ASN_PRIdMAX, - value); - } - } else if(plainOrXER && specs && specs->strict_enumeration) { - /* - * Here and earlier, we cannot encode the ENUMERATED values - * if there is no corresponding identifier. - */ - ASN_DEBUG("ASN.1 forbids dealing with " - "unknown value of ENUMERATED type"); - errno = EPERM; - return -1; - } - - /* Output in the long xx:yy:zz... format */ - /* TODO: replace with generic algorithm (Knuth TAOCP Vol 2, 4.3.1) */ - for(p = scratch; buf < buf_end; buf++) { - const char * const h2c = "0123456789ABCDEF"; - if((p - scratch) >= (ssize_t)(sizeof(scratch) - 4)) { - /* Flush buffer */ - if(cb(scratch, p - scratch, app_key) < 0) - return -1; - wrote += p - scratch; - p = scratch; - } - *p++ = h2c[*buf >> 4]; - *p++ = h2c[*buf & 0x0F]; - *p++ = 0x3a; /* ":" */ - } - if(p != scratch) - p--; /* Remove the last ":" */ - - wrote += p - scratch; - return (cb(scratch, p - scratch, app_key) < 0) ? -1 : wrote; -} - -static int -INTEGER__compar_value2enum(const void *kp, const void *am) { - long a = *(const long *)kp; - const asn_INTEGER_enum_map_t *el = (const asn_INTEGER_enum_map_t *)am; - long b = el->nat_value; - if(a < b) return -1; - else if(a == b) return 0; - else return 1; -} - -const asn_INTEGER_enum_map_t * -INTEGER_map_value2enum(const asn_INTEGER_specifics_t *specs, long value) { - int count = specs ? specs->map_count : 0; - if(!count) return 0; - return (asn_INTEGER_enum_map_t *)bsearch(&value, specs->value2enum, - count, sizeof(specs->value2enum[0]), - INTEGER__compar_value2enum); -} - -static intmax_t -asn__integer_convert(const uint8_t *b, const uint8_t *end) { - uintmax_t value; - - /* Perform the sign initialization */ - /* Actually value = -(*b >> 7); gains nothing, yet unreadable! */ - if((*b >> 7)) { - value = (uintmax_t)(-1); - } else { - value = 0; - } - - /* Conversion engine */ - for(; b < end; b++) { - value = (value << 8) | *b; - } - - return value; -} - -int -asn_INTEGER2imax(const INTEGER_t *iptr, intmax_t *lptr) { - uint8_t *b, *end; - size_t size; - - /* Sanity checking */ - if(!iptr || !iptr->buf || !lptr) { - errno = EINVAL; - return -1; - } - - /* Cache the begin/end of the buffer */ - b = iptr->buf; /* Start of the INTEGER buffer */ - size = iptr->size; - end = b + size; /* Where to stop */ - - if(size > sizeof(intmax_t)) { - uint8_t *end1 = end - 1; - /* - * Slightly more advanced processing, - * able to process INTEGERs with >sizeof(intmax_t) bytes - * when the actual value is small, e.g. for intmax_t == int32_t - * (0x0000000000abcdef INTEGER would yield a fine 0x00abcdef int32_t) - */ - /* Skip out the insignificant leading bytes */ - for(; b < end1; b++) { - switch(*b) { - case 0x00: if((b[1] & 0x80) == 0) continue; break; - case 0xff: if((b[1] & 0x80) != 0) continue; break; - } - break; - } - - size = end - b; - if(size > sizeof(intmax_t)) { - /* Still cannot fit the sizeof(intmax_t) */ - errno = ERANGE; - return -1; - } - } - - /* Shortcut processing of a corner case */ - if(end == b) { - *lptr = 0; - return 0; - } - - *lptr = asn__integer_convert(b, end); - return 0; -} - -/* FIXME: negative INTEGER values are silently interpreted as large unsigned ones. */ -int -asn_INTEGER2umax(const INTEGER_t *iptr, uintmax_t *lptr) { - uint8_t *b, *end; - uintmax_t value; - size_t size; - - if(!iptr || !iptr->buf || !lptr) { - errno = EINVAL; - return -1; - } - - b = iptr->buf; - size = iptr->size; - end = b + size; - - /* If all extra leading bytes are zeroes, ignore them */ - for(; size > sizeof(value); b++, size--) { - if(*b) { - /* Value won't fit into uintmax_t */ - errno = ERANGE; - return -1; - } - } - - /* Conversion engine */ - for(value = 0; b < end; b++) - value = (value << 8) | *b; - - *lptr = value; - return 0; -} - -int -asn_umax2INTEGER(INTEGER_t *st, uintmax_t value) { - uint8_t *buf; - uint8_t *end; - uint8_t *b; - int shr; - - if(value <= ((~(uintmax_t)0) >> 1)) { - return asn_imax2INTEGER(st, value); - } - - buf = (uint8_t *)MALLOC(1 + sizeof(value)); - if(!buf) return -1; - - end = buf + (sizeof(value) + 1); - buf[0] = 0; /* INTEGERs are signed. 0-byte indicates positive. */ - for(b = buf + 1, shr = (sizeof(value) - 1) * 8; b < end; shr -= 8, b++) - *b = (uint8_t)(value >> shr); - - if(st->buf) FREEMEM(st->buf); - st->buf = buf; - st->size = 1 + sizeof(value); - - return 0; -} - -int -asn_imax2INTEGER(INTEGER_t *st, intmax_t value) { - uint8_t *buf, *bp; - uint8_t *p; - uint8_t *pstart; - uint8_t *pend1; - int littleEndian = 1; /* Run-time detection */ - int add; - - if(!st) { - errno = EINVAL; - return -1; - } - - buf = (uint8_t *)(long *)MALLOC(sizeof(value)); - if(!buf) return -1; - - if(*(char *)&littleEndian) { - pstart = (uint8_t *)&value + sizeof(value) - 1; - pend1 = (uint8_t *)&value; - add = -1; - } else { - pstart = (uint8_t *)&value; - pend1 = pstart + sizeof(value) - 1; - add = 1; - } - - /* - * If the contents octet consists of more than one octet, - * then bits of the first octet and bit 8 of the second octet: - * a) shall not all be ones; and - * b) shall not all be zero. - */ - for(p = pstart; p != pend1; p += add) { - switch(*p) { - case 0x00: if((*(p+add) & 0x80) == 0) - continue; - break; - case 0xff: if((*(p+add) & 0x80)) - continue; - break; - } - break; - } - /* Copy the integer body */ - for(bp = buf, pend1 += add; p != pend1; p += add) - *bp++ = *p; - - if(st->buf) FREEMEM(st->buf); - st->buf = buf; - st->size = bp - buf; - - return 0; -} - -int -asn_INTEGER2long(const INTEGER_t *iptr, long *l) { - intmax_t v; - if(asn_INTEGER2imax(iptr, &v) == 0) { - if(v < LONG_MIN || v > LONG_MAX) { - errno = ERANGE; - return -1; - } - *l = v; - return 0; - } else { - return -1; - } -} - -int -asn_INTEGER2ulong(const INTEGER_t *iptr, unsigned long *l) { - uintmax_t v; - if(asn_INTEGER2umax(iptr, &v) == 0) { - if(v > ULONG_MAX) { - errno = ERANGE; - return -1; - } - *l = v; - return 0; - } else { - return -1; - } -} - -int -asn_long2INTEGER(INTEGER_t *st, long value) { - return asn_imax2INTEGER(st, value); -} - -int -asn_ulong2INTEGER(INTEGER_t *st, unsigned long value) { - return asn_imax2INTEGER(st, value); -} - - -int -asn_uint642INTEGER(INTEGER_t *st, uint64_t value) { - uint8_t *buf; - uint8_t *end; - uint8_t *b; - int shr; - - if(value <= INT64_MAX) - return asn_int642INTEGER(st, value); - - buf = (uint8_t *)MALLOC(1 + sizeof(value)); - if(!buf) return -1; - - end = buf + (sizeof(value) + 1); - buf[0] = 0; - for(b = buf + 1, shr = (sizeof(value)-1)*8; b < end; shr -= 8, b++) - *b = (uint8_t)(value >> shr); - - if(st->buf) FREEMEM(st->buf); - st->buf = buf; - st->size = 1 + sizeof(value); - - return 0; -} - -int -asn_int642INTEGER(INTEGER_t *st, int64_t value) { - uint8_t *buf, *bp; - uint8_t *p; - uint8_t *pstart; - uint8_t *pend1; - int littleEndian = 1; /* Run-time detection */ - int add; - - if(!st) { - errno = EINVAL; - return -1; - } - - buf = (uint8_t *)MALLOC(sizeof(value)); - if(!buf) return -1; - - if(*(char *)&littleEndian) { - pstart = (uint8_t *)&value + sizeof(value) - 1; - pend1 = (uint8_t *)&value; - add = -1; - } else { - pstart = (uint8_t *)&value; - pend1 = pstart + sizeof(value) - 1; - add = 1; - } - - /* - * If the contents octet consists of more than one octet, - * then bits of the first octet and bit 8 of the second octet: - * a) shall not all be ones; and - * b) shall not all be zero. - */ - for(p = pstart; p != pend1; p += add) { - switch(*p) { - case 0x00: if((*(p+add) & 0x80) == 0) - continue; - break; - case 0xff: if((*(p+add) & 0x80)) - continue; - break; - } - break; - } - /* Copy the integer body */ - for(pstart = p, bp = buf, pend1 += add; p != pend1; p += add) - *bp++ = *p; - - if(st->buf) FREEMEM(st->buf); - st->buf = buf; - st->size = bp - buf; - - return 0; -} - -/* - * Parse the number in the given string until the given *end position, - * returning the position after the last parsed character back using the - * same (*end) pointer. - * WARNING: This behavior is different from the standard strtol/strtoimax(3). - */ -enum asn_strtox_result_e -asn_strtoimax_lim(const char *str, const char **end, intmax_t *intp) { - int sign = 1; - intmax_t value; - - const intmax_t asn1_intmax_max = ((~(uintmax_t)0) >> 1); - const intmax_t upper_boundary = asn1_intmax_max / 10; - intmax_t last_digit_max = asn1_intmax_max % 10; - - if(str >= *end) return ASN_STRTOX_ERROR_INVAL; - - switch(*str) { - case '-': - last_digit_max++; - sign = -1; - /* FALL THROUGH */ - case '+': - str++; - if(str >= *end) { - *end = str; - return ASN_STRTOX_EXPECT_MORE; - } - } - - for(value = 0; str < (*end); str++) { - if(*str >= 0x30 && *str <= 0x39) { - int d = *str - '0'; - if(value < upper_boundary) { - value = value * 10 + d; - } else if(value == upper_boundary) { - if(d <= last_digit_max) { - if(sign > 0) { - value = value * 10 + d; - } else { - sign = 1; - value = -value * 10 - d; - } - str += 1; - if(str < *end) { - // If digits continue, we're guaranteed out of range. - *end = str; - if(*str >= 0x30 && *str <= 0x39) { - return ASN_STRTOX_ERROR_RANGE; - } else { - *intp = sign * value; - return ASN_STRTOX_EXTRA_DATA; - } - } - break; - } else { - *end = str; - return ASN_STRTOX_ERROR_RANGE; - } - } else { - *end = str; - return ASN_STRTOX_ERROR_RANGE; - } - } else { - *end = str; - *intp = sign * value; - return ASN_STRTOX_EXTRA_DATA; - } - } - - *end = str; - *intp = sign * value; - return ASN_STRTOX_OK; -} - -/* - * Parse the number in the given string until the given *end position, - * returning the position after the last parsed character back using the - * same (*end) pointer. - * WARNING: This behavior is different from the standard strtoul/strtoumax(3). - */ -enum asn_strtox_result_e -asn_strtoumax_lim(const char *str, const char **end, uintmax_t *uintp) { - uintmax_t value; - - const uintmax_t asn1_uintmax_max = ((~(uintmax_t)0)); - const uintmax_t upper_boundary = asn1_uintmax_max / 10; - uintmax_t last_digit_max = asn1_uintmax_max % 10; - - if(str >= *end) return ASN_STRTOX_ERROR_INVAL; - - switch(*str) { - case '-': - return ASN_STRTOX_ERROR_INVAL; - case '+': - str++; - if(str >= *end) { - *end = str; - return ASN_STRTOX_EXPECT_MORE; - } - } - - for(value = 0; str < (*end); str++) { - if(*str >= 0x30 && *str <= 0x39) { - unsigned int d = *str - '0'; - if(value < upper_boundary) { - value = value * 10 + d; - } else if(value == upper_boundary) { - if(d <= last_digit_max) { - value = value * 10 + d; - str += 1; - if(str < *end) { - // If digits continue, we're guaranteed out of range. - *end = str; - if(*str >= 0x30 && *str <= 0x39) { - return ASN_STRTOX_ERROR_RANGE; - } else { - *uintp = value; - return ASN_STRTOX_EXTRA_DATA; - } - } - break; - } else { - *end = str; - return ASN_STRTOX_ERROR_RANGE; - } - } else { - *end = str; - return ASN_STRTOX_ERROR_RANGE; - } - } else { - *end = str; - *uintp = value; - return ASN_STRTOX_EXTRA_DATA; - } - } - - *end = str; - *uintp = value; - return ASN_STRTOX_OK; -} - -enum asn_strtox_result_e -asn_strtol_lim(const char *str, const char **end, long *lp) { - intmax_t value; - switch(asn_strtoimax_lim(str, end, &value)) { - case ASN_STRTOX_ERROR_RANGE: - return ASN_STRTOX_ERROR_RANGE; - case ASN_STRTOX_ERROR_INVAL: - return ASN_STRTOX_ERROR_INVAL; - case ASN_STRTOX_EXPECT_MORE: - return ASN_STRTOX_EXPECT_MORE; - case ASN_STRTOX_OK: - if(value >= LONG_MIN && value <= LONG_MAX) { - *lp = value; - return ASN_STRTOX_OK; - } else { - return ASN_STRTOX_ERROR_RANGE; - } - case ASN_STRTOX_EXTRA_DATA: - if(value >= LONG_MIN && value <= LONG_MAX) { - *lp = value; - return ASN_STRTOX_EXTRA_DATA; - } else { - return ASN_STRTOX_ERROR_RANGE; - } - } - - assert(!"Unreachable"); - return ASN_STRTOX_ERROR_INVAL; -} - -enum asn_strtox_result_e -asn_strtoul_lim(const char *str, const char **end, unsigned long *ulp) { - uintmax_t value; - switch(asn_strtoumax_lim(str, end, &value)) { - case ASN_STRTOX_ERROR_RANGE: - return ASN_STRTOX_ERROR_RANGE; - case ASN_STRTOX_ERROR_INVAL: - return ASN_STRTOX_ERROR_INVAL; - case ASN_STRTOX_EXPECT_MORE: - return ASN_STRTOX_EXPECT_MORE; - case ASN_STRTOX_OK: - if(value <= ULONG_MAX) { - *ulp = value; - return ASN_STRTOX_OK; - } else { - return ASN_STRTOX_ERROR_RANGE; - } - case ASN_STRTOX_EXTRA_DATA: - if(value <= ULONG_MAX) { - *ulp = value; - return ASN_STRTOX_EXTRA_DATA; - } else { - return ASN_STRTOX_ERROR_RANGE; - } - } - - assert(!"Unreachable"); - return ASN_STRTOX_ERROR_INVAL; -} - -int -INTEGER_compare(const asn_TYPE_descriptor_t *td, const void *aptr, - const void *bptr) { - const INTEGER_t *a = aptr; - const INTEGER_t *b = bptr; - - (void)td; - - if(a && b) { - if(a->size && b->size) { - int sign_a = (a->buf[0] & 0x80) ? -1 : 1; - int sign_b = (b->buf[0] & 0x80) ? -1 : 1; - - if(sign_a < sign_b) return -1; - if(sign_a > sign_b) return 1; - - /* The shortest integer wins, unless comparing negatives */ - if(a->size < b->size) { - return -1 * sign_a; - } else if(a->size > b->size) { - return 1 * sign_b; - } - - return sign_a * memcmp(a->buf, b->buf, a->size); - } else if(a->size) { - int sign = (a->buf[0] & 0x80) ? -1 : 1; - return (1) * sign; - } else if(b->size) { - int sign = (a->buf[0] & 0x80) ? -1 : 1; - return (-1) * sign; - } else { - return 0; - } - } else if(!a && !b) { - return 0; - } else if(!a) { - return -1; - } else { - return 1; - } - -} +/* + * Copyright (c) 2003-2019 Lev Walkin . + * All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include +#include +#include + +/* + * INTEGER basic type description. + */ +static const ber_tlv_tag_t asn_DEF_INTEGER_tags[] = { + (ASN_TAG_CLASS_UNIVERSAL | (2 << 2)) +}; +asn_TYPE_operation_t asn_OP_INTEGER = { + INTEGER_free, +#if !defined(ASN_DISABLE_PRINT_SUPPORT) + INTEGER_print, +#else + 0, +#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ + INTEGER_compare, +#if !defined(ASN_DISABLE_BER_SUPPORT) + ber_decode_primitive, + INTEGER_encode_der, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ +#if !defined(ASN_DISABLE_XER_SUPPORT) + INTEGER_decode_xer, + INTEGER_encode_xer, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ +#if !defined(ASN_DISABLE_JER_SUPPORT) + INTEGER_encode_jer, +#else + 0, +#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ +#if !defined(ASN_DISABLE_OER_SUPPORT) + INTEGER_decode_oer, /* OER decoder */ + INTEGER_encode_oer, /* Canonical OER encoder */ +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ +#if !defined(ASN_DISABLE_UPER_SUPPORT) + INTEGER_decode_uper, /* Unaligned PER decoder */ + INTEGER_encode_uper, /* Unaligned PER encoder */ +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ +#if !defined(ASN_DISABLE_APER_SUPPORT) + INTEGER_decode_aper, /* Aligned PER decoder */ + INTEGER_encode_aper, /* Aligned PER encoder */ +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ +#if !defined(ASN_DISABLE_RFILL_SUPPORT) + INTEGER_random_fill, +#else + 0, +#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ +0 /* Use generic outmost tag fetcher */ +}; +asn_TYPE_descriptor_t asn_DEF_INTEGER = { + "INTEGER", + "INTEGER", + &asn_OP_INTEGER, + asn_DEF_INTEGER_tags, + sizeof(asn_DEF_INTEGER_tags) / sizeof(asn_DEF_INTEGER_tags[0]), + asn_DEF_INTEGER_tags, /* Same as above */ + sizeof(asn_DEF_INTEGER_tags) / sizeof(asn_DEF_INTEGER_tags[0]), + { +#if !defined(ASN_DISABLE_OER_SUPPORT) + 0, +#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ +#if !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) + 0, +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) */ + asn_generic_no_constraint + }, + 0, 0, /* No members */ + 0 /* No specifics */ +}; + +/* + * INTEGER specific human-readable output. + */ +ssize_t +INTEGER__dump(const asn_TYPE_descriptor_t *td, const INTEGER_t *st, asn_app_consume_bytes_f *cb, void *app_key, int plainOrXER) { + const asn_INTEGER_specifics_t *specs = + (const asn_INTEGER_specifics_t *)td->specifics; + char scratch[32]; + uint8_t *buf = st->buf; + uint8_t *buf_end = st->buf + st->size; + intmax_t value; + ssize_t wrote = 0; + char *p; + int ret; + + if(specs && specs->field_unsigned) + ret = asn_INTEGER2umax(st, (uintmax_t *)&value); + else + ret = asn_INTEGER2imax(st, &value); + + /* Simple case: the integer size is small */ + if(ret == 0) { + const asn_INTEGER_enum_map_t *el; + el = (value >= 0 || !specs || !specs->field_unsigned) + ? INTEGER_map_value2enum(specs, value) : 0; + if(el) { + if(plainOrXER == 0) + return asn__format_to_callback(cb, app_key, + "%" ASN_PRIdMAX " (%s)", value, el->enum_name); + else + return asn__format_to_callback(cb, app_key, + "<%s/>", el->enum_name); + } else if(plainOrXER && specs && specs->strict_enumeration) { + ASN_DEBUG("ASN.1 forbids dealing with " + "unknown value of ENUMERATED type"); + errno = EPERM; + return -1; + } else { + return asn__format_to_callback(cb, app_key, + (specs && specs->field_unsigned) + ? "%" ASN_PRIuMAX + : "%" ASN_PRIdMAX, + value); + } + } else if(plainOrXER && specs && specs->strict_enumeration) { + /* + * Here and earlier, we cannot encode the ENUMERATED values + * if there is no corresponding identifier. + */ + ASN_DEBUG("ASN.1 forbids dealing with " + "unknown value of ENUMERATED type"); + errno = EPERM; + return -1; + } + + /* Output in the long xx:yy:zz... format */ + /* TODO: replace with generic algorithm (Knuth TAOCP Vol 2, 4.3.1) */ + for(p = scratch; buf < buf_end; buf++) { + const char * const h2c = "0123456789ABCDEF"; + if((p - scratch) >= (ssize_t)(sizeof(scratch) - 4)) { + /* Flush buffer */ + if(cb(scratch, p - scratch, app_key) < 0) + return -1; + wrote += p - scratch; + p = scratch; + } + *p++ = h2c[*buf >> 4]; + *p++ = h2c[*buf & 0x0F]; + *p++ = 0x3a; /* ":" */ + } + if(p != scratch) + p--; /* Remove the last ":" */ + + wrote += p - scratch; + return (cb(scratch, p - scratch, app_key) < 0) ? -1 : wrote; +} + +static int +INTEGER__compar_value2enum(const void *kp, const void *am) { + long a = *(const long *)kp; + const asn_INTEGER_enum_map_t *el = (const asn_INTEGER_enum_map_t *)am; + long b = el->nat_value; + if(a < b) return -1; + else if(a == b) return 0; + else return 1; +} + +const asn_INTEGER_enum_map_t * +INTEGER_map_value2enum(const asn_INTEGER_specifics_t *specs, long value) { + int count = specs ? specs->map_count : 0; + if(!count) return 0; + return (asn_INTEGER_enum_map_t *)bsearch(&value, specs->value2enum, + count, sizeof(specs->value2enum[0]), + INTEGER__compar_value2enum); +} + +static intmax_t +asn__integer_convert(const uint8_t *b, const uint8_t *end) { + uintmax_t value; + + /* Perform the sign initialization */ + /* Actually value = -(*b >> 7); gains nothing, yet unreadable! */ + if((*b >> 7)) { + value = (uintmax_t)(-1); + } else { + value = 0; + } + + /* Conversion engine */ + for(; b < end; b++) { + value = (value << 8) | *b; + } + + return value; +} + +int +asn_INTEGER2imax(const INTEGER_t *iptr, intmax_t *lptr) { + uint8_t *b, *end; + size_t size; + + /* Sanity checking */ + if(!iptr || !iptr->buf || !lptr) { + errno = EINVAL; + return -1; + } + + /* Cache the begin/end of the buffer */ + b = iptr->buf; /* Start of the INTEGER buffer */ + size = iptr->size; + end = b + size; /* Where to stop */ + + if(size > sizeof(intmax_t)) { + uint8_t *end1 = end - 1; + /* + * Slightly more advanced processing, + * able to process INTEGERs with >sizeof(intmax_t) bytes + * when the actual value is small, e.g. for intmax_t == int32_t + * (0x0000000000abcdef INTEGER would yield a fine 0x00abcdef int32_t) + */ + /* Skip out the insignificant leading bytes */ + for(; b < end1; b++) { + switch(*b) { + case 0x00: if((b[1] & 0x80) == 0) continue; break; + case 0xff: if((b[1] & 0x80) != 0) continue; break; + } + break; + } + + size = end - b; + if(size > sizeof(intmax_t)) { + /* Still cannot fit the sizeof(intmax_t) */ + errno = ERANGE; + return -1; + } + } + + /* Shortcut processing of a corner case */ + if(end == b) { + *lptr = 0; + return 0; + } + + *lptr = asn__integer_convert(b, end); + return 0; +} + +/* FIXME: negative INTEGER values are silently interpreted as large unsigned ones. */ +int +asn_INTEGER2umax(const INTEGER_t *iptr, uintmax_t *lptr) { + uint8_t *b, *end; + uintmax_t value; + size_t size; + + if(!iptr || !iptr->buf || !lptr) { + errno = EINVAL; + return -1; + } + + b = iptr->buf; + size = iptr->size; + end = b + size; + + /* If all extra leading bytes are zeroes, ignore them */ + for(; size > sizeof(value); b++, size--) { + if(*b) { + /* Value won't fit into uintmax_t */ + errno = ERANGE; + return -1; + } + } + + /* Conversion engine */ + for(value = 0; b < end; b++) + value = (value << 8) | *b; + + *lptr = value; + return 0; +} + +int +asn_umax2INTEGER(INTEGER_t *st, uintmax_t value) { + uint8_t *buf; + uint8_t *end; + uint8_t *b; + int shr; + + if(value <= ((~(uintmax_t)0) >> 1)) { + return asn_imax2INTEGER(st, value); + } + + buf = (uint8_t *)MALLOC(1 + sizeof(value)); + if(!buf) return -1; + + end = buf + (sizeof(value) + 1); + buf[0] = 0; /* INTEGERs are signed. 0-byte indicates positive. */ + for(b = buf + 1, shr = (sizeof(value) - 1) * 8; b < end; shr -= 8, b++) + *b = (uint8_t)(value >> shr); + + if(st->buf) FREEMEM(st->buf); + st->buf = buf; + st->size = 1 + sizeof(value); + + return 0; +} + +int +asn_imax2INTEGER(INTEGER_t *st, intmax_t value) { + uint8_t *buf, *bp; + uint8_t *p; + uint8_t *pstart; + uint8_t *pend1; + int littleEndian = 1; /* Run-time detection */ + int add; + + if(!st) { + errno = EINVAL; + return -1; + } + + buf = (uint8_t *)(long *)MALLOC(sizeof(value)); + if(!buf) return -1; + + if(*(char *)&littleEndian) { + pstart = (uint8_t *)&value + sizeof(value) - 1; + pend1 = (uint8_t *)&value; + add = -1; + } else { + pstart = (uint8_t *)&value; + pend1 = pstart + sizeof(value) - 1; + add = 1; + } + + /* + * If the contents octet consists of more than one octet, + * then bits of the first octet and bit 8 of the second octet: + * a) shall not all be ones; and + * b) shall not all be zero. + */ + for(p = pstart; p != pend1; p += add) { + switch(*p) { + case 0x00: if((*(p+add) & 0x80) == 0) + continue; + break; + case 0xff: if((*(p+add) & 0x80)) + continue; + break; + } + break; + } + /* Copy the integer body */ + for(bp = buf, pend1 += add; p != pend1; p += add) + *bp++ = *p; + + if(st->buf) FREEMEM(st->buf); + st->buf = buf; + st->size = bp - buf; + + return 0; +} + +int +asn_INTEGER2long(const INTEGER_t *iptr, long *l) { + intmax_t v; + if(asn_INTEGER2imax(iptr, &v) == 0) { + if(v < LONG_MIN || v > LONG_MAX) { + errno = ERANGE; + return -1; + } + *l = v; + return 0; + } else { + return -1; + } +} + +int +asn_INTEGER2ulong(const INTEGER_t *iptr, unsigned long *l) { + uintmax_t v; + if(asn_INTEGER2umax(iptr, &v) == 0) { + if(v > ULONG_MAX) { + errno = ERANGE; + return -1; + } + *l = v; + return 0; + } else { + return -1; + } +} + +int +asn_long2INTEGER(INTEGER_t *st, long value) { + return asn_imax2INTEGER(st, value); +} + +int +asn_ulong2INTEGER(INTEGER_t *st, unsigned long value) { + return asn_imax2INTEGER(st, value); +} + + +int +asn_uint642INTEGER(INTEGER_t *st, uint64_t value) { + uint8_t *buf; + uint8_t *end; + uint8_t *b; + int shr; + + if(value <= INT64_MAX) + return asn_int642INTEGER(st, value); + + buf = (uint8_t *)MALLOC(1 + sizeof(value)); + if(!buf) return -1; + + end = buf + (sizeof(value) + 1); + buf[0] = 0; + for(b = buf + 1, shr = (sizeof(value)-1)*8; b < end; shr -= 8, b++) + *b = (uint8_t)(value >> shr); + + if(st->buf) FREEMEM(st->buf); + st->buf = buf; + st->size = 1 + sizeof(value); + + return 0; +} + +int +asn_int642INTEGER(INTEGER_t *st, int64_t value) { + uint8_t *buf, *bp; + uint8_t *p; + uint8_t *pstart; + uint8_t *pend1; + int littleEndian = 1; /* Run-time detection */ + int add; + + if(!st) { + errno = EINVAL; + return -1; + } + + buf = (uint8_t *)MALLOC(sizeof(value)); + if(!buf) return -1; + + if(*(char *)&littleEndian) { + pstart = (uint8_t *)&value + sizeof(value) - 1; + pend1 = (uint8_t *)&value; + add = -1; + } else { + pstart = (uint8_t *)&value; + pend1 = pstart + sizeof(value) - 1; + add = 1; + } + + /* + * If the contents octet consists of more than one octet, + * then bits of the first octet and bit 8 of the second octet: + * a) shall not all be ones; and + * b) shall not all be zero. + */ + for(p = pstart; p != pend1; p += add) { + switch(*p) { + case 0x00: if((*(p+add) & 0x80) == 0) + continue; + break; + case 0xff: if((*(p+add) & 0x80)) + continue; + break; + } + break; + } + /* Copy the integer body */ + for(pstart = p, bp = buf, pend1 += add; p != pend1; p += add) + *bp++ = *p; + + if(st->buf) FREEMEM(st->buf); + st->buf = buf; + st->size = bp - buf; + + return 0; +} + +/* + * Parse the number in the given string until the given *end position, + * returning the position after the last parsed character back using the + * same (*end) pointer. + * WARNING: This behavior is different from the standard strtol/strtoimax(3). + */ +enum asn_strtox_result_e +asn_strtoimax_lim(const char *str, const char **end, intmax_t *intp) { + int sign = 1; + intmax_t value; + + const intmax_t asn1_intmax_max = ((~(uintmax_t)0) >> 1); + const intmax_t upper_boundary = asn1_intmax_max / 10; + intmax_t last_digit_max = asn1_intmax_max % 10; + + if(str >= *end) return ASN_STRTOX_ERROR_INVAL; + + switch(*str) { + case '-': + last_digit_max++; + sign = -1; + /* FALL THROUGH */ + case '+': + str++; + if(str >= *end) { + *end = str; + return ASN_STRTOX_EXPECT_MORE; + } + } + + for(value = 0; str < (*end); str++) { + if(*str >= 0x30 && *str <= 0x39) { + int d = *str - '0'; + if(value < upper_boundary) { + value = value * 10 + d; + } else if(value == upper_boundary) { + if(d <= last_digit_max) { + if(sign > 0) { + value = value * 10 + d; + } else { + sign = 1; + value = -value * 10 - d; + } + str += 1; + if(str < *end) { + // If digits continue, we're guaranteed out of range. + *end = str; + if(*str >= 0x30 && *str <= 0x39) { + return ASN_STRTOX_ERROR_RANGE; + } else { + *intp = sign * value; + return ASN_STRTOX_EXTRA_DATA; + } + } + break; + } else { + *end = str; + return ASN_STRTOX_ERROR_RANGE; + } + } else { + *end = str; + return ASN_STRTOX_ERROR_RANGE; + } + } else { + *end = str; + *intp = sign * value; + return ASN_STRTOX_EXTRA_DATA; + } + } + + *end = str; + *intp = sign * value; + return ASN_STRTOX_OK; +} + +/* + * Parse the number in the given string until the given *end position, + * returning the position after the last parsed character back using the + * same (*end) pointer. + * WARNING: This behavior is different from the standard strtoul/strtoumax(3). + */ +enum asn_strtox_result_e +asn_strtoumax_lim(const char *str, const char **end, uintmax_t *uintp) { + uintmax_t value; + + const uintmax_t asn1_uintmax_max = ((~(uintmax_t)0)); + const uintmax_t upper_boundary = asn1_uintmax_max / 10; + uintmax_t last_digit_max = asn1_uintmax_max % 10; + + if(str >= *end) return ASN_STRTOX_ERROR_INVAL; + + switch(*str) { + case '-': + return ASN_STRTOX_ERROR_INVAL; + case '+': + str++; + if(str >= *end) { + *end = str; + return ASN_STRTOX_EXPECT_MORE; + } + } + + for(value = 0; str < (*end); str++) { + if(*str >= 0x30 && *str <= 0x39) { + unsigned int d = *str - '0'; + if(value < upper_boundary) { + value = value * 10 + d; + } else if(value == upper_boundary) { + if(d <= last_digit_max) { + value = value * 10 + d; + str += 1; + if(str < *end) { + // If digits continue, we're guaranteed out of range. + *end = str; + if(*str >= 0x30 && *str <= 0x39) { + return ASN_STRTOX_ERROR_RANGE; + } else { + *uintp = value; + return ASN_STRTOX_EXTRA_DATA; + } + } + break; + } else { + *end = str; + return ASN_STRTOX_ERROR_RANGE; + } + } else { + *end = str; + return ASN_STRTOX_ERROR_RANGE; + } + } else { + *end = str; + *uintp = value; + return ASN_STRTOX_EXTRA_DATA; + } + } + + *end = str; + *uintp = value; + return ASN_STRTOX_OK; +} + +enum asn_strtox_result_e +asn_strtol_lim(const char *str, const char **end, long *lp) { + intmax_t value; + switch(asn_strtoimax_lim(str, end, &value)) { + case ASN_STRTOX_ERROR_RANGE: + return ASN_STRTOX_ERROR_RANGE; + case ASN_STRTOX_ERROR_INVAL: + return ASN_STRTOX_ERROR_INVAL; + case ASN_STRTOX_EXPECT_MORE: + return ASN_STRTOX_EXPECT_MORE; + case ASN_STRTOX_OK: + if(value >= LONG_MIN && value <= LONG_MAX) { + *lp = value; + return ASN_STRTOX_OK; + } else { + return ASN_STRTOX_ERROR_RANGE; + } + case ASN_STRTOX_EXTRA_DATA: + if(value >= LONG_MIN && value <= LONG_MAX) { + *lp = value; + return ASN_STRTOX_EXTRA_DATA; + } else { + return ASN_STRTOX_ERROR_RANGE; + } + } + + assert(!"Unreachable"); + return ASN_STRTOX_ERROR_INVAL; +} + +enum asn_strtox_result_e +asn_strtoul_lim(const char *str, const char **end, unsigned long *ulp) { + uintmax_t value; + switch(asn_strtoumax_lim(str, end, &value)) { + case ASN_STRTOX_ERROR_RANGE: + return ASN_STRTOX_ERROR_RANGE; + case ASN_STRTOX_ERROR_INVAL: + return ASN_STRTOX_ERROR_INVAL; + case ASN_STRTOX_EXPECT_MORE: + return ASN_STRTOX_EXPECT_MORE; + case ASN_STRTOX_OK: + if(value <= ULONG_MAX) { + *ulp = value; + return ASN_STRTOX_OK; + } else { + return ASN_STRTOX_ERROR_RANGE; + } + case ASN_STRTOX_EXTRA_DATA: + if(value <= ULONG_MAX) { + *ulp = value; + return ASN_STRTOX_EXTRA_DATA; + } else { + return ASN_STRTOX_ERROR_RANGE; + } + } + + assert(!"Unreachable"); + return ASN_STRTOX_ERROR_INVAL; +} + +int +INTEGER_compare(const asn_TYPE_descriptor_t *td, const void *aptr, + const void *bptr) { + const INTEGER_t *a = aptr; + const INTEGER_t *b = bptr; + + (void)td; + + if(a && b) { + if(a->size && b->size) { + int sign_a = (a->buf[0] & 0x80) ? -1 : 1; + int sign_b = (b->buf[0] & 0x80) ? -1 : 1; + + if(sign_a < sign_b) return -1; + if(sign_a > sign_b) return 1; + + /* The shortest integer wins, unless comparing negatives */ + if(a->size < b->size) { + return -1 * sign_a; + } else if(a->size > b->size) { + return 1 * sign_b; + } + + return sign_a * memcmp(a->buf, b->buf, a->size); + } else if(a->size) { + int sign = (a->buf[0] & 0x80) ? -1 : 1; + return (1) * sign; + } else if(b->size) { + int sign = (a->buf[0] & 0x80) ? -1 : 1; + return (-1) * sign; + } else { + return 0; + } + } else if(!a && !b) { + return 0; + } else if(!a) { + return -1; + } else { + return 1; + } + +} diff --git a/certgen/asncodec/INTEGER.h b/certgen/asncodec/INTEGER.h index 1666e0bce487e4c44da6cce62beb911f24ed3721..682eeb3159ec0fab404929b0966034639955aaf4 100644 --- a/certgen/asncodec/INTEGER.h +++ b/certgen/asncodec/INTEGER.h @@ -1,139 +1,139 @@ -/*- - * Copyright (c) 2003-2017 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#ifndef _INTEGER_H_ -#define _INTEGER_H_ - -#include -#include - -#ifdef __cplusplus -extern "C" { -#endif - -typedef ASN__PRIMITIVE_TYPE_t INTEGER_t; - -extern asn_TYPE_descriptor_t asn_DEF_INTEGER; -extern asn_TYPE_operation_t asn_OP_INTEGER; - -/* Map with to integer value association */ -typedef struct asn_INTEGER_enum_map_s { - long nat_value; /* associated native integer value */ - size_t enum_len; /* strlen("tag") */ - const char *enum_name; /* "tag" */ -} asn_INTEGER_enum_map_t; - -/* This type describes an enumeration for INTEGER and ENUMERATED types */ -typedef struct asn_INTEGER_specifics_s { - const asn_INTEGER_enum_map_t *value2enum; /* N -> "tag"; sorted by N */ - const unsigned int *enum2value; /* "tag" => N; sorted by tag */ - int map_count; /* Elements in either map */ - int extension; /* This map is extensible */ - int strict_enumeration; /* Enumeration set is fixed */ - int field_width; /* Size of native integer */ - int field_unsigned; /* Signed=0, unsigned=1 */ -} asn_INTEGER_specifics_t; - -ssize_t INTEGER__dump(const asn_TYPE_descriptor_t *td, - const INTEGER_t *st, - asn_app_consume_bytes_f *cb, - void *app_key, int plainOrXER); - -#define INTEGER_free ASN__PRIMITIVE_TYPE_free - -#if !defined(ASN_DISABLE_PRINT_SUPPORT) -asn_struct_print_f INTEGER_print; -#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ - -asn_struct_compare_f INTEGER_compare; - -#define INTEGER_constraint asn_generic_no_constraint - -#if !defined(ASN_DISABLE_BER_SUPPORT) -#define INTEGER_decode_ber ber_decode_primitive -der_type_encoder_f INTEGER_encode_der; -#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ - -#if !defined(ASN_DISABLE_XER_SUPPORT) -xer_type_decoder_f INTEGER_decode_xer; -xer_type_encoder_f INTEGER_encode_xer; -#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ - -#if !defined(ASN_DISABLE_JER_SUPPORT) -jer_type_encoder_f INTEGER_encode_jer; -#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ - -#if !defined(ASN_DISABLE_OER_SUPPORT) -oer_type_decoder_f INTEGER_decode_oer; -oer_type_encoder_f INTEGER_encode_oer; -#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ - -#if !defined(ASN_DISABLE_UPER_SUPPORT) -per_type_decoder_f INTEGER_decode_uper; -per_type_encoder_f INTEGER_encode_uper; -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ -#if !defined(ASN_DISABLE_APER_SUPPORT) -per_type_decoder_f INTEGER_decode_aper; -per_type_encoder_f INTEGER_encode_aper; -#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ - -#if !defined(ASN_DISABLE_RFILL_SUPPORT) -asn_random_fill_f INTEGER_random_fill; -#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ - -/*********************************** - * Some handy conversion routines. * - ***********************************/ - -/* - * Natiwe size-independent conversion of native integers to/from INTEGER. - * (l_size) is in bytes. - * Returns 0 if it was possible to convert, -1 otherwise. - * -1/EINVAL: Mandatory argument missing - * -1/ERANGE: Value encoded is out of range for long representation - * -1/ENOMEM: Memory allocation failed (in asn_*2INTEGER()). - */ -int asn_INTEGER2imax(const INTEGER_t *i, intmax_t *l); -int asn_INTEGER2umax(const INTEGER_t *i, uintmax_t *l); -int asn_imax2INTEGER(INTEGER_t *i, intmax_t l); -int asn_umax2INTEGER(INTEGER_t *i, uintmax_t l); - -/* - * Size-specific conversion helpers. - */ -int asn_INTEGER2long(const INTEGER_t *i, long *l); -int asn_INTEGER2ulong(const INTEGER_t *i, unsigned long *l); -int asn_long2INTEGER(INTEGER_t *i, long l); -int asn_ulong2INTEGER(INTEGER_t *i, unsigned long l); -int asn_int642INTEGER(INTEGER_t *i, int64_t l); -int asn_uint642INTEGER(INTEGER_t *i, uint64_t l); - -/* A version of strtol/strtoimax(3) with nicer error reporting. */ -enum asn_strtox_result_e { - ASN_STRTOX_ERROR_RANGE = -3, /* Input outside of supported numeric range */ - ASN_STRTOX_ERROR_INVAL = -2, /* Invalid data encountered (e.g., "+-") */ - ASN_STRTOX_EXPECT_MORE = -1, /* More data expected (e.g. "+") */ - ASN_STRTOX_OK = 0, /* Conversion succeeded, number ends at (*end) */ - ASN_STRTOX_EXTRA_DATA = 1 /* Conversion succeeded, but the string has extra stuff */ -}; -enum asn_strtox_result_e asn_strtol_lim(const char *str, const char **end, - long *l); -enum asn_strtox_result_e asn_strtoul_lim(const char *str, const char **end, - unsigned long *l); -enum asn_strtox_result_e asn_strtoimax_lim(const char *str, const char **end, - intmax_t *l); -enum asn_strtox_result_e asn_strtoumax_lim(const char *str, const char **end, - uintmax_t *l); - -/* - * Convert the integer value into the corresponding enumeration map entry. - */ -const asn_INTEGER_enum_map_t *INTEGER_map_value2enum( - const asn_INTEGER_specifics_t *specs, long value); - -#ifdef __cplusplus -} -#endif - -#endif /* _INTEGER_H_ */ +/*- + * Copyright (c) 2003-2017 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#ifndef _INTEGER_H_ +#define _INTEGER_H_ + +#include +#include + +#ifdef __cplusplus +extern "C" { +#endif + +typedef ASN__PRIMITIVE_TYPE_t INTEGER_t; + +extern asn_TYPE_descriptor_t asn_DEF_INTEGER; +extern asn_TYPE_operation_t asn_OP_INTEGER; + +/* Map with to integer value association */ +typedef struct asn_INTEGER_enum_map_s { + long nat_value; /* associated native integer value */ + size_t enum_len; /* strlen("tag") */ + const char *enum_name; /* "tag" */ +} asn_INTEGER_enum_map_t; + +/* This type describes an enumeration for INTEGER and ENUMERATED types */ +typedef struct asn_INTEGER_specifics_s { + const asn_INTEGER_enum_map_t *value2enum; /* N -> "tag"; sorted by N */ + const unsigned int *enum2value; /* "tag" => N; sorted by tag */ + int map_count; /* Elements in either map */ + int extension; /* This map is extensible */ + int strict_enumeration; /* Enumeration set is fixed */ + int field_width; /* Size of native integer */ + int field_unsigned; /* Signed=0, unsigned=1 */ +} asn_INTEGER_specifics_t; + +ssize_t INTEGER__dump(const asn_TYPE_descriptor_t *td, + const INTEGER_t *st, + asn_app_consume_bytes_f *cb, + void *app_key, int plainOrXER); + +#define INTEGER_free ASN__PRIMITIVE_TYPE_free + +#if !defined(ASN_DISABLE_PRINT_SUPPORT) +asn_struct_print_f INTEGER_print; +#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ + +asn_struct_compare_f INTEGER_compare; + +#define INTEGER_constraint asn_generic_no_constraint + +#if !defined(ASN_DISABLE_BER_SUPPORT) +#define INTEGER_decode_ber ber_decode_primitive +der_type_encoder_f INTEGER_encode_der; +#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ + +#if !defined(ASN_DISABLE_XER_SUPPORT) +xer_type_decoder_f INTEGER_decode_xer; +xer_type_encoder_f INTEGER_encode_xer; +#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ + +#if !defined(ASN_DISABLE_JER_SUPPORT) +jer_type_encoder_f INTEGER_encode_jer; +#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ + +#if !defined(ASN_DISABLE_OER_SUPPORT) +oer_type_decoder_f INTEGER_decode_oer; +oer_type_encoder_f INTEGER_encode_oer; +#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ + +#if !defined(ASN_DISABLE_UPER_SUPPORT) +per_type_decoder_f INTEGER_decode_uper; +per_type_encoder_f INTEGER_encode_uper; +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ +#if !defined(ASN_DISABLE_APER_SUPPORT) +per_type_decoder_f INTEGER_decode_aper; +per_type_encoder_f INTEGER_encode_aper; +#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ + +#if !defined(ASN_DISABLE_RFILL_SUPPORT) +asn_random_fill_f INTEGER_random_fill; +#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ + +/*********************************** + * Some handy conversion routines. * + ***********************************/ + +/* + * Natiwe size-independent conversion of native integers to/from INTEGER. + * (l_size) is in bytes. + * Returns 0 if it was possible to convert, -1 otherwise. + * -1/EINVAL: Mandatory argument missing + * -1/ERANGE: Value encoded is out of range for long representation + * -1/ENOMEM: Memory allocation failed (in asn_*2INTEGER()). + */ +int asn_INTEGER2imax(const INTEGER_t *i, intmax_t *l); +int asn_INTEGER2umax(const INTEGER_t *i, uintmax_t *l); +int asn_imax2INTEGER(INTEGER_t *i, intmax_t l); +int asn_umax2INTEGER(INTEGER_t *i, uintmax_t l); + +/* + * Size-specific conversion helpers. + */ +int asn_INTEGER2long(const INTEGER_t *i, long *l); +int asn_INTEGER2ulong(const INTEGER_t *i, unsigned long *l); +int asn_long2INTEGER(INTEGER_t *i, long l); +int asn_ulong2INTEGER(INTEGER_t *i, unsigned long l); +int asn_int642INTEGER(INTEGER_t *i, int64_t l); +int asn_uint642INTEGER(INTEGER_t *i, uint64_t l); + +/* A version of strtol/strtoimax(3) with nicer error reporting. */ +enum asn_strtox_result_e { + ASN_STRTOX_ERROR_RANGE = -3, /* Input outside of supported numeric range */ + ASN_STRTOX_ERROR_INVAL = -2, /* Invalid data encountered (e.g., "+-") */ + ASN_STRTOX_EXPECT_MORE = -1, /* More data expected (e.g. "+") */ + ASN_STRTOX_OK = 0, /* Conversion succeeded, number ends at (*end) */ + ASN_STRTOX_EXTRA_DATA = 1 /* Conversion succeeded, but the string has extra stuff */ +}; +enum asn_strtox_result_e asn_strtol_lim(const char *str, const char **end, + long *l); +enum asn_strtox_result_e asn_strtoul_lim(const char *str, const char **end, + unsigned long *l); +enum asn_strtox_result_e asn_strtoimax_lim(const char *str, const char **end, + intmax_t *l); +enum asn_strtox_result_e asn_strtoumax_lim(const char *str, const char **end, + uintmax_t *l); + +/* + * Convert the integer value into the corresponding enumeration map entry. + */ +const asn_INTEGER_enum_map_t *INTEGER_map_value2enum( + const asn_INTEGER_specifics_t *specs, long value); + +#ifdef __cplusplus +} +#endif + +#endif /* _INTEGER_H_ */ diff --git a/certgen/asncodec/INTEGER_oer.c b/certgen/asncodec/INTEGER_oer.c index 19f276d54e028b99917e387cbbaecf781aa9bfc2..9d3f8f5abd7c17414a6faabdf2af5b0b7f427ca5 100644 --- a/certgen/asncodec/INTEGER_oer.c +++ b/certgen/asncodec/INTEGER_oer.c @@ -1,174 +1,174 @@ -/* - * Copyright (c) 2017 Lev Walkin . - * All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include - -asn_dec_rval_t -INTEGER_decode_oer(const asn_codec_ctx_t *opt_codec_ctx, - const asn_TYPE_descriptor_t *td, - const asn_oer_constraints_t *constraints, void **sptr, - const void *ptr, size_t size) { - const asn_INTEGER_specifics_t *specs = - (const asn_INTEGER_specifics_t *)td->specifics; - asn_dec_rval_t rval = {RC_OK, 0}; - INTEGER_t *st = (INTEGER_t *)*sptr; - struct asn_oer_constraint_number_s ct = {0, 0}; - size_t req_bytes; - - (void)opt_codec_ctx; - (void)specs; - - if(!st) { - st = (INTEGER_t *)(*sptr = CALLOC(1, sizeof(*st))); - if(!st) ASN__DECODE_FAILED; - } - - FREEMEM(st->buf); - st->buf = 0; - st->size = 0; - - if(!constraints) constraints = td->encoding_constraints.oer_constraints; - if(constraints) ct = constraints->value; - - if(ct.width) { - req_bytes = ct.width; - } else { - /* No lower bound and no upper bound, effectively */ - - ssize_t consumed = oer_fetch_length(ptr, size, &req_bytes); - if(consumed == 0) { - ASN__DECODE_STARVED; - } else if(consumed == -1) { - ASN__DECODE_FAILED; - } - rval.consumed += consumed; - ptr = (const char *)ptr + consumed; - size -= consumed; - } - - if(req_bytes > size) { - ASN__DECODE_STARVED; - } - - if(ct.positive) { - /* X.969 08/2015 10.2(a) */ - unsigned msb; /* Most significant bit */ - size_t useful_size; - - /* Check most significant bit */ - msb = *(const uint8_t *)ptr >> 7; /* yields 0 or 1 */ - useful_size = msb + req_bytes; - st->buf = (uint8_t *)MALLOC(useful_size + 1); - if(!st->buf) { - ASN__DECODE_FAILED; - } - - /* - * Record a large unsigned in a way not to confuse it - * with signed value. - */ - st->buf[0] = '\0'; - memcpy(st->buf + msb, ptr, req_bytes); - st->buf[useful_size] = '\0'; /* Just in case, 0-terminate */ - st->size = useful_size; - - rval.consumed += req_bytes; - return rval; - } else { - /* X.969 08/2015 10.2(b) */ - st->buf = (uint8_t *)MALLOC(req_bytes + 1); - if(!st->buf) { - ASN__DECODE_FAILED; - } - - memcpy(st->buf, ptr, req_bytes); - st->buf[req_bytes] = '\0'; /* Just in case, 0-terminate */ - st->size = req_bytes; - - rval.consumed += req_bytes; - return rval; - } -} - -/* - * Encode as Canonical OER. - */ -asn_enc_rval_t -INTEGER_encode_oer(const asn_TYPE_descriptor_t *td, - const asn_oer_constraints_t *constraints, const void *sptr, - asn_app_consume_bytes_f *cb, void *app_key) { - const INTEGER_t *st = sptr; - asn_enc_rval_t er = {0,0,0}; - struct asn_oer_constraint_number_s ct = {0, 0}; - const uint8_t *buf; - const uint8_t *end; - size_t useful_bytes; - size_t req_bytes = 0; - int sign = 0; - - if(!st || st->size == 0) ASN__ENCODE_FAILED; - - if(!constraints) constraints = td->encoding_constraints.oer_constraints; - if(constraints) ct = constraints->value; - - er.encoded = 0; - - buf = st->buf; - end = buf + st->size; - - sign = (buf && buf < end) ? buf[0] & 0x80 : 0; - - /* Ignore 9 leading zeroes or ones */ - if(ct.positive) { - if(sign) { - /* The value given is a signed value. Can't proceed. */ - ASN__ENCODE_FAILED; - } - /* Remove leading zeros. */ - for(; buf + 1 < end; buf++) { - if(buf[0] != 0x0) break; - } - } else { - for(; buf + 1 < end; buf++) { - if(buf[0] == 0x0 && (buf[1] & 0x80) == 0) { - continue; - } else if(buf[0] == 0xff && (buf[1] & 0x80) != 0) { - continue; - } - break; - } - } - - useful_bytes = end - buf; - if(ct.width) { - req_bytes = ct.width; - } else { - ssize_t r = oer_serialize_length(useful_bytes, cb, app_key); - if(r < 0) { - ASN__ENCODE_FAILED; - } - er.encoded += r; - req_bytes = useful_bytes; - } - - if(req_bytes < useful_bytes) { - ASN__ENCODE_FAILED; - } - - er.encoded += req_bytes; - - for(; req_bytes > useful_bytes; req_bytes--) { - if(cb(sign?"\xff":"\0", 1, app_key) < 0) { - ASN__ENCODE_FAILED; - } - } - - if(cb(buf, useful_bytes, app_key) < 0) { - ASN__ENCODE_FAILED; - } - - ASN__ENCODED_OK(er); -} +/* + * Copyright (c) 2017 Lev Walkin . + * All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include + +asn_dec_rval_t +INTEGER_decode_oer(const asn_codec_ctx_t *opt_codec_ctx, + const asn_TYPE_descriptor_t *td, + const asn_oer_constraints_t *constraints, void **sptr, + const void *ptr, size_t size) { + const asn_INTEGER_specifics_t *specs = + (const asn_INTEGER_specifics_t *)td->specifics; + asn_dec_rval_t rval = {RC_OK, 0}; + INTEGER_t *st = (INTEGER_t *)*sptr; + struct asn_oer_constraint_number_s ct = {0, 0}; + size_t req_bytes; + + (void)opt_codec_ctx; + (void)specs; + + if(!st) { + st = (INTEGER_t *)(*sptr = CALLOC(1, sizeof(*st))); + if(!st) ASN__DECODE_FAILED; + } + + FREEMEM(st->buf); + st->buf = 0; + st->size = 0; + + if(!constraints) constraints = td->encoding_constraints.oer_constraints; + if(constraints) ct = constraints->value; + + if(ct.width) { + req_bytes = ct.width; + } else { + /* No lower bound and no upper bound, effectively */ + + ssize_t consumed = oer_fetch_length(ptr, size, &req_bytes); + if(consumed == 0) { + ASN__DECODE_STARVED; + } else if(consumed == -1) { + ASN__DECODE_FAILED; + } + rval.consumed += consumed; + ptr = (const char *)ptr + consumed; + size -= consumed; + } + + if(req_bytes > size) { + ASN__DECODE_STARVED; + } + + if(ct.positive) { + /* X.969 08/2015 10.2(a) */ + unsigned msb; /* Most significant bit */ + size_t useful_size; + + /* Check most significant bit */ + msb = *(const uint8_t *)ptr >> 7; /* yields 0 or 1 */ + useful_size = msb + req_bytes; + st->buf = (uint8_t *)MALLOC(useful_size + 1); + if(!st->buf) { + ASN__DECODE_FAILED; + } + + /* + * Record a large unsigned in a way not to confuse it + * with signed value. + */ + st->buf[0] = '\0'; + memcpy(st->buf + msb, ptr, req_bytes); + st->buf[useful_size] = '\0'; /* Just in case, 0-terminate */ + st->size = useful_size; + + rval.consumed += req_bytes; + return rval; + } else { + /* X.969 08/2015 10.2(b) */ + st->buf = (uint8_t *)MALLOC(req_bytes + 1); + if(!st->buf) { + ASN__DECODE_FAILED; + } + + memcpy(st->buf, ptr, req_bytes); + st->buf[req_bytes] = '\0'; /* Just in case, 0-terminate */ + st->size = req_bytes; + + rval.consumed += req_bytes; + return rval; + } +} + +/* + * Encode as Canonical OER. + */ +asn_enc_rval_t +INTEGER_encode_oer(const asn_TYPE_descriptor_t *td, + const asn_oer_constraints_t *constraints, const void *sptr, + asn_app_consume_bytes_f *cb, void *app_key) { + const INTEGER_t *st = sptr; + asn_enc_rval_t er = {0,0,0}; + struct asn_oer_constraint_number_s ct = {0, 0}; + const uint8_t *buf; + const uint8_t *end; + size_t useful_bytes; + size_t req_bytes = 0; + int sign = 0; + + if(!st || st->size == 0) ASN__ENCODE_FAILED; + + if(!constraints) constraints = td->encoding_constraints.oer_constraints; + if(constraints) ct = constraints->value; + + er.encoded = 0; + + buf = st->buf; + end = buf + st->size; + + sign = (buf && buf < end) ? buf[0] & 0x80 : 0; + + /* Ignore 9 leading zeroes or ones */ + if(ct.positive) { + if(sign) { + /* The value given is a signed value. Can't proceed. */ + ASN__ENCODE_FAILED; + } + /* Remove leading zeros. */ + for(; buf + 1 < end; buf++) { + if(buf[0] != 0x0) break; + } + } else { + for(; buf + 1 < end; buf++) { + if(buf[0] == 0x0 && (buf[1] & 0x80) == 0) { + continue; + } else if(buf[0] == 0xff && (buf[1] & 0x80) != 0) { + continue; + } + break; + } + } + + useful_bytes = end - buf; + if(ct.width) { + req_bytes = ct.width; + } else { + ssize_t r = oer_serialize_length(useful_bytes, cb, app_key); + if(r < 0) { + ASN__ENCODE_FAILED; + } + er.encoded += r; + req_bytes = useful_bytes; + } + + if(req_bytes < useful_bytes) { + ASN__ENCODE_FAILED; + } + + er.encoded += req_bytes; + + for(; req_bytes > useful_bytes; req_bytes--) { + if(cb(sign?"\xff":"\0", 1, app_key) < 0) { + ASN__ENCODE_FAILED; + } + } + + if(cb(buf, useful_bytes, app_key) < 0) { + ASN__ENCODE_FAILED; + } + + ASN__ENCODED_OK(er); +} diff --git a/certgen/asncodec/INTEGER_print.c b/certgen/asncodec/INTEGER_print.c index 2d37dee01c68b3ebb76e0640c9ae8a36a6d214ba..be511612816bf03676b51fd32e56a510b7b4e342 100644 --- a/certgen/asncodec/INTEGER_print.c +++ b/certgen/asncodec/INTEGER_print.c @@ -1,26 +1,26 @@ -/* - * Copyright (c) 2017 Lev Walkin . - * All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include - -/* - * INTEGER specific human-readable output. - */ -int -INTEGER_print(const asn_TYPE_descriptor_t *td, const void *sptr, int ilevel, - asn_app_consume_bytes_f *cb, void *app_key) { - const INTEGER_t *st = (const INTEGER_t *)sptr; - ssize_t ret; - - (void)ilevel; - - if(!st || !st->buf) - ret = cb("", 8, app_key); - else - ret = INTEGER__dump(td, st, cb, app_key, 0); - - return (ret < 0) ? -1 : 0; -} +/* + * Copyright (c) 2017 Lev Walkin . + * All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include + +/* + * INTEGER specific human-readable output. + */ +int +INTEGER_print(const asn_TYPE_descriptor_t *td, const void *sptr, int ilevel, + asn_app_consume_bytes_f *cb, void *app_key) { + const INTEGER_t *st = (const INTEGER_t *)sptr; + ssize_t ret; + + (void)ilevel; + + if(!st || !st->buf) + ret = cb("", 8, app_key); + else + ret = INTEGER__dump(td, st, cb, app_key, 0); + + return (ret < 0) ? -1 : 0; +} diff --git a/certgen/asncodec/INTEGER_xer.c b/certgen/asncodec/INTEGER_xer.c index 4f21c86a9640498e9c0d4ecb01ac6eba2eefaa5e..4629b747c998a4ece379765a2e32030932e457ae 100644 --- a/certgen/asncodec/INTEGER_xer.c +++ b/certgen/asncodec/INTEGER_xer.c @@ -1,351 +1,351 @@ -/* - * Copyright (c) 2017 Lev Walkin . - * All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include - -struct e2v_key { - const char *start; - const char *stop; - const asn_INTEGER_enum_map_t *vemap; - const unsigned int *evmap; -}; -static int -INTEGER__compar_enum2value(const void *kp, const void *am) { - const struct e2v_key *key = (const struct e2v_key *)kp; - const asn_INTEGER_enum_map_t *el = (const asn_INTEGER_enum_map_t *)am; - const char *ptr, *end, *name; - - /* Remap the element (sort by different criterion) */ - el = key->vemap + key->evmap[el - key->vemap]; - - /* Compare strings */ - for(ptr = key->start, end = key->stop, name = el->enum_name; - ptr < end; ptr++, name++) { - if(*ptr != *name || !*name) - return *(const unsigned char *)ptr - *(const unsigned char *)name; - } - return name[0] ? -1 : 0; -} - -static const asn_INTEGER_enum_map_t * -INTEGER_map_enum2value(const asn_INTEGER_specifics_t *specs, const char *lstart, - const char *lstop) { - const asn_INTEGER_enum_map_t *el_found; - int count = specs ? specs->map_count : 0; - struct e2v_key key; - const char *lp; - - if(!count) return NULL; - - /* Guaranteed: assert(lstart < lstop); */ - /* Figure out the tag name */ - for(lstart++, lp = lstart; lp < lstop; lp++) { - switch(*lp) { - case 9: case 10: case 11: case 12: case 13: case 32: /* WSP */ - case 0x2f: /* '/' */ case 0x3e: /* '>' */ - break; - default: - continue; - } - break; - } - if(lp == lstop) return NULL; /* No tag found */ - lstop = lp; - - key.start = lstart; - key.stop = lstop; - key.vemap = specs->value2enum; - key.evmap = specs->enum2value; - el_found = (asn_INTEGER_enum_map_t *)bsearch(&key, - specs->value2enum, count, sizeof(specs->value2enum[0]), - INTEGER__compar_enum2value); - if(el_found) { - /* Remap enum2value into value2enum */ - el_found = key.vemap + key.evmap[el_found - key.vemap]; - } - return el_found; -} - -static int -INTEGER_st_prealloc(INTEGER_t *st, int min_size) { - void *p = MALLOC(min_size + 1); - if(p) { - void *b = st->buf; - st->size = 0; - st->buf = p; - FREEMEM(b); - return 0; - } else { - return -1; - } -} - -/* - * Decode the chunk of XML text encoding INTEGER. - */ -static enum xer_pbd_rval -INTEGER__xer_body_decode(const asn_TYPE_descriptor_t *td, void *sptr, - const void *chunk_buf, size_t chunk_size) { - const asn_INTEGER_specifics_t *specs = - (const asn_INTEGER_specifics_t *)td->specifics; - INTEGER_t *st = (INTEGER_t *)sptr; - intmax_t dec_value; - intmax_t hex_value = 0; - const char *lp; - const char *lstart = (const char *)chunk_buf; - const char *lstop = lstart + chunk_size; - enum { - ST_LEADSPACE, - ST_SKIPSPHEX, - ST_WAITDIGITS, - ST_DIGITS, - ST_DIGITS_TRAILSPACE, - ST_HEXDIGIT1, - ST_HEXDIGIT2, - ST_HEXDIGITS_TRAILSPACE, - ST_HEXCOLON, - ST_END_ENUM, - ST_UNEXPECTED - } state = ST_LEADSPACE; - const char *dec_value_start = 0; /* INVARIANT: always !0 in ST_DIGITS */ - const char *dec_value_end = 0; - - if(chunk_size) - ASN_DEBUG("INTEGER body %ld 0x%2x..0x%2x", - (long)chunk_size, *lstart, lstop[-1]); - - if(INTEGER_st_prealloc(st, (chunk_size/3) + 1)) - return XPBD_SYSTEM_FAILURE; - - /* - * We may have received a tag here. It will be processed inline. - * Use strtoul()-like code and serialize the result. - */ - for(lp = lstart; lp < lstop; lp++) { - int lv = *lp; - switch(lv) { - case 0x09: case 0x0a: case 0x0d: case 0x20: - switch(state) { - case ST_LEADSPACE: - case ST_DIGITS_TRAILSPACE: - case ST_HEXDIGITS_TRAILSPACE: - case ST_SKIPSPHEX: - continue; - case ST_DIGITS: - dec_value_end = lp; - state = ST_DIGITS_TRAILSPACE; - continue; - case ST_HEXCOLON: - state = ST_HEXDIGITS_TRAILSPACE; - continue; - default: - break; - } - break; - case 0x2d: /* '-' */ - if(state == ST_LEADSPACE) { - dec_value = 0; - dec_value_start = lp; - state = ST_WAITDIGITS; - continue; - } - break; - case 0x2b: /* '+' */ - if(state == ST_LEADSPACE) { - dec_value = 0; - dec_value_start = lp; - state = ST_WAITDIGITS; - continue; - } - break; - case 0x30: case 0x31: case 0x32: case 0x33: case 0x34: - case 0x35: case 0x36: case 0x37: case 0x38: case 0x39: - switch(state) { - case ST_DIGITS: continue; - case ST_SKIPSPHEX: /* Fall through */ - case ST_HEXDIGIT1: - hex_value = (lv - 0x30) << 4; - state = ST_HEXDIGIT2; - continue; - case ST_HEXDIGIT2: - hex_value += (lv - 0x30); - state = ST_HEXCOLON; - st->buf[st->size++] = (uint8_t)hex_value; - continue; - case ST_HEXCOLON: - return XPBD_BROKEN_ENCODING; - case ST_LEADSPACE: - dec_value = 0; - dec_value_start = lp; - /* FALL THROUGH */ - case ST_WAITDIGITS: - state = ST_DIGITS; - continue; - default: - break; - } - break; - case 0x3c: /* '<', start of XML encoded enumeration */ - if(state == ST_LEADSPACE) { - const asn_INTEGER_enum_map_t *el; - el = INTEGER_map_enum2value( - (const asn_INTEGER_specifics_t *) - td->specifics, lstart, lstop); - if(el) { - ASN_DEBUG("Found \"%s\" => %ld", - el->enum_name, el->nat_value); - dec_value = el->nat_value; - state = ST_END_ENUM; - lp = lstop - 1; - continue; - } - ASN_DEBUG("Unknown identifier for INTEGER"); - } - return XPBD_BROKEN_ENCODING; - case 0x3a: /* ':' */ - if(state == ST_HEXCOLON) { - /* This colon is expected */ - state = ST_HEXDIGIT1; - continue; - } else if(state == ST_DIGITS) { - /* The colon here means that we have - * decoded the first two hexadecimal - * places as a decimal value. - * Switch decoding mode. */ - ASN_DEBUG("INTEGER re-evaluate as hex form"); - state = ST_SKIPSPHEX; - dec_value_start = 0; - lp = lstart - 1; - continue; - } else { - ASN_DEBUG("state %d at %ld", state, (long)(lp - lstart)); - break; - } - /* [A-Fa-f] */ - case 0x41:case 0x42:case 0x43:case 0x44:case 0x45:case 0x46: - case 0x61:case 0x62:case 0x63:case 0x64:case 0x65:case 0x66: - switch(state) { - case ST_SKIPSPHEX: - case ST_LEADSPACE: /* Fall through */ - case ST_HEXDIGIT1: - hex_value = lv - ((lv < 0x61) ? 0x41 : 0x61); - hex_value += 10; - hex_value <<= 4; - state = ST_HEXDIGIT2; - continue; - case ST_HEXDIGIT2: - hex_value += lv - ((lv < 0x61) ? 0x41 : 0x61); - hex_value += 10; - st->buf[st->size++] = (uint8_t)hex_value; - state = ST_HEXCOLON; - continue; - case ST_DIGITS: - ASN_DEBUG("INTEGER re-evaluate as hex form"); - state = ST_SKIPSPHEX; - dec_value_start = 0; - lp = lstart - 1; - continue; - default: - break; - } - break; - } - - /* Found extra non-numeric stuff */ - ASN_DEBUG("INTEGER :: Found non-numeric 0x%2x at %ld", - lv, (long)(lp - lstart)); - state = ST_UNEXPECTED; - break; - } - - switch(state) { - case ST_END_ENUM: - /* Got a complete and valid enumeration encoded as a tag. */ - break; - case ST_DIGITS: - dec_value_end = lstop; - /* FALL THROUGH */ - case ST_DIGITS_TRAILSPACE: - /* The last symbol encountered was a digit. */ - switch(asn_strtoimax_lim(dec_value_start, &dec_value_end, &dec_value)) { - case ASN_STRTOX_OK: - if(specs && specs->field_unsigned && (uintmax_t) dec_value <= ULONG_MAX) { - break; - } else if(dec_value >= LONG_MIN && dec_value <= LONG_MAX) { - break; - } else { - /* - * We model INTEGER on long for XER, - * to avoid rewriting all the tests at once. - */ - ASN_DEBUG("INTEGER exceeds long range"); - } - /* Fall through */ - case ASN_STRTOX_ERROR_RANGE: - ASN_DEBUG("INTEGER decode %s hit range limit", td->name); - return XPBD_DECODER_LIMIT; - case ASN_STRTOX_ERROR_INVAL: - case ASN_STRTOX_EXPECT_MORE: - case ASN_STRTOX_EXTRA_DATA: - return XPBD_BROKEN_ENCODING; - } - break; - case ST_HEXCOLON: - case ST_HEXDIGITS_TRAILSPACE: - st->buf[st->size] = 0; /* Just in case termination */ - return XPBD_BODY_CONSUMED; - case ST_HEXDIGIT1: - case ST_HEXDIGIT2: - case ST_SKIPSPHEX: - return XPBD_BROKEN_ENCODING; - case ST_LEADSPACE: - /* Content not found */ - return XPBD_NOT_BODY_IGNORE; - case ST_WAITDIGITS: - case ST_UNEXPECTED: - ASN_DEBUG("INTEGER: No useful digits (state %d)", state); - return XPBD_BROKEN_ENCODING; /* No digits */ - } - - /* - * Convert the result of parsing of enumeration or a straight - * decimal value into a BER representation. - */ - if(asn_imax2INTEGER(st, dec_value)) { - ASN_DEBUG("INTEGER decode %s conversion failed", td->name); - return XPBD_SYSTEM_FAILURE; - } - - return XPBD_BODY_CONSUMED; -} - -asn_dec_rval_t -INTEGER_decode_xer(const asn_codec_ctx_t *opt_codec_ctx, - const asn_TYPE_descriptor_t *td, void **sptr, - const char *opt_mname, const void *buf_ptr, size_t size) { - return xer_decode_primitive(opt_codec_ctx, td, - sptr, sizeof(INTEGER_t), opt_mname, - buf_ptr, size, INTEGER__xer_body_decode); -} - -asn_enc_rval_t -INTEGER_encode_xer(const asn_TYPE_descriptor_t *td, const void *sptr, - int ilevel, enum xer_encoder_flags_e flags, - asn_app_consume_bytes_f *cb, void *app_key) { - const INTEGER_t *st = (const INTEGER_t *)sptr; - asn_enc_rval_t er = {0,0,0}; - - (void)ilevel; - (void)flags; - - if(!st || !st->buf) - ASN__ENCODE_FAILED; - - er.encoded = INTEGER__dump(td, st, cb, app_key, 1); - if(er.encoded < 0) ASN__ENCODE_FAILED; - - ASN__ENCODED_OK(er); -} +/* + * Copyright (c) 2017 Lev Walkin . + * All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include + +struct e2v_key { + const char *start; + const char *stop; + const asn_INTEGER_enum_map_t *vemap; + const unsigned int *evmap; +}; +static int +INTEGER__compar_enum2value(const void *kp, const void *am) { + const struct e2v_key *key = (const struct e2v_key *)kp; + const asn_INTEGER_enum_map_t *el = (const asn_INTEGER_enum_map_t *)am; + const char *ptr, *end, *name; + + /* Remap the element (sort by different criterion) */ + el = key->vemap + key->evmap[el - key->vemap]; + + /* Compare strings */ + for(ptr = key->start, end = key->stop, name = el->enum_name; + ptr < end; ptr++, name++) { + if(*ptr != *name || !*name) + return *(const unsigned char *)ptr - *(const unsigned char *)name; + } + return name[0] ? -1 : 0; +} + +static const asn_INTEGER_enum_map_t * +INTEGER_map_enum2value(const asn_INTEGER_specifics_t *specs, const char *lstart, + const char *lstop) { + const asn_INTEGER_enum_map_t *el_found; + int count = specs ? specs->map_count : 0; + struct e2v_key key; + const char *lp; + + if(!count) return NULL; + + /* Guaranteed: assert(lstart < lstop); */ + /* Figure out the tag name */ + for(lstart++, lp = lstart; lp < lstop; lp++) { + switch(*lp) { + case 9: case 10: case 11: case 12: case 13: case 32: /* WSP */ + case 0x2f: /* '/' */ case 0x3e: /* '>' */ + break; + default: + continue; + } + break; + } + if(lp == lstop) return NULL; /* No tag found */ + lstop = lp; + + key.start = lstart; + key.stop = lstop; + key.vemap = specs->value2enum; + key.evmap = specs->enum2value; + el_found = (asn_INTEGER_enum_map_t *)bsearch(&key, + specs->value2enum, count, sizeof(specs->value2enum[0]), + INTEGER__compar_enum2value); + if(el_found) { + /* Remap enum2value into value2enum */ + el_found = key.vemap + key.evmap[el_found - key.vemap]; + } + return el_found; +} + +static int +INTEGER_st_prealloc(INTEGER_t *st, int min_size) { + void *p = MALLOC(min_size + 1); + if(p) { + void *b = st->buf; + st->size = 0; + st->buf = p; + FREEMEM(b); + return 0; + } else { + return -1; + } +} + +/* + * Decode the chunk of XML text encoding INTEGER. + */ +static enum xer_pbd_rval +INTEGER__xer_body_decode(const asn_TYPE_descriptor_t *td, void *sptr, + const void *chunk_buf, size_t chunk_size) { + const asn_INTEGER_specifics_t *specs = + (const asn_INTEGER_specifics_t *)td->specifics; + INTEGER_t *st = (INTEGER_t *)sptr; + intmax_t dec_value; + intmax_t hex_value = 0; + const char *lp; + const char *lstart = (const char *)chunk_buf; + const char *lstop = lstart + chunk_size; + enum { + ST_LEADSPACE, + ST_SKIPSPHEX, + ST_WAITDIGITS, + ST_DIGITS, + ST_DIGITS_TRAILSPACE, + ST_HEXDIGIT1, + ST_HEXDIGIT2, + ST_HEXDIGITS_TRAILSPACE, + ST_HEXCOLON, + ST_END_ENUM, + ST_UNEXPECTED + } state = ST_LEADSPACE; + const char *dec_value_start = 0; /* INVARIANT: always !0 in ST_DIGITS */ + const char *dec_value_end = 0; + + if(chunk_size) + ASN_DEBUG("INTEGER body %ld 0x%2x..0x%2x", + (long)chunk_size, *lstart, lstop[-1]); + + if(INTEGER_st_prealloc(st, (chunk_size/3) + 1)) + return XPBD_SYSTEM_FAILURE; + + /* + * We may have received a tag here. It will be processed inline. + * Use strtoul()-like code and serialize the result. + */ + for(lp = lstart; lp < lstop; lp++) { + int lv = *lp; + switch(lv) { + case 0x09: case 0x0a: case 0x0d: case 0x20: + switch(state) { + case ST_LEADSPACE: + case ST_DIGITS_TRAILSPACE: + case ST_HEXDIGITS_TRAILSPACE: + case ST_SKIPSPHEX: + continue; + case ST_DIGITS: + dec_value_end = lp; + state = ST_DIGITS_TRAILSPACE; + continue; + case ST_HEXCOLON: + state = ST_HEXDIGITS_TRAILSPACE; + continue; + default: + break; + } + break; + case 0x2d: /* '-' */ + if(state == ST_LEADSPACE) { + dec_value = 0; + dec_value_start = lp; + state = ST_WAITDIGITS; + continue; + } + break; + case 0x2b: /* '+' */ + if(state == ST_LEADSPACE) { + dec_value = 0; + dec_value_start = lp; + state = ST_WAITDIGITS; + continue; + } + break; + case 0x30: case 0x31: case 0x32: case 0x33: case 0x34: + case 0x35: case 0x36: case 0x37: case 0x38: case 0x39: + switch(state) { + case ST_DIGITS: continue; + case ST_SKIPSPHEX: /* Fall through */ + case ST_HEXDIGIT1: + hex_value = (lv - 0x30) << 4; + state = ST_HEXDIGIT2; + continue; + case ST_HEXDIGIT2: + hex_value += (lv - 0x30); + state = ST_HEXCOLON; + st->buf[st->size++] = (uint8_t)hex_value; + continue; + case ST_HEXCOLON: + return XPBD_BROKEN_ENCODING; + case ST_LEADSPACE: + dec_value = 0; + dec_value_start = lp; + /* FALL THROUGH */ + case ST_WAITDIGITS: + state = ST_DIGITS; + continue; + default: + break; + } + break; + case 0x3c: /* '<', start of XML encoded enumeration */ + if(state == ST_LEADSPACE) { + const asn_INTEGER_enum_map_t *el; + el = INTEGER_map_enum2value( + (const asn_INTEGER_specifics_t *) + td->specifics, lstart, lstop); + if(el) { + ASN_DEBUG("Found \"%s\" => %ld", + el->enum_name, el->nat_value); + dec_value = el->nat_value; + state = ST_END_ENUM; + lp = lstop - 1; + continue; + } + ASN_DEBUG("Unknown identifier for INTEGER"); + } + return XPBD_BROKEN_ENCODING; + case 0x3a: /* ':' */ + if(state == ST_HEXCOLON) { + /* This colon is expected */ + state = ST_HEXDIGIT1; + continue; + } else if(state == ST_DIGITS) { + /* The colon here means that we have + * decoded the first two hexadecimal + * places as a decimal value. + * Switch decoding mode. */ + ASN_DEBUG("INTEGER re-evaluate as hex form"); + state = ST_SKIPSPHEX; + dec_value_start = 0; + lp = lstart - 1; + continue; + } else { + ASN_DEBUG("state %d at %ld", state, (long)(lp - lstart)); + break; + } + /* [A-Fa-f] */ + case 0x41:case 0x42:case 0x43:case 0x44:case 0x45:case 0x46: + case 0x61:case 0x62:case 0x63:case 0x64:case 0x65:case 0x66: + switch(state) { + case ST_SKIPSPHEX: + case ST_LEADSPACE: /* Fall through */ + case ST_HEXDIGIT1: + hex_value = lv - ((lv < 0x61) ? 0x41 : 0x61); + hex_value += 10; + hex_value <<= 4; + state = ST_HEXDIGIT2; + continue; + case ST_HEXDIGIT2: + hex_value += lv - ((lv < 0x61) ? 0x41 : 0x61); + hex_value += 10; + st->buf[st->size++] = (uint8_t)hex_value; + state = ST_HEXCOLON; + continue; + case ST_DIGITS: + ASN_DEBUG("INTEGER re-evaluate as hex form"); + state = ST_SKIPSPHEX; + dec_value_start = 0; + lp = lstart - 1; + continue; + default: + break; + } + break; + } + + /* Found extra non-numeric stuff */ + ASN_DEBUG("INTEGER :: Found non-numeric 0x%2x at %ld", + lv, (long)(lp - lstart)); + state = ST_UNEXPECTED; + break; + } + + switch(state) { + case ST_END_ENUM: + /* Got a complete and valid enumeration encoded as a tag. */ + break; + case ST_DIGITS: + dec_value_end = lstop; + /* FALL THROUGH */ + case ST_DIGITS_TRAILSPACE: + /* The last symbol encountered was a digit. */ + switch(asn_strtoimax_lim(dec_value_start, &dec_value_end, &dec_value)) { + case ASN_STRTOX_OK: + if(specs && specs->field_unsigned && (uintmax_t) dec_value <= ULONG_MAX) { + break; + } else if(dec_value >= LONG_MIN && dec_value <= LONG_MAX) { + break; + } else { + /* + * We model INTEGER on long for XER, + * to avoid rewriting all the tests at once. + */ + ASN_DEBUG("INTEGER exceeds long range"); + } + /* Fall through */ + case ASN_STRTOX_ERROR_RANGE: + ASN_DEBUG("INTEGER decode %s hit range limit", td->name); + return XPBD_DECODER_LIMIT; + case ASN_STRTOX_ERROR_INVAL: + case ASN_STRTOX_EXPECT_MORE: + case ASN_STRTOX_EXTRA_DATA: + return XPBD_BROKEN_ENCODING; + } + break; + case ST_HEXCOLON: + case ST_HEXDIGITS_TRAILSPACE: + st->buf[st->size] = 0; /* Just in case termination */ + return XPBD_BODY_CONSUMED; + case ST_HEXDIGIT1: + case ST_HEXDIGIT2: + case ST_SKIPSPHEX: + return XPBD_BROKEN_ENCODING; + case ST_LEADSPACE: + /* Content not found */ + return XPBD_NOT_BODY_IGNORE; + case ST_WAITDIGITS: + case ST_UNEXPECTED: + ASN_DEBUG("INTEGER: No useful digits (state %d)", state); + return XPBD_BROKEN_ENCODING; /* No digits */ + } + + /* + * Convert the result of parsing of enumeration or a straight + * decimal value into a BER representation. + */ + if(asn_imax2INTEGER(st, dec_value)) { + ASN_DEBUG("INTEGER decode %s conversion failed", td->name); + return XPBD_SYSTEM_FAILURE; + } + + return XPBD_BODY_CONSUMED; +} + +asn_dec_rval_t +INTEGER_decode_xer(const asn_codec_ctx_t *opt_codec_ctx, + const asn_TYPE_descriptor_t *td, void **sptr, + const char *opt_mname, const void *buf_ptr, size_t size) { + return xer_decode_primitive(opt_codec_ctx, td, + sptr, sizeof(INTEGER_t), opt_mname, + buf_ptr, size, INTEGER__xer_body_decode); +} + +asn_enc_rval_t +INTEGER_encode_xer(const asn_TYPE_descriptor_t *td, const void *sptr, + int ilevel, enum xer_encoder_flags_e flags, + asn_app_consume_bytes_f *cb, void *app_key) { + const INTEGER_t *st = (const INTEGER_t *)sptr; + asn_enc_rval_t er = {0,0,0}; + + (void)ilevel; + (void)flags; + + if(!st || !st->buf) + ASN__ENCODE_FAILED; + + er.encoded = INTEGER__dump(td, st, cb, app_key, 1); + if(er.encoded < 0) ASN__ENCODE_FAILED; + + ASN__ENCODED_OK(er); +} diff --git a/certgen/asncodec/IValue.c b/certgen/asncodec/IValue.c index cd7ad06bde9739223bf31f9f7ef549012474c39a..b4ab277b6259969eec7493b7341fa468347c98f8 100644 --- a/certgen/asncodec/IValue.c +++ b/certgen/asncodec/IValue.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "IValue.h" diff --git a/certgen/asncodec/IValue.h b/certgen/asncodec/IValue.h index cdc0a187207d3053320faa9d9d7284edcc2ec654..050a89b5d62c51ec42b801abcb454477388fc048 100644 --- a/certgen/asncodec/IValue.h +++ b/certgen/asncodec/IValue.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/IcaSsp.c b/certgen/asncodec/IcaSsp.c index 8cd5478a491f0a544bb8129485056ca46be38ec5..b656813d08269d314e60bc71b06ef8bb67799512 100644 --- a/certgen/asncodec/IcaSsp.c +++ b/certgen/asncodec/IcaSsp.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "IcaSsp.h" diff --git a/certgen/asncodec/IcaSsp.h b/certgen/asncodec/IcaSsp.h index bbed1a12265df2e3c86513a769093f00e7a1bf4a..5d97fd2bbfbdb10c63ac202efa1e0a986d6f0dc7 100644 --- a/certgen/asncodec/IcaSsp.h +++ b/certgen/asncodec/IcaSsp.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/IdentifiedRegion.c b/certgen/asncodec/IdentifiedRegion.c index 73cafb42e67adef659617b1e2f5b1e918305f52b..e491419f8b2644288ec014a1ac0c6add4e0f0a7b 100644 --- a/certgen/asncodec/IdentifiedRegion.c +++ b/certgen/asncodec/IdentifiedRegion.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "IdentifiedRegion.h" diff --git a/certgen/asncodec/IdentifiedRegion.h b/certgen/asncodec/IdentifiedRegion.h index cdc54148db05b9ae12654a79e076c061f415b160..5a8e6792b8213a400949def999d65ca7f38fce36 100644 --- a/certgen/asncodec/IdentifiedRegion.h +++ b/certgen/asncodec/IdentifiedRegion.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/Ieee1609ContributedHeaderInfoExtension.c b/certgen/asncodec/Ieee1609ContributedHeaderInfoExtension.c index 771b84c1db12692395e892ba84b2d21a06276649..29f6204491f9025dfd478715262e9f2646dfbc61 100644 --- a/certgen/asncodec/Ieee1609ContributedHeaderInfoExtension.c +++ b/certgen/asncodec/Ieee1609ContributedHeaderInfoExtension.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "Ieee1609ContributedHeaderInfoExtension.h" diff --git a/certgen/asncodec/Ieee1609ContributedHeaderInfoExtension.h b/certgen/asncodec/Ieee1609ContributedHeaderInfoExtension.h index e670277c28f854b6918f5bb372a777afda386b0e..9db6cf496a7290e17bb8c4f662087c0020a67f0f 100644 --- a/certgen/asncodec/Ieee1609ContributedHeaderInfoExtension.h +++ b/certgen/asncodec/Ieee1609ContributedHeaderInfoExtension.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/Ieee1609Dot2Content.c b/certgen/asncodec/Ieee1609Dot2Content.c index e95a0ca091287e9d2afaf18302d07c909a6b853e..3f0e59753e3521dc70b0975067e1600a37a69d79 100644 --- a/certgen/asncodec/Ieee1609Dot2Content.c +++ b/certgen/asncodec/Ieee1609Dot2Content.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "Ieee1609Dot2Content.h" diff --git a/certgen/asncodec/Ieee1609Dot2Content.h b/certgen/asncodec/Ieee1609Dot2Content.h index 5cec57c8c9ce78591682e2b3b220637b76433bec..df5c70457aa8d1d9db3ad8cc51fc87d3cfffcfbe 100644 --- a/certgen/asncodec/Ieee1609Dot2Content.h +++ b/certgen/asncodec/Ieee1609Dot2Content.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/Ieee1609Dot2Data-Encrypted.c b/certgen/asncodec/Ieee1609Dot2Data-Encrypted.c index c4c4d573008be53498fab8eb7ddddf0fcb41fbf7..2b449ed91cd53c19147c969e5cc946e87a6f9464 100644 --- a/certgen/asncodec/Ieee1609Dot2Data-Encrypted.c +++ b/certgen/asncodec/Ieee1609Dot2Data-Encrypted.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "Ieee1609Dot2Data-Encrypted.h" diff --git a/certgen/asncodec/Ieee1609Dot2Data-Encrypted.h b/certgen/asncodec/Ieee1609Dot2Data-Encrypted.h index afe40c447953905e6bc0a42c947ec605d31de777..73cd29947911a1399ceb21901899e4fd91dc42ac 100644 --- a/certgen/asncodec/Ieee1609Dot2Data-Encrypted.h +++ b/certgen/asncodec/Ieee1609Dot2Data-Encrypted.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/Ieee1609Dot2Data-EncryptedSigned.c b/certgen/asncodec/Ieee1609Dot2Data-EncryptedSigned.c index 3399c8098742ac16266f171196b471d3bd68afab..75f7168ac7b0b0c9cf498dc5f1c614790032a384 100644 --- a/certgen/asncodec/Ieee1609Dot2Data-EncryptedSigned.c +++ b/certgen/asncodec/Ieee1609Dot2Data-EncryptedSigned.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "Ieee1609Dot2Data-EncryptedSigned.h" diff --git a/certgen/asncodec/Ieee1609Dot2Data-EncryptedSigned.h b/certgen/asncodec/Ieee1609Dot2Data-EncryptedSigned.h index 6d4b791bc51efc0b7ef8c0019ee81c132d660ec6..fc714ed66718233aa46e1db6027333a139ad4906 100644 --- a/certgen/asncodec/Ieee1609Dot2Data-EncryptedSigned.h +++ b/certgen/asncodec/Ieee1609Dot2Data-EncryptedSigned.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/Ieee1609Dot2Data-Signed.c b/certgen/asncodec/Ieee1609Dot2Data-Signed.c index 09451601d01b5bd57ed7efb78eff79c66199d00a..c90a65ad3e3edbe2e06e1a30f49d1de370625538 100644 --- a/certgen/asncodec/Ieee1609Dot2Data-Signed.c +++ b/certgen/asncodec/Ieee1609Dot2Data-Signed.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "Ieee1609Dot2Data-Signed.h" diff --git a/certgen/asncodec/Ieee1609Dot2Data-Signed.h b/certgen/asncodec/Ieee1609Dot2Data-Signed.h index d66b51803fcf32443b0cdb8c5d2c56891c6f3dde..6c5b2f5a62d589d6ac4165b4e3b50010c2705ae0 100644 --- a/certgen/asncodec/Ieee1609Dot2Data-Signed.h +++ b/certgen/asncodec/Ieee1609Dot2Data-Signed.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/Ieee1609Dot2Data-SignedCertRequest.c b/certgen/asncodec/Ieee1609Dot2Data-SignedCertRequest.c index 797733ce8998a098d135128e5f2d50e15f4821ed..5606f84add394b8ebd4cc1c7d9609bae078a15c1 100644 --- a/certgen/asncodec/Ieee1609Dot2Data-SignedCertRequest.c +++ b/certgen/asncodec/Ieee1609Dot2Data-SignedCertRequest.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "Ieee1609Dot2Data-SignedCertRequest.h" diff --git a/certgen/asncodec/Ieee1609Dot2Data-SignedCertRequest.h b/certgen/asncodec/Ieee1609Dot2Data-SignedCertRequest.h index 6d0243d6f12cbff3ed74dc338d3342cefbb6feaf..c4d91bb25aaff13c831427e6137201812e5a26b3 100644 --- a/certgen/asncodec/Ieee1609Dot2Data-SignedCertRequest.h +++ b/certgen/asncodec/Ieee1609Dot2Data-SignedCertRequest.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/Ieee1609Dot2Data-SignedEncrypted.c b/certgen/asncodec/Ieee1609Dot2Data-SignedEncrypted.c index 3fdbe87cf1a3afb785393bd24a5ed04bc78b4bc7..b4dbdbe596076720cf72bc9e84971f633d211218 100644 --- a/certgen/asncodec/Ieee1609Dot2Data-SignedEncrypted.c +++ b/certgen/asncodec/Ieee1609Dot2Data-SignedEncrypted.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "Ieee1609Dot2Data-SignedEncrypted.h" diff --git a/certgen/asncodec/Ieee1609Dot2Data-SignedEncrypted.h b/certgen/asncodec/Ieee1609Dot2Data-SignedEncrypted.h index 41c3fc8bef5ff07493861969cfbaf505bbf7550c..df9ee33ced624d7c7bef414688cedaa8e98bdd2c 100644 --- a/certgen/asncodec/Ieee1609Dot2Data-SignedEncrypted.h +++ b/certgen/asncodec/Ieee1609Dot2Data-SignedEncrypted.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/Ieee1609Dot2Data-SignedEncryptedCertRequest.c b/certgen/asncodec/Ieee1609Dot2Data-SignedEncryptedCertRequest.c index e34c485fbade6113ab0184fdfa5a48a854df5608..4d73e7a989a1f4fa5c44575574de17a797c6012f 100644 --- a/certgen/asncodec/Ieee1609Dot2Data-SignedEncryptedCertRequest.c +++ b/certgen/asncodec/Ieee1609Dot2Data-SignedEncryptedCertRequest.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "Ieee1609Dot2Data-SignedEncryptedCertRequest.h" diff --git a/certgen/asncodec/Ieee1609Dot2Data-SignedEncryptedCertRequest.h b/certgen/asncodec/Ieee1609Dot2Data-SignedEncryptedCertRequest.h index 52ac791ad5572f9db65dd6ff8a2ca5d060b91a2f..7df1a455de3ea30752cb37f774b18dc43d01c89c 100644 --- a/certgen/asncodec/Ieee1609Dot2Data-SignedEncryptedCertRequest.h +++ b/certgen/asncodec/Ieee1609Dot2Data-SignedEncryptedCertRequest.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/Ieee1609Dot2Data-SignedX509AuthenticatedCertRequest.c b/certgen/asncodec/Ieee1609Dot2Data-SignedX509AuthenticatedCertRequest.c index fa9f679d31d2b1d9d376fd1dfb98965b2ca74e73..41f3c951783433a0be6f2d220192036838257e1f 100644 --- a/certgen/asncodec/Ieee1609Dot2Data-SignedX509AuthenticatedCertRequest.c +++ b/certgen/asncodec/Ieee1609Dot2Data-SignedX509AuthenticatedCertRequest.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "Ieee1609Dot2Data-SignedX509AuthenticatedCertRequest.h" diff --git a/certgen/asncodec/Ieee1609Dot2Data-SignedX509AuthenticatedCertRequest.h b/certgen/asncodec/Ieee1609Dot2Data-SignedX509AuthenticatedCertRequest.h index 7a0683ff26c3c8b326cef6505a0ef60c9d27c082..f5c82d9828ee4879cf7e11ed4c02e69d2634f9fa 100644 --- a/certgen/asncodec/Ieee1609Dot2Data-SignedX509AuthenticatedCertRequest.h +++ b/certgen/asncodec/Ieee1609Dot2Data-SignedX509AuthenticatedCertRequest.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/Ieee1609Dot2Data-SymmEncryptedSingleRecipient.c b/certgen/asncodec/Ieee1609Dot2Data-SymmEncryptedSingleRecipient.c index bdd5c4befcb668b9c7283c8ba5ac5a19aaa9e6a8..e61658091e9ee317be307b5fffa5f4f69dda7902 100644 --- a/certgen/asncodec/Ieee1609Dot2Data-SymmEncryptedSingleRecipient.c +++ b/certgen/asncodec/Ieee1609Dot2Data-SymmEncryptedSingleRecipient.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "Ieee1609Dot2Data-SymmEncryptedSingleRecipient.h" diff --git a/certgen/asncodec/Ieee1609Dot2Data-SymmEncryptedSingleRecipient.h b/certgen/asncodec/Ieee1609Dot2Data-SymmEncryptedSingleRecipient.h index babcae3daf5d92ccbb294ac52099e930a26294a9..dc0f1b5390475e4db29fa6ad029ebbf9cd7e75c0 100644 --- a/certgen/asncodec/Ieee1609Dot2Data-SymmEncryptedSingleRecipient.h +++ b/certgen/asncodec/Ieee1609Dot2Data-SymmEncryptedSingleRecipient.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/Ieee1609Dot2Data-Unsecured.c b/certgen/asncodec/Ieee1609Dot2Data-Unsecured.c index 9094459c2782c858ba7849a7ff72a539936fa255..9e428eb672bc064e30460fb408cac8e9f99c57dc 100644 --- a/certgen/asncodec/Ieee1609Dot2Data-Unsecured.c +++ b/certgen/asncodec/Ieee1609Dot2Data-Unsecured.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "Ieee1609Dot2Data-Unsecured.h" diff --git a/certgen/asncodec/Ieee1609Dot2Data-Unsecured.h b/certgen/asncodec/Ieee1609Dot2Data-Unsecured.h index f1d36ef7c1520814239d6abf65e2dad1b3237519..bde801b40ba48322ea28cac7adac18744d8b4ff0 100644 --- a/certgen/asncodec/Ieee1609Dot2Data-Unsecured.h +++ b/certgen/asncodec/Ieee1609Dot2Data-Unsecured.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/Ieee1609Dot2Data.c b/certgen/asncodec/Ieee1609Dot2Data.c index 792dd4818759d666535ca7948f335074c9e4ec14..14346a96903c06b476bc742b18b1ac134e352815 100644 --- a/certgen/asncodec/Ieee1609Dot2Data.c +++ b/certgen/asncodec/Ieee1609Dot2Data.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "Ieee1609Dot2Data.h" diff --git a/certgen/asncodec/Ieee1609Dot2Data.h b/certgen/asncodec/Ieee1609Dot2Data.h index a79558f9070b1e353d147c594b44c8375fad44da..4196a2cb49215d5acf7501735750181889d4b85a 100644 --- a/certgen/asncodec/Ieee1609Dot2Data.h +++ b/certgen/asncodec/Ieee1609Dot2Data.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/Ieee1609HeaderInfoExtensionId.c b/certgen/asncodec/Ieee1609HeaderInfoExtensionId.c index 6273dcba176942ef1404c148d19342604e67de36..3412e15d01ed79f78fc07caf0c532080c0af3c49 100644 --- a/certgen/asncodec/Ieee1609HeaderInfoExtensionId.c +++ b/certgen/asncodec/Ieee1609HeaderInfoExtensionId.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "Ieee1609HeaderInfoExtensionId.h" diff --git a/certgen/asncodec/Ieee1609HeaderInfoExtensionId.h b/certgen/asncodec/Ieee1609HeaderInfoExtensionId.h index a636601fa962784b9ae54046b6dac7c9f5112cba..7530fa055a678d995ea6e9f7d4b229a7779a1010 100644 --- a/certgen/asncodec/Ieee1609HeaderInfoExtensionId.h +++ b/certgen/asncodec/Ieee1609HeaderInfoExtensionId.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/Ieee1609dot2dot1MsctlType.c b/certgen/asncodec/Ieee1609dot2dot1MsctlType.c index 2ede4397a700000abb2724740ffd22cb72b5ce81..41140409eb7fbba018e5a5bb508cf75fce5739d4 100644 --- a/certgen/asncodec/Ieee1609dot2dot1MsctlType.c +++ b/certgen/asncodec/Ieee1609dot2dot1MsctlType.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1CertManagement" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1CertManagement.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "Ieee1609dot2dot1MsctlType.h" diff --git a/certgen/asncodec/Ieee1609dot2dot1MsctlType.h b/certgen/asncodec/Ieee1609dot2dot1MsctlType.h index eb0037885f4bcb8d666f957415d0f1e369e7a782..29b87f4a9c5c952bb36cbf488948f56b7b79065e 100644 --- a/certgen/asncodec/Ieee1609dot2dot1MsctlType.h +++ b/certgen/asncodec/Ieee1609dot2dot1MsctlType.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1CertManagement" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1CertManagement.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/ImplicitCertificate.c b/certgen/asncodec/ImplicitCertificate.c index 03a2baf60bee41a9086990f6fec303b9b8c6a0ea..9fac3c908999ebe761059d983da2ca1c28fd89ee 100644 --- a/certgen/asncodec/ImplicitCertificate.c +++ b/certgen/asncodec/ImplicitCertificate.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "ImplicitCertificate.h" diff --git a/certgen/asncodec/ImplicitCertificate.h b/certgen/asncodec/ImplicitCertificate.h index cb3b44a8b33c9fbd76332ff8813f27f135b4ac98..dc70f63468977bfcf8aa44f7190fd8d7cbe8f99b 100644 --- a/certgen/asncodec/ImplicitCertificate.h +++ b/certgen/asncodec/ImplicitCertificate.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/IndividualAprv.c b/certgen/asncodec/IndividualAprv.c index 4490ea5a453885bbeabdff387d6ec69847f8cf93..5b2ba664195fe8ad2a95645a2bc64ba43d262fe2 100644 --- a/certgen/asncodec/IndividualAprv.c +++ b/certgen/asncodec/IndividualAprv.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Acpc" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Acpc.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "IndividualAprv.h" diff --git a/certgen/asncodec/IndividualAprv.h b/certgen/asncodec/IndividualAprv.h index 7fb13fd3efa4e01656abce2c59660271271b9b83..bf874acaa60826f8584cdf39485f2529f2973ff2 100644 --- a/certgen/asncodec/IndividualAprv.h +++ b/certgen/asncodec/IndividualAprv.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Acpc" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Acpc.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/IndividualRevocation.c b/certgen/asncodec/IndividualRevocation.c index 7c856565f928518f63756b16700f42a90ffa17c4..8ad22e09ef2f89bf4c4fc45f1ffd0802e3e86b0b 100644 --- a/certgen/asncodec/IndividualRevocation.c +++ b/certgen/asncodec/IndividualRevocation.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2CrlBaseTypes" * found in "asn1/ieee1609.2/Ieee1609Dot2CrlBaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "IndividualRevocation.h" diff --git a/certgen/asncodec/IndividualRevocation.h b/certgen/asncodec/IndividualRevocation.h index b9c3f0a33639a8a9c4233de10d3edc88a94b3cc0..8d611a071f86e11b551a67326afa861af05d6f1c 100644 --- a/certgen/asncodec/IndividualRevocation.h +++ b/certgen/asncodec/IndividualRevocation.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2CrlBaseTypes" * found in "asn1/ieee1609.2/Ieee1609Dot2CrlBaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/InnerAtRequest.c b/certgen/asncodec/InnerAtRequest.c index cab9e5aae2d02bf41931f26dc7f6d751a9e66d7e..3d1a577636dba51681042d6fe6c5dc821507d685 100644 --- a/certgen/asncodec/InnerAtRequest.c +++ b/certgen/asncodec/InnerAtRequest.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TypesAuthorization" * found in "asn1/pki_ts102941/EtsiTs102941TypesAuthorization.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "InnerAtRequest.h" diff --git a/certgen/asncodec/InnerAtRequest.h b/certgen/asncodec/InnerAtRequest.h index 2206349a2c9e2ce452a6b43a5d8b26dca7a73787..9fb689649c6b048aa0715c5738db2d0e8949d727 100644 --- a/certgen/asncodec/InnerAtRequest.h +++ b/certgen/asncodec/InnerAtRequest.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TypesAuthorization" * found in "asn1/pki_ts102941/EtsiTs102941TypesAuthorization.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/InnerAtResponse.c b/certgen/asncodec/InnerAtResponse.c index c2695e83b118390387487ed47c61f46f3e2aeca1..8d419bbd75eda6e85cff19d12fb55a8fffac15cb 100644 --- a/certgen/asncodec/InnerAtResponse.c +++ b/certgen/asncodec/InnerAtResponse.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TypesAuthorization" * found in "asn1/pki_ts102941/EtsiTs102941TypesAuthorization.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "InnerAtResponse.h" diff --git a/certgen/asncodec/InnerAtResponse.h b/certgen/asncodec/InnerAtResponse.h index 4c58ab5306b0fd73953f3c3b9ec81688d335cce9..69df3d7e6743381f98d932a017099f9eebc18448 100644 --- a/certgen/asncodec/InnerAtResponse.h +++ b/certgen/asncodec/InnerAtResponse.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TypesAuthorization" * found in "asn1/pki_ts102941/EtsiTs102941TypesAuthorization.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/InnerEcRequest.c b/certgen/asncodec/InnerEcRequest.c index afd81b061971c3adfa622f20f0721ce80fc5bedd..57088ffdb4ed4ced7be553984eda64e0859f95cf 100644 --- a/certgen/asncodec/InnerEcRequest.c +++ b/certgen/asncodec/InnerEcRequest.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TypesEnrolment" * found in "asn1/pki_ts102941/EtsiTs102941TypesEnrolment.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "InnerEcRequest.h" diff --git a/certgen/asncodec/InnerEcRequest.h b/certgen/asncodec/InnerEcRequest.h index d8d404cf10bc019e86653665c78148153056d7e8..45b9d5a75cfcaabf12e970a54148af7ba87f3ef9 100644 --- a/certgen/asncodec/InnerEcRequest.h +++ b/certgen/asncodec/InnerEcRequest.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TypesEnrolment" * found in "asn1/pki_ts102941/EtsiTs102941TypesEnrolment.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/InnerEcRequestSignedForPop.c b/certgen/asncodec/InnerEcRequestSignedForPop.c index 35b0a7af476489cb07dd4f81b5909fc9cb00754a..e4e6184f573051da074646216a86e799cb960e5b 100644 --- a/certgen/asncodec/InnerEcRequestSignedForPop.c +++ b/certgen/asncodec/InnerEcRequestSignedForPop.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TypesEnrolment" * found in "asn1/pki_ts102941/EtsiTs102941TypesEnrolment.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "InnerEcRequestSignedForPop.h" diff --git a/certgen/asncodec/InnerEcRequestSignedForPop.h b/certgen/asncodec/InnerEcRequestSignedForPop.h index f49f5402fe64dc533c09bc911a4177e1eb10401c..2875b0f7d3486a393604fd22f8376eb284eb49c8 100644 --- a/certgen/asncodec/InnerEcRequestSignedForPop.h +++ b/certgen/asncodec/InnerEcRequestSignedForPop.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TypesEnrolment" * found in "asn1/pki_ts102941/EtsiTs102941TypesEnrolment.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/InnerEcResponse.c b/certgen/asncodec/InnerEcResponse.c index 36a7f2b15b61819a92d5637ae916dcbb0cdfaaab..51ce7495341a67af6c33ad73092d142219955110 100644 --- a/certgen/asncodec/InnerEcResponse.c +++ b/certgen/asncodec/InnerEcResponse.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TypesEnrolment" * found in "asn1/pki_ts102941/EtsiTs102941TypesEnrolment.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "InnerEcResponse.h" diff --git a/certgen/asncodec/InnerEcResponse.h b/certgen/asncodec/InnerEcResponse.h index 1c5a42f44e3c6f162bd7f1f26a43d552fee6b034..183f7258381b0e8a8e2b03f325ca3754c1877d8b 100644 --- a/certgen/asncodec/InnerEcResponse.h +++ b/certgen/asncodec/InnerEcResponse.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TypesEnrolment" * found in "asn1/pki_ts102941/EtsiTs102941TypesEnrolment.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/IssuerIdentifier.c b/certgen/asncodec/IssuerIdentifier.c index ca08d26dc6228cd40346250bc7437df781f31465..67616a56f7534287cc3b78e9d25b05481aebeff3 100644 --- a/certgen/asncodec/IssuerIdentifier.c +++ b/certgen/asncodec/IssuerIdentifier.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "IssuerIdentifier.h" diff --git a/certgen/asncodec/IssuerIdentifier.h b/certgen/asncodec/IssuerIdentifier.h index 4dc293c61f2eeb8760ce4ba730e94b78f52ca445..fe6eab8ba2d59da5655c52c5af449d4e8b038e31 100644 --- a/certgen/asncodec/IssuerIdentifier.h +++ b/certgen/asncodec/IssuerIdentifier.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/JMaxGroup.c b/certgen/asncodec/JMaxGroup.c index ff62020a2d498c2c90ca0c187e566edef550529a..30beb0b64a3e01f46bd2577a88bb775761d67b7d 100644 --- a/certgen/asncodec/JMaxGroup.c +++ b/certgen/asncodec/JMaxGroup.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2CrlBaseTypes" * found in "asn1/ieee1609.2/Ieee1609Dot2CrlBaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "JMaxGroup.h" diff --git a/certgen/asncodec/JMaxGroup.h b/certgen/asncodec/JMaxGroup.h index ee09c4331d5ceaa3fe9293ce4ec8ae43f69c0d18..de6798fa6e8a2682147ab0264c546913c87feca0 100644 --- a/certgen/asncodec/JMaxGroup.h +++ b/certgen/asncodec/JMaxGroup.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2CrlBaseTypes" * found in "asn1/ieee1609.2/Ieee1609Dot2CrlBaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/KnownLatitude.c b/certgen/asncodec/KnownLatitude.c index bfc334d13cc535817beeff5b8b7efc4dc54c233c..309b6d579228b105ed0cd87550958f35614eb522 100644 --- a/certgen/asncodec/KnownLatitude.c +++ b/certgen/asncodec/KnownLatitude.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "KnownLatitude.h" diff --git a/certgen/asncodec/KnownLatitude.h b/certgen/asncodec/KnownLatitude.h index 08cc5bffc7a7a963c9c49554d6d4ce09d0ac04d0..4cba498a5b72a2fb5704ad88ba86b6cf2cae97cc 100644 --- a/certgen/asncodec/KnownLatitude.h +++ b/certgen/asncodec/KnownLatitude.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/KnownLongitude.c b/certgen/asncodec/KnownLongitude.c index c5d5c00819c204c3e810d5c5a7ea2abed9676972..05a651d3ff04938be4364b3e77c98fb01ab76293 100644 --- a/certgen/asncodec/KnownLongitude.c +++ b/certgen/asncodec/KnownLongitude.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "KnownLongitude.h" diff --git a/certgen/asncodec/KnownLongitude.h b/certgen/asncodec/KnownLongitude.h index 36fc50b93234e4945884e8cd3321b6e395a08a90..2d402ca73d49eb5c0e1bd9c10307d44ad01c46bb 100644 --- a/certgen/asncodec/KnownLongitude.h +++ b/certgen/asncodec/KnownLongitude.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/LAGroup.c b/certgen/asncodec/LAGroup.c index dbf9ba3572b26fbfe826ce1abacc657c41d7809b..423fdfa3dd7b5792853d6db4e54f29edeadf0861 100644 --- a/certgen/asncodec/LAGroup.c +++ b/certgen/asncodec/LAGroup.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2CrlBaseTypes" * found in "asn1/ieee1609.2/Ieee1609Dot2CrlBaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "LAGroup.h" diff --git a/certgen/asncodec/LAGroup.h b/certgen/asncodec/LAGroup.h index c377fff0ae031370734e5152137d6b7084c1d881..15ab7a0c2e72b8a295ca41fe363c57e65b1d26af 100644 --- a/certgen/asncodec/LAGroup.h +++ b/certgen/asncodec/LAGroup.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2CrlBaseTypes" * found in "asn1/ieee1609.2/Ieee1609Dot2CrlBaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/LaId.c b/certgen/asncodec/LaId.c index 4e922529f3e74591ec87567ca14bb13db5de4b57..f2ecc11e6e056981d3f6b07458592894ac8d982a 100644 --- a/certgen/asncodec/LaId.c +++ b/certgen/asncodec/LaId.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "LaId.h" diff --git a/certgen/asncodec/LaId.h b/certgen/asncodec/LaId.h index 4f0376e23e8e394a6f22b49273df73efb01fdefc..a637616c99c1a31e780b3686c055482947fc437b 100644 --- a/certgen/asncodec/LaId.h +++ b/certgen/asncodec/LaId.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/LaMaInterfacePdu.c b/certgen/asncodec/LaMaInterfacePdu.c index 56a8d208f17e5bc0a5e05d9cea7315f1eeb6f67e..5a124827fe21790d8232a18d0cbc52ea4c1b6e41 100644 --- a/certgen/asncodec/LaMaInterfacePdu.c +++ b/certgen/asncodec/LaMaInterfacePdu.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1LaMaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1LaMaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "LaMaInterfacePdu.h" diff --git a/certgen/asncodec/LaMaInterfacePdu.h b/certgen/asncodec/LaMaInterfacePdu.h index ef622eb4fead6b64fa1109b68d9d38fc00fc3fcb..e9c97afa7458c9d6d2ecfaed2d2e36b4b566da46 100644 --- a/certgen/asncodec/LaMaInterfacePdu.h +++ b/certgen/asncodec/LaMaInterfacePdu.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1LaMaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1LaMaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/LaRaInterfacePdu.c b/certgen/asncodec/LaRaInterfacePdu.c index fdc187baaa5ce92c6c131982c8abf4b03b1fc9a7..3bdbb6985dd57a1112bbe5ede500e3d1fcc5f459 100644 --- a/certgen/asncodec/LaRaInterfacePdu.c +++ b/certgen/asncodec/LaRaInterfacePdu.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1LaRaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1LaRaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "LaRaInterfacePdu.h" diff --git a/certgen/asncodec/LaRaInterfacePdu.h b/certgen/asncodec/LaRaInterfacePdu.h index 0bbe73d987a822ba8cf572bae0f67f025e6ff7e9..498bb3552ea063e1335c045f11da9e459666c8b4 100644 --- a/certgen/asncodec/LaRaInterfacePdu.h +++ b/certgen/asncodec/LaRaInterfacePdu.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1LaRaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1LaRaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/LaSsp.c b/certgen/asncodec/LaSsp.c index 18b377883c02cbcc859e44ac36c96983beab72d4..cf0c3f0b03f4e2c8c2e7c180a1a6c7dddb15e674 100644 --- a/certgen/asncodec/LaSsp.c +++ b/certgen/asncodec/LaSsp.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "LaSsp.h" diff --git a/certgen/asncodec/LaSsp.h b/certgen/asncodec/LaSsp.h index 2d1539a968cb92511bff88c81bb0785c512f2c80..6a0b29a880209c3b62586ae5d63936b51d2f7545 100644 --- a/certgen/asncodec/LaSsp.h +++ b/certgen/asncodec/LaSsp.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/Latitude.c b/certgen/asncodec/Latitude.c index 89ef230255bca8d198f37e81e4c024ab9af198f9..90328c728b737e61e5e62e936a26f744adf60b00 100644 --- a/certgen/asncodec/Latitude.c +++ b/certgen/asncodec/Latitude.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "Latitude.h" diff --git a/certgen/asncodec/Latitude.h b/certgen/asncodec/Latitude.h index ef78afe6a0a24c4a6dfbf5216185afcf819ea551..39fd28177d94901f8b329eddfd81e3201313132e 100644 --- a/certgen/asncodec/Latitude.h +++ b/certgen/asncodec/Latitude.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/LinkageData.c b/certgen/asncodec/LinkageData.c index 1e8a1e541f20411fd813890170a7edbf371432d6..490db68e21884e5b11e350f746a3c9cbb13d2a0c 100644 --- a/certgen/asncodec/LinkageData.c +++ b/certgen/asncodec/LinkageData.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "LinkageData.h" diff --git a/certgen/asncodec/LinkageData.h b/certgen/asncodec/LinkageData.h index b26ebed0e47c6736a3ab9b9b770df59bd68c5ab9..c27cf1614fd7636c1eac0f8fc47ee917ac3a1f4d 100644 --- a/certgen/asncodec/LinkageData.h +++ b/certgen/asncodec/LinkageData.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/LinkageInfo.c b/certgen/asncodec/LinkageInfo.c index 1572622270af9b7ba334bbb305ef3b7ee6eacc0b..2a4b2ac2381609c44282a249a512d4a3b079ddc0 100644 --- a/certgen/asncodec/LinkageInfo.c +++ b/certgen/asncodec/LinkageInfo.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1AcaRaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1AcaRaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "LinkageInfo.h" diff --git a/certgen/asncodec/LinkageInfo.h b/certgen/asncodec/LinkageInfo.h index ec10455e148dbbec5427239534f80354f7cd00b5..bce16f6a490d06fc7a27e4ec387e1e423683df0b 100644 --- a/certgen/asncodec/LinkageInfo.h +++ b/certgen/asncodec/LinkageInfo.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1AcaRaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1AcaRaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/LinkageSeed.c b/certgen/asncodec/LinkageSeed.c index e65d4a610095d6bacbefec121ff366ce0bb8ae55..253b2b9cbb7e6660e0e6cc82d7b6a3a1dcb5d68f 100644 --- a/certgen/asncodec/LinkageSeed.c +++ b/certgen/asncodec/LinkageSeed.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "LinkageSeed.h" diff --git a/certgen/asncodec/LinkageSeed.h b/certgen/asncodec/LinkageSeed.h index 3b76a1d92ad59ef62b77c999e72ac400906e9e63..3631e001f8f887a5d7f15de13d8deef08720fc7b 100644 --- a/certgen/asncodec/LinkageSeed.h +++ b/certgen/asncodec/LinkageSeed.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/LinkageValue.c b/certgen/asncodec/LinkageValue.c index a2aecf38f5a53689f0dd4ba0b166e3c3884b622c..e89c73eb0be4ca974bee320d411ac3798484c7ea 100644 --- a/certgen/asncodec/LinkageValue.c +++ b/certgen/asncodec/LinkageValue.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "LinkageValue.h" diff --git a/certgen/asncodec/LinkageValue.h b/certgen/asncodec/LinkageValue.h index 91a7341503af72a035117fdf0c15088f2f3e03c9..ebbff64ddcb043c5d1954ed7e7dd91e938f4d9d1 100644 --- a/certgen/asncodec/LinkageValue.h +++ b/certgen/asncodec/LinkageValue.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/Longitude.c b/certgen/asncodec/Longitude.c index 14b1f5c6e2399e540ac322e0c622d3be17a85b5e..fd9c7cb720010a5636fa3360e91aacdc6ac765c5 100644 --- a/certgen/asncodec/Longitude.c +++ b/certgen/asncodec/Longitude.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "Longitude.h" diff --git a/certgen/asncodec/Longitude.h b/certgen/asncodec/Longitude.h index 7c0a08e8cd1e904eb4b2d4e839b178a0ce9d8600..30dd7ebdfc2282f7f8548b2c7988efa96c23c0f2 100644 --- a/certgen/asncodec/Longitude.h +++ b/certgen/asncodec/Longitude.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/LopSsp.c b/certgen/asncodec/LopSsp.c index f3c4d717e07706d22ce1a5f9dbb757c2359f738e..f2c7a3ce526d02d7fa0940f6f86419406e33f663 100644 --- a/certgen/asncodec/LopSsp.c +++ b/certgen/asncodec/LopSsp.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "LopSsp.h" diff --git a/certgen/asncodec/LopSsp.h b/certgen/asncodec/LopSsp.h index e65688f1297e462bcd1ee02162a0ef012719aaca..45653f2080a538baa21362bb23936ac7010b41cd 100644 --- a/certgen/asncodec/LopSsp.h +++ b/certgen/asncodec/LopSsp.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/LvGenerationFunctionIdentifier.c b/certgen/asncodec/LvGenerationFunctionIdentifier.c index 157ea2e076d437b0556322f3831c2f0c9fd5e024..0137c85a35efc6e92d6dadb53ee0f60184b621a4 100644 --- a/certgen/asncodec/LvGenerationFunctionIdentifier.c +++ b/certgen/asncodec/LvGenerationFunctionIdentifier.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2CrlBaseTypes" * found in "asn1/ieee1609.2/Ieee1609Dot2CrlBaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "LvGenerationFunctionIdentifier.h" diff --git a/certgen/asncodec/LvGenerationFunctionIdentifier.h b/certgen/asncodec/LvGenerationFunctionIdentifier.h index e70b55dee9154c5f849332f8bdaf7e92024157f4..3c00b1c98dcbe6839503b4d75fd4007a77e932a6 100644 --- a/certgen/asncodec/LvGenerationFunctionIdentifier.h +++ b/certgen/asncodec/LvGenerationFunctionIdentifier.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2CrlBaseTypes" * found in "asn1/ieee1609.2/Ieee1609Dot2CrlBaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/MaInfoStatus.c b/certgen/asncodec/MaInfoStatus.c index c63abb6dcbacd0067fe50fd2b6492f1acbcc2dd3..27232031d8e11124dee8a984ac6ec3a63b39bf0b 100644 --- a/certgen/asncodec/MaInfoStatus.c +++ b/certgen/asncodec/MaInfoStatus.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1CertManagement" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1CertManagement.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "MaInfoStatus.h" diff --git a/certgen/asncodec/MaInfoStatus.h b/certgen/asncodec/MaInfoStatus.h index c5496d5dd970b1e77bdd29a8fe125904ff9b6e98..91328c4ee8d16b40a05a25cdfd57b0560cd4ff32 100644 --- a/certgen/asncodec/MaInfoStatus.h +++ b/certgen/asncodec/MaInfoStatus.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1CertManagement" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1CertManagement.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/MaRaInterfacePdu.c b/certgen/asncodec/MaRaInterfacePdu.c index fdbda24bf48f0a1d0f05609e9efef3418ab83513..cfc2ddfddbdecd37defe7579419a4a883c1e1460 100644 --- a/certgen/asncodec/MaRaInterfacePdu.c +++ b/certgen/asncodec/MaRaInterfacePdu.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1MaRaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1MaRaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "MaRaInterfacePdu.h" diff --git a/certgen/asncodec/MaRaInterfacePdu.h b/certgen/asncodec/MaRaInterfacePdu.h index 364c50c37ddccf6b1701ddd98b7c82935c535fa1..768a68353a5e8b59b1ef2ff1b3ee70333a7b517d 100644 --- a/certgen/asncodec/MaRaInterfacePdu.h +++ b/certgen/asncodec/MaRaInterfacePdu.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1MaRaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1MaRaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/MaSsp.c b/certgen/asncodec/MaSsp.c index 52f2dbaf3455900cdb4badb120692a6f799749bf..faf40a1e81bffca3badedb6024908d6436075d99 100644 --- a/certgen/asncodec/MaSsp.c +++ b/certgen/asncodec/MaSsp.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "MaSsp.h" diff --git a/certgen/asncodec/MaSsp.h b/certgen/asncodec/MaSsp.h index bf50f0f4c7ab96d578092b51bed7c66410d56bc7..105897d4773c63bee55ce86adc74e9e2ea884cfd 100644 --- a/certgen/asncodec/MaSsp.h +++ b/certgen/asncodec/MaSsp.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/Makefile b/certgen/asncodec/Makefile index f687a6ac6326f2d358fa8c91e66f605d8b306c3d..3a517c3e45a64448667631e53114d9a3c04e63fa 100644 --- a/certgen/asncodec/Makefile +++ b/certgen/asncodec/Makefile @@ -1,77 +1,77 @@ -ifneq ( $(findstring $(MAKECMDGOALS),clean regen),) - include Makefile.am.libasncodec -endif - -PROJECTROOT = ../.. -BUILDROOT = $(PROJECTROOT)/build -CSHAREDDIR = $(PROJECTROOT)/cshared -PROJECT = ItsCertAsn -DEBUG = yes -alibs = ItsCertAsn -sources := $(ASN_MODULE_SRCS) -includes += . -cflags += $(ASN_MODULE_CFLAGS) - -include $(CSHAREDDIR)/common.mk - -TS102941_DIR := asn1/pki_ts102941 -TS103097_DIR := asn1/sec_ts103097 -IEEE1609_2_DIR := asn1/ieee1609.2 -IEEE1609_2_1_DIR := asn1/ieee1609.2.1 - -ASN1CDIR ?= ../../../../asn1c-fillabs2 - -ifeq (,$(ASN1C)) - ifneq (,$(ASN1CDIR)) - ASN1C := $(ASN1CDIR)/asn1c/asn1c -S $(ASN1CDIR)/skeletons - else - ASN1C := asn1c - endif -endif - -ASN1C_ARGS := -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example - -ASN1_SRC := \ - $(TS102941_DIR)/EtsiTs102941MessagesCa.asn \ - $(TS102941_DIR)/EtsiTs102941TrustLists.asn \ - $(TS102941_DIR)/EtsiTs102941TypesAuthorization.asn \ - $(TS102941_DIR)/EtsiTs102941TypesAuthorizationValidation.asn \ - $(TS102941_DIR)/EtsiTs102941TypesCaManagement.asn \ - $(TS102941_DIR)/EtsiTs102941BaseTypes.asn \ - $(TS102941_DIR)/EtsiTs102941TypesEnrolment.asn \ - $(TS102941_DIR)/EtsiTs102941TypesLinkCertificate.asn \ - $(TS103097_DIR)/EtsiTs103097Module.asn \ - $(TS103097_DIR)/EtsiTs103097ExtensionModule.asn \ - $(IEEE1609_2_DIR)/Ieee1609Dot2.asn \ - $(IEEE1609_2_DIR)/Ieee1609Dot2BaseTypes.asn \ - $(IEEE1609_2_DIR)/Ieee1609Dot2Crl.asn \ - $(IEEE1609_2_DIR)/Ieee1609Dot2CrlBaseTypes.asn \ - $(IEEE1609_2_1_DIR)/Ieee1609Dot2Dot1AcaEeInterface.asn \ - $(IEEE1609_2_1_DIR)/Ieee1609Dot2Dot1AcaLaInterface.asn \ - $(IEEE1609_2_1_DIR)/Ieee1609Dot2Dot1AcaMaInterface.asn \ - $(IEEE1609_2_1_DIR)/Ieee1609Dot2Dot1AcaRaInterface.asn \ - $(IEEE1609_2_1_DIR)/Ieee1609Dot2Dot1Acpc.asn \ - $(IEEE1609_2_1_DIR)/Ieee1609Dot2Dot1CamRaInterface.asn \ - $(IEEE1609_2_1_DIR)/Ieee1609Dot2Dot1CertManagement.asn \ - $(IEEE1609_2_1_DIR)/Ieee1609Dot2Dot1EcaEeInterface.asn \ - $(IEEE1609_2_1_DIR)/Ieee1609Dot2Dot1EeMaInterface.asn \ - $(IEEE1609_2_1_DIR)/Ieee1609Dot2Dot1EeRaInterface.asn \ - $(IEEE1609_2_1_DIR)/Ieee1609Dot2Dot1LaMaInterface.asn \ - $(IEEE1609_2_1_DIR)/Ieee1609Dot2Dot1LaRaInterface.asn \ - $(IEEE1609_2_1_DIR)/Ieee1609Dot2Dot1MaRaInterface.asn \ - $(IEEE1609_2_1_DIR)/Ieee1609Dot2Dot1Protocol.asn \ - -ASN1_PDU := \ - EtsiTs103097Data \ - EnrolmentRequestMessage EnrolmentResponseMessage \ - AuthorizationRequestMessage AuthorizationRequestMessageWithPop AuthorizationResponseMessage \ - CertificateRevocationListMessage TlmCertificateTrustListMessage RcaCertificateTrustListMessage \ - AuthorizationValidationRequestMessage AuthorizationValidationResponseMessage \ - CaCertificateRequestMessage \ - EtsiTs103097Certificate - -regen: force_regen Makefile.am.libasncodec -force_regen: - rm -f Makefile.am.libasncodec -Makefile.am.libasncodec: $(ASN1_SRC) - $(ASN1C) -fcompound-names $(ASN1C_ARGS) $(addprefix -pdu=,$(ASN1_PDU)) $(patsubst %,"%",$(ASN1_SRC)) 2>&1 +ifneq ( $(findstring $(MAKECMDGOALS),clean regen),) + include Makefile.am.libasncodec +endif + +PROJECTROOT = ../.. +BUILDROOT = $(PROJECTROOT)/build +CSHAREDDIR = $(PROJECTROOT)/cshared +PROJECT = ItsCertAsn +DEBUG = yes +alibs = ItsCertAsn +sources := $(ASN_MODULE_SRCS) +includes += . +cflags += $(ASN_MODULE_CFLAGS) + +include $(CSHAREDDIR)/common.mk + +TS102941_DIR := asn1/pki_ts102941 +TS103097_DIR := asn1/sec_ts103097 +IEEE1609_2_DIR := asn1/ieee1609.2 +IEEE1609_2_1_DIR := asn1/ieee1609.2.1 + +ASN1CDIR ?= ../../../../asn1c-fillabs + +ifeq (,$(ASN1C)) + ifneq (,$(ASN1CDIR)) + ASN1C := $(ASN1CDIR)/asn1c/asn1c -S $(ASN1CDIR)/skeletons + else + ASN1C := asn1c + endif +endif + +ASN1C_ARGS := -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example + +ASN1_SRC := \ + $(TS102941_DIR)/EtsiTs102941MessagesCa.asn \ + $(TS102941_DIR)/EtsiTs102941TrustLists.asn \ + $(TS102941_DIR)/EtsiTs102941TypesAuthorization.asn \ + $(TS102941_DIR)/EtsiTs102941TypesAuthorizationValidation.asn \ + $(TS102941_DIR)/EtsiTs102941TypesCaManagement.asn \ + $(TS102941_DIR)/EtsiTs102941BaseTypes.asn \ + $(TS102941_DIR)/EtsiTs102941TypesEnrolment.asn \ + $(TS102941_DIR)/EtsiTs102941TypesLinkCertificate.asn \ + $(TS103097_DIR)/EtsiTs103097Module.asn \ + $(TS103097_DIR)/EtsiTs103097ExtensionModule.asn \ + $(IEEE1609_2_DIR)/Ieee1609Dot2.asn \ + $(IEEE1609_2_DIR)/Ieee1609Dot2BaseTypes.asn \ + $(IEEE1609_2_DIR)/Ieee1609Dot2Crl.asn \ + $(IEEE1609_2_DIR)/Ieee1609Dot2CrlBaseTypes.asn \ + $(IEEE1609_2_1_DIR)/Ieee1609Dot2Dot1AcaEeInterface.asn \ + $(IEEE1609_2_1_DIR)/Ieee1609Dot2Dot1AcaLaInterface.asn \ + $(IEEE1609_2_1_DIR)/Ieee1609Dot2Dot1AcaMaInterface.asn \ + $(IEEE1609_2_1_DIR)/Ieee1609Dot2Dot1AcaRaInterface.asn \ + $(IEEE1609_2_1_DIR)/Ieee1609Dot2Dot1Acpc.asn \ + $(IEEE1609_2_1_DIR)/Ieee1609Dot2Dot1CamRaInterface.asn \ + $(IEEE1609_2_1_DIR)/Ieee1609Dot2Dot1CertManagement.asn \ + $(IEEE1609_2_1_DIR)/Ieee1609Dot2Dot1EcaEeInterface.asn \ + $(IEEE1609_2_1_DIR)/Ieee1609Dot2Dot1EeMaInterface.asn \ + $(IEEE1609_2_1_DIR)/Ieee1609Dot2Dot1EeRaInterface.asn \ + $(IEEE1609_2_1_DIR)/Ieee1609Dot2Dot1LaMaInterface.asn \ + $(IEEE1609_2_1_DIR)/Ieee1609Dot2Dot1LaRaInterface.asn \ + $(IEEE1609_2_1_DIR)/Ieee1609Dot2Dot1MaRaInterface.asn \ + $(IEEE1609_2_1_DIR)/Ieee1609Dot2Dot1Protocol.asn \ + +ASN1_PDU := \ + EtsiTs103097Data \ + EnrolmentRequestMessage EnrolmentResponseMessage \ + AuthorizationRequestMessage AuthorizationRequestMessageWithPop AuthorizationResponseMessage \ + CertificateRevocationListMessage TlmCertificateTrustListMessage RcaCertificateTrustListMessage \ + AuthorizationValidationRequestMessage AuthorizationValidationResponseMessage \ + CaCertificateRequestMessage \ + EtsiTs103097Certificate + +regen: force_regen Makefile.am.libasncodec +force_regen: + rm -f Makefile.am.libasncodec +Makefile.am.libasncodec: $(ASN1_SRC) + $(ASN1C) -fcompound-names $(ASN1C_ARGS) $(addprefix -pdu=,$(ASN1_PDU)) $(patsubst %,"%",$(ASN1_SRC)) 2>&1 diff --git a/certgen/asncodec/MissingCrlIdentifier.c b/certgen/asncodec/MissingCrlIdentifier.c index 89a709cd69553704f92858e27157428eb80e4ecd..be2a6076c32678305b478e8c827a1daa92e79157 100644 --- a/certgen/asncodec/MissingCrlIdentifier.c +++ b/certgen/asncodec/MissingCrlIdentifier.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "MissingCrlIdentifier.h" diff --git a/certgen/asncodec/MissingCrlIdentifier.h b/certgen/asncodec/MissingCrlIdentifier.h index 35ee007f7e4241fb061c7af8a958e860e4797379..0730a70847570e9f2cf94aae1cbb4d7a9dc6b062 100644 --- a/certgen/asncodec/MissingCrlIdentifier.h +++ b/certgen/asncodec/MissingCrlIdentifier.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/MultiSignedCtl.c b/certgen/asncodec/MultiSignedCtl.c index cdd5fa7bb4118c45377203bba32b55e20f481db8..c470d8a99844273734438e6b4b28a18e77ccc3fe 100644 --- a/certgen/asncodec/MultiSignedCtl.c +++ b/certgen/asncodec/MultiSignedCtl.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1CertManagement" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1CertManagement.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "MultiSignedCtl.h" diff --git a/certgen/asncodec/MultiSignedCtl.h b/certgen/asncodec/MultiSignedCtl.h index bf268a6f76eb656472f892016793077e7e30d50c..3a668154b6b9f0044340f6791ae9b406e482cd0c 100644 --- a/certgen/asncodec/MultiSignedCtl.h +++ b/certgen/asncodec/MultiSignedCtl.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1CertManagement" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1CertManagement.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/MultiSignedCtlSpdu.c b/certgen/asncodec/MultiSignedCtlSpdu.c index 762c499d2bab0ea8cb85f07e36c2fae86c8cef01..81fcbd333882224754fd228784720d2f97ba4cbe 100644 --- a/certgen/asncodec/MultiSignedCtlSpdu.c +++ b/certgen/asncodec/MultiSignedCtlSpdu.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "MultiSignedCtlSpdu.h" diff --git a/certgen/asncodec/MultiSignedCtlSpdu.h b/certgen/asncodec/MultiSignedCtlSpdu.h index 165829a3bef72bf9195d054b68321b03c672e85d..6615ca447c44e9b19a45173cc129c1aeac2d87b9 100644 --- a/certgen/asncodec/MultiSignedCtlSpdu.h +++ b/certgen/asncodec/MultiSignedCtlSpdu.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/NULL.c b/certgen/asncodec/NULL.c index d160e695f47ca0bd651aa5cf942cc873c832a185..eddb1d97c265d3e41ef4d9ebb7238bdaa9e7f499 100644 --- a/certgen/asncodec/NULL.c +++ b/certgen/asncodec/NULL.c @@ -1,113 +1,113 @@ -/*- - * Copyright (c) 2003, 2005 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include - -/* - * NULL basic type description. - */ -static const ber_tlv_tag_t asn_DEF_NULL_tags[] = { - (ASN_TAG_CLASS_UNIVERSAL | (5 << 2)) -}; -asn_TYPE_operation_t asn_OP_NULL = { - NULL_free, -#if !defined(ASN_DISABLE_PRINT_SUPPORT) - NULL_print, -#else - 0, -#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ - NULL_compare, -#if !defined(ASN_DISABLE_BER_SUPPORT) - NULL_decode_ber, - NULL_encode_der, /* Special handling of DER encoding */ -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ -#if !defined(ASN_DISABLE_XER_SUPPORT) - NULL_decode_xer, - NULL_encode_xer, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ -#if !defined(ASN_DISABLE_JER_SUPPORT) - NULL_encode_jer, -#else - 0, -#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ -#if !defined(ASN_DISABLE_OER_SUPPORT) - NULL_decode_oer, - NULL_encode_oer, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ -#if !defined(ASN_DISABLE_UPER_SUPPORT) - NULL_decode_uper, /* Unaligned PER decoder */ - NULL_encode_uper, /* Unaligned PER encoder */ -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ -#if !defined(ASN_DISABLE_APER_SUPPORT) - NULL_decode_aper, /* Aligned PER decoder */ - NULL_encode_aper, /* Aligned PER encoder */ -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ -#if !defined(ASN_DISABLE_RFILL_SUPPORT) - NULL_random_fill, -#else - 0, -#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ - 0 /* Use generic outmost tag fetcher */ -}; -asn_TYPE_descriptor_t asn_DEF_NULL = { - "NULL", - "NULL", - &asn_OP_NULL, - asn_DEF_NULL_tags, - sizeof(asn_DEF_NULL_tags) / sizeof(asn_DEF_NULL_tags[0]), - asn_DEF_NULL_tags, /* Same as above */ - sizeof(asn_DEF_NULL_tags) / sizeof(asn_DEF_NULL_tags[0]), - { -#if !defined(ASN_DISABLE_OER_SUPPORT) - 0, -#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ -#if !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) - 0, -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) */ - asn_generic_no_constraint - }, - 0, 0, /* No members */ - 0 /* No specifics */ -}; - -void -NULL_free(const asn_TYPE_descriptor_t *td, void *ptr, - enum asn_struct_free_method method) { - if(td && ptr) { - switch(method) { - case ASFM_FREE_EVERYTHING: - FREEMEM(ptr); - break; - case ASFM_FREE_UNDERLYING: - break; - case ASFM_FREE_UNDERLYING_AND_RESET: - memset(ptr, 0, sizeof(NULL_t)); - break; - } - } -} - -int -NULL_compare(const asn_TYPE_descriptor_t *td, const void *a, const void *b) { - (void)td; - (void)a; - (void)b; - return 0; -} +/*- + * Copyright (c) 2003, 2005 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include + +/* + * NULL basic type description. + */ +static const ber_tlv_tag_t asn_DEF_NULL_tags[] = { + (ASN_TAG_CLASS_UNIVERSAL | (5 << 2)) +}; +asn_TYPE_operation_t asn_OP_NULL = { + NULL_free, +#if !defined(ASN_DISABLE_PRINT_SUPPORT) + NULL_print, +#else + 0, +#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ + NULL_compare, +#if !defined(ASN_DISABLE_BER_SUPPORT) + NULL_decode_ber, + NULL_encode_der, /* Special handling of DER encoding */ +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ +#if !defined(ASN_DISABLE_XER_SUPPORT) + NULL_decode_xer, + NULL_encode_xer, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ +#if !defined(ASN_DISABLE_JER_SUPPORT) + NULL_encode_jer, +#else + 0, +#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ +#if !defined(ASN_DISABLE_OER_SUPPORT) + NULL_decode_oer, + NULL_encode_oer, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ +#if !defined(ASN_DISABLE_UPER_SUPPORT) + NULL_decode_uper, /* Unaligned PER decoder */ + NULL_encode_uper, /* Unaligned PER encoder */ +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ +#if !defined(ASN_DISABLE_APER_SUPPORT) + NULL_decode_aper, /* Aligned PER decoder */ + NULL_encode_aper, /* Aligned PER encoder */ +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ +#if !defined(ASN_DISABLE_RFILL_SUPPORT) + NULL_random_fill, +#else + 0, +#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ + 0 /* Use generic outmost tag fetcher */ +}; +asn_TYPE_descriptor_t asn_DEF_NULL = { + "NULL", + "NULL", + &asn_OP_NULL, + asn_DEF_NULL_tags, + sizeof(asn_DEF_NULL_tags) / sizeof(asn_DEF_NULL_tags[0]), + asn_DEF_NULL_tags, /* Same as above */ + sizeof(asn_DEF_NULL_tags) / sizeof(asn_DEF_NULL_tags[0]), + { +#if !defined(ASN_DISABLE_OER_SUPPORT) + 0, +#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ +#if !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) + 0, +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) */ + asn_generic_no_constraint + }, + 0, 0, /* No members */ + 0 /* No specifics */ +}; + +void +NULL_free(const asn_TYPE_descriptor_t *td, void *ptr, + enum asn_struct_free_method method) { + if(td && ptr) { + switch(method) { + case ASFM_FREE_EVERYTHING: + FREEMEM(ptr); + break; + case ASFM_FREE_UNDERLYING: + break; + case ASFM_FREE_UNDERLYING_AND_RESET: + memset(ptr, 0, sizeof(NULL_t)); + break; + } + } +} + +int +NULL_compare(const asn_TYPE_descriptor_t *td, const void *a, const void *b) { + (void)td; + (void)a; + (void)b; + return 0; +} diff --git a/certgen/asncodec/NULL.h b/certgen/asncodec/NULL.h index 726447569a280fab7ffee6805501ff50ccb57708..b25d85ae997c7126615a753f58b2ffd674bc3fe9 100644 --- a/certgen/asncodec/NULL.h +++ b/certgen/asncodec/NULL.h @@ -1,69 +1,69 @@ -/*- - * Copyright (c) 2003-2017 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#ifndef ASN_TYPE_NULL_H -#define ASN_TYPE_NULL_H - -#include - -#ifdef __cplusplus -extern "C" { -#endif - -/* - * The value of the NULL type is meaningless. - * Use the BOOLEAN type if you need to carry true/false semantics. - */ -typedef int NULL_t; - -extern asn_TYPE_descriptor_t asn_DEF_NULL; -extern asn_TYPE_operation_t asn_OP_NULL; - -asn_struct_free_f NULL_free; - -#if !defined(ASN_DISABLE_PRINT_SUPPORT) -asn_struct_print_f NULL_print; -#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ - -asn_struct_compare_f NULL_compare; - -#define NULL_constraint asn_generic_no_constraint - -#if !defined(ASN_DISABLE_BER_SUPPORT) -ber_type_decoder_f NULL_decode_ber; -der_type_encoder_f NULL_encode_der; -#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ - -#if !defined(ASN_DISABLE_XER_SUPPORT) -xer_type_decoder_f NULL_decode_xer; -xer_type_encoder_f NULL_encode_xer; -#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ - -#if !defined(ASN_DISABLE_JER_SUPPORT) -jer_type_encoder_f NULL_encode_jer; -#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ - -#if !defined(ASN_DISABLE_OER_SUPPORT) -oer_type_decoder_f NULL_decode_oer; -oer_type_encoder_f NULL_encode_oer; -#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ - -#if !defined(ASN_DISABLE_UPER_SUPPORT) -per_type_decoder_f NULL_decode_uper; -per_type_encoder_f NULL_encode_uper; -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ -#if !defined(ASN_DISABLE_APER_SUPPORT) -per_type_decoder_f NULL_decode_aper; -per_type_encoder_f NULL_encode_aper; -#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ - -#if !defined(ASN_DISABLE_RFILL_SUPPORT) -asn_random_fill_f NULL_random_fill; -#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ - -#ifdef __cplusplus -} -#endif - -#endif /* NULL_H */ +/*- + * Copyright (c) 2003-2017 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#ifndef ASN_TYPE_NULL_H +#define ASN_TYPE_NULL_H + +#include + +#ifdef __cplusplus +extern "C" { +#endif + +/* + * The value of the NULL type is meaningless. + * Use the BOOLEAN type if you need to carry true/false semantics. + */ +typedef int NULL_t; + +extern asn_TYPE_descriptor_t asn_DEF_NULL; +extern asn_TYPE_operation_t asn_OP_NULL; + +asn_struct_free_f NULL_free; + +#if !defined(ASN_DISABLE_PRINT_SUPPORT) +asn_struct_print_f NULL_print; +#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ + +asn_struct_compare_f NULL_compare; + +#define NULL_constraint asn_generic_no_constraint + +#if !defined(ASN_DISABLE_BER_SUPPORT) +ber_type_decoder_f NULL_decode_ber; +der_type_encoder_f NULL_encode_der; +#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ + +#if !defined(ASN_DISABLE_XER_SUPPORT) +xer_type_decoder_f NULL_decode_xer; +xer_type_encoder_f NULL_encode_xer; +#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ + +#if !defined(ASN_DISABLE_JER_SUPPORT) +jer_type_encoder_f NULL_encode_jer; +#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ + +#if !defined(ASN_DISABLE_OER_SUPPORT) +oer_type_decoder_f NULL_decode_oer; +oer_type_encoder_f NULL_encode_oer; +#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ + +#if !defined(ASN_DISABLE_UPER_SUPPORT) +per_type_decoder_f NULL_decode_uper; +per_type_encoder_f NULL_encode_uper; +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ +#if !defined(ASN_DISABLE_APER_SUPPORT) +per_type_decoder_f NULL_decode_aper; +per_type_encoder_f NULL_encode_aper; +#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ + +#if !defined(ASN_DISABLE_RFILL_SUPPORT) +asn_random_fill_f NULL_random_fill; +#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ + +#ifdef __cplusplus +} +#endif + +#endif /* NULL_H */ diff --git a/certgen/asncodec/NULL_oer.c b/certgen/asncodec/NULL_oer.c index 29abaa24cab273f426145d5b4b6a3ed143146db4..ab889de77c28b4d2ce3660858ba6d7e5e536c135 100644 --- a/certgen/asncodec/NULL_oer.c +++ b/certgen/asncodec/NULL_oer.c @@ -1,48 +1,48 @@ -/* - * Copyright (c) 2017 Lev Walkin . - * All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include - -asn_dec_rval_t -NULL_decode_oer(const asn_codec_ctx_t *opt_codec_ctx, - const asn_TYPE_descriptor_t *td, - const asn_oer_constraints_t *constraints, void **sptr, - const void *ptr, size_t size) { - asn_dec_rval_t rv = {RC_OK, 0}; - (void)opt_codec_ctx; - (void)td; - (void)constraints; - (void)ptr; - (void)size; - - if(!*sptr) { - *sptr = MALLOC(sizeof(NULL_t)); - if(*sptr) { - *(NULL_t *)*sptr = 0; - } else { - ASN__DECODE_FAILED; - } - } - - return rv; -} - -asn_enc_rval_t -NULL_encode_oer(const asn_TYPE_descriptor_t *td, - const asn_oer_constraints_t *constraints, const void *sptr, - asn_app_consume_bytes_f *cb, void *app_key) { - asn_enc_rval_t er = {0,0,0}; - - (void)td; - (void)sptr; - (void)constraints; - (void)cb; - (void)app_key; - - er.encoded = 0; /* Encoding in 0 bytes. */ - - ASN__ENCODED_OK(er); -} +/* + * Copyright (c) 2017 Lev Walkin . + * All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include + +asn_dec_rval_t +NULL_decode_oer(const asn_codec_ctx_t *opt_codec_ctx, + const asn_TYPE_descriptor_t *td, + const asn_oer_constraints_t *constraints, void **sptr, + const void *ptr, size_t size) { + asn_dec_rval_t rv = {RC_OK, 0}; + (void)opt_codec_ctx; + (void)td; + (void)constraints; + (void)ptr; + (void)size; + + if(!*sptr) { + *sptr = MALLOC(sizeof(NULL_t)); + if(*sptr) { + *(NULL_t *)*sptr = 0; + } else { + ASN__DECODE_FAILED; + } + } + + return rv; +} + +asn_enc_rval_t +NULL_encode_oer(const asn_TYPE_descriptor_t *td, + const asn_oer_constraints_t *constraints, const void *sptr, + asn_app_consume_bytes_f *cb, void *app_key) { + asn_enc_rval_t er = {0,0,0}; + + (void)td; + (void)sptr; + (void)constraints; + (void)cb; + (void)app_key; + + er.encoded = 0; /* Encoding in 0 bytes. */ + + ASN__ENCODED_OK(er); +} diff --git a/certgen/asncodec/NULL_print.c b/certgen/asncodec/NULL_print.c index 52fcc0e274636b305cbcbabaacf052b21160d720..5c8bbe0281ce011db6b1f81183dd1f3135b72806 100644 --- a/certgen/asncodec/NULL_print.c +++ b/certgen/asncodec/NULL_print.c @@ -1,20 +1,20 @@ -/* - * Copyright (c) 2017 Lev Walkin . - * All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include - -int -NULL_print(const asn_TYPE_descriptor_t *td, const void *sptr, int ilevel, - asn_app_consume_bytes_f *cb, void *app_key) { - (void)td; /* Unused argument */ - (void)ilevel; /* Unused argument */ - - if(sptr) { - return (cb("", 9, app_key) < 0) ? -1 : 0; - } else { - return (cb("", 8, app_key) < 0) ? -1 : 0; - } -} +/* + * Copyright (c) 2017 Lev Walkin . + * All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include + +int +NULL_print(const asn_TYPE_descriptor_t *td, const void *sptr, int ilevel, + asn_app_consume_bytes_f *cb, void *app_key) { + (void)td; /* Unused argument */ + (void)ilevel; /* Unused argument */ + + if(sptr) { + return (cb("", 9, app_key) < 0) ? -1 : 0; + } else { + return (cb("", 8, app_key) < 0) ? -1 : 0; + } +} diff --git a/certgen/asncodec/NULL_xer.c b/certgen/asncodec/NULL_xer.c index 5a6e4b9436915de88f224be4200e3d2a29ce1575..d2f13a0637855bcb00f75c9aee19c7a27971dc0b 100644 --- a/certgen/asncodec/NULL_xer.c +++ b/certgen/asncodec/NULL_xer.c @@ -1,52 +1,52 @@ -/* - * Copyright (c) 2017 Lev Walkin . - * All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include -#include - -asn_enc_rval_t -NULL_encode_xer(const asn_TYPE_descriptor_t *td, const void *sptr, int ilevel, - enum xer_encoder_flags_e flags, asn_app_consume_bytes_f *cb, - void *app_key) { - asn_enc_rval_t er = {0,0,0}; - - (void)td; - (void)sptr; - (void)ilevel; - (void)flags; - (void)cb; - (void)app_key; - - /* XMLNullValue is empty */ - er.encoded = 0; - ASN__ENCODED_OK(er); -} - - -static enum xer_pbd_rval -NULL__xer_body_decode(const asn_TYPE_descriptor_t *td, void *sptr, - const void *chunk_buf, size_t chunk_size) { - (void)td; - (void)sptr; - (void)chunk_buf; /* Going to be empty according to the rules below. */ - - /* - * There must be no content in self-terminating tag. - */ - if(chunk_size) - return XPBD_BROKEN_ENCODING; - else - return XPBD_BODY_CONSUMED; -} - -asn_dec_rval_t -NULL_decode_xer(const asn_codec_ctx_t *opt_codec_ctx, - const asn_TYPE_descriptor_t *td, void **sptr, - const char *opt_mname, const void *buf_ptr, size_t size) { - return xer_decode_primitive(opt_codec_ctx, td, - sptr, sizeof(NULL_t), opt_mname, buf_ptr, size, - NULL__xer_body_decode); -} +/* + * Copyright (c) 2017 Lev Walkin . + * All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include +#include + +asn_enc_rval_t +NULL_encode_xer(const asn_TYPE_descriptor_t *td, const void *sptr, int ilevel, + enum xer_encoder_flags_e flags, asn_app_consume_bytes_f *cb, + void *app_key) { + asn_enc_rval_t er = {0,0,0}; + + (void)td; + (void)sptr; + (void)ilevel; + (void)flags; + (void)cb; + (void)app_key; + + /* XMLNullValue is empty */ + er.encoded = 0; + ASN__ENCODED_OK(er); +} + + +static enum xer_pbd_rval +NULL__xer_body_decode(const asn_TYPE_descriptor_t *td, void *sptr, + const void *chunk_buf, size_t chunk_size) { + (void)td; + (void)sptr; + (void)chunk_buf; /* Going to be empty according to the rules below. */ + + /* + * There must be no content in self-terminating tag. + */ + if(chunk_size) + return XPBD_BROKEN_ENCODING; + else + return XPBD_BODY_CONSUMED; +} + +asn_dec_rval_t +NULL_decode_xer(const asn_codec_ctx_t *opt_codec_ctx, + const asn_TYPE_descriptor_t *td, void **sptr, + const char *opt_mname, const void *buf_ptr, size_t size) { + return xer_decode_primitive(opt_codec_ctx, td, + sptr, sizeof(NULL_t), opt_mname, buf_ptr, size, + NULL__xer_body_decode); +} diff --git a/certgen/asncodec/NativeEnumerated.c b/certgen/asncodec/NativeEnumerated.c index aee450c17f3c884710bd00ebaace08d760924dc6..58519fd172e4662ee3db3a190bd6fb900723fc07 100644 --- a/certgen/asncodec/NativeEnumerated.c +++ b/certgen/asncodec/NativeEnumerated.c @@ -1,108 +1,108 @@ -/*- - * Copyright (c) 2004, 2007 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -/* - * Read the NativeInteger.h for the explanation wrt. differences between - * INTEGER and NativeInteger. - * Basically, both are decoders and encoders of ASN.1 INTEGER type, but this - * implementation deals with the standard (machine-specific) representation - * of them instead of using the platform-independent buffer. - */ -#include -#include - -/* - * NativeEnumerated basic type description. - */ -static const ber_tlv_tag_t asn_DEF_NativeEnumerated_tags[] = { - (ASN_TAG_CLASS_UNIVERSAL | (10 << 2)) -}; -asn_TYPE_operation_t asn_OP_NativeEnumerated = { - NativeInteger_free, -#if !defined(ASN_DISABLE_PRINT_SUPPORT) - NativeInteger_print, -#else - 0, -#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ - NativeInteger_compare, -#if !defined(ASN_DISABLE_BER_SUPPORT) - NativeInteger_decode_ber, - NativeInteger_encode_der, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ -#if !defined(ASN_DISABLE_XER_SUPPORT) - NativeInteger_decode_xer, - NativeEnumerated_encode_xer, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ -#if !defined(ASN_DISABLE_JER_SUPPORT) - NativeEnumerated_encode_jer, -#else - 0, -#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ -#if !defined(ASN_DISABLE_OER_SUPPORT) - NativeEnumerated_decode_oer, - NativeEnumerated_encode_oer, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ -#if !defined(ASN_DISABLE_UPER_SUPPORT) - NativeEnumerated_decode_uper, - NativeEnumerated_encode_uper, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ -#if !defined(ASN_DISABLE_APER_SUPPORT) - NativeEnumerated_decode_aper, - NativeEnumerated_encode_aper, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ -#if !defined(ASN_DISABLE_RFILL_SUPPORT) - NativeEnumerated_random_fill, -#else - 0, -#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ - 0 /* Use generic outmost tag fetcher */ -}; -asn_TYPE_descriptor_t asn_DEF_NativeEnumerated = { - "ENUMERATED", /* The ASN.1 type is still ENUMERATED */ - "ENUMERATED", - &asn_OP_NativeEnumerated, - asn_DEF_NativeEnumerated_tags, - sizeof(asn_DEF_NativeEnumerated_tags) / sizeof(asn_DEF_NativeEnumerated_tags[0]), - asn_DEF_NativeEnumerated_tags, /* Same as above */ - sizeof(asn_DEF_NativeEnumerated_tags) / sizeof(asn_DEF_NativeEnumerated_tags[0]), - { -#if !defined(ASN_DISABLE_OER_SUPPORT) - 0, -#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ -#if !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) - 0, -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) */ - asn_generic_no_constraint - }, - 0, 0, /* No members */ - 0 /* No specifics */ -}; - -#if !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) -int -NativeEnumerated__compar_value2enum(const void *ap, const void *bp) { - const asn_INTEGER_enum_map_t *a = ap; - const asn_INTEGER_enum_map_t *b = bp; - if(a->nat_value == b->nat_value) - return 0; - if(a->nat_value < b->nat_value) - return -1; - return 1; -} -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) */ +/*- + * Copyright (c) 2004, 2007 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +/* + * Read the NativeInteger.h for the explanation wrt. differences between + * INTEGER and NativeInteger. + * Basically, both are decoders and encoders of ASN.1 INTEGER type, but this + * implementation deals with the standard (machine-specific) representation + * of them instead of using the platform-independent buffer. + */ +#include +#include + +/* + * NativeEnumerated basic type description. + */ +static const ber_tlv_tag_t asn_DEF_NativeEnumerated_tags[] = { + (ASN_TAG_CLASS_UNIVERSAL | (10 << 2)) +}; +asn_TYPE_operation_t asn_OP_NativeEnumerated = { + NativeInteger_free, +#if !defined(ASN_DISABLE_PRINT_SUPPORT) + NativeInteger_print, +#else + 0, +#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ + NativeInteger_compare, +#if !defined(ASN_DISABLE_BER_SUPPORT) + NativeInteger_decode_ber, + NativeInteger_encode_der, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ +#if !defined(ASN_DISABLE_XER_SUPPORT) + NativeInteger_decode_xer, + NativeEnumerated_encode_xer, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ +#if !defined(ASN_DISABLE_JER_SUPPORT) + NativeEnumerated_encode_jer, +#else + 0, +#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ +#if !defined(ASN_DISABLE_OER_SUPPORT) + NativeEnumerated_decode_oer, + NativeEnumerated_encode_oer, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ +#if !defined(ASN_DISABLE_UPER_SUPPORT) + NativeEnumerated_decode_uper, + NativeEnumerated_encode_uper, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ +#if !defined(ASN_DISABLE_APER_SUPPORT) + NativeEnumerated_decode_aper, + NativeEnumerated_encode_aper, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ +#if !defined(ASN_DISABLE_RFILL_SUPPORT) + NativeEnumerated_random_fill, +#else + 0, +#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ + 0 /* Use generic outmost tag fetcher */ +}; +asn_TYPE_descriptor_t asn_DEF_NativeEnumerated = { + "ENUMERATED", /* The ASN.1 type is still ENUMERATED */ + "ENUMERATED", + &asn_OP_NativeEnumerated, + asn_DEF_NativeEnumerated_tags, + sizeof(asn_DEF_NativeEnumerated_tags) / sizeof(asn_DEF_NativeEnumerated_tags[0]), + asn_DEF_NativeEnumerated_tags, /* Same as above */ + sizeof(asn_DEF_NativeEnumerated_tags) / sizeof(asn_DEF_NativeEnumerated_tags[0]), + { +#if !defined(ASN_DISABLE_OER_SUPPORT) + 0, +#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ +#if !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) + 0, +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) */ + asn_generic_no_constraint + }, + 0, 0, /* No members */ + 0 /* No specifics */ +}; + +#if !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) +int +NativeEnumerated__compar_value2enum(const void *ap, const void *bp) { + const asn_INTEGER_enum_map_t *a = ap; + const asn_INTEGER_enum_map_t *b = bp; + if(a->nat_value == b->nat_value) + return 0; + if(a->nat_value < b->nat_value) + return -1; + return 1; +} +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) */ diff --git a/certgen/asncodec/NativeEnumerated.h b/certgen/asncodec/NativeEnumerated.h index 0c711e3fe4fe6efe7b46f9db4255326f80753dd4..fb0c108516bb5f8feb99b2263da11e4a4dca1f1a 100644 --- a/certgen/asncodec/NativeEnumerated.h +++ b/certgen/asncodec/NativeEnumerated.h @@ -1,76 +1,76 @@ -/* - * Copyright (c) 2004-2017 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -/* - * This type differs from the standard ENUMERATED in that it is modelled using - * the fixed machine type (long, int, short), so it can hold only values of - * limited length. There is no type (i.e., NativeEnumerated_t, any integer type - * will do). - * This type may be used when integer range is limited by subtype constraints. - */ -#ifndef _NativeEnumerated_H_ -#define _NativeEnumerated_H_ - -#include - -#ifdef __cplusplus -extern "C" { -#endif - -extern asn_TYPE_descriptor_t asn_DEF_NativeEnumerated; -extern asn_TYPE_operation_t asn_OP_NativeEnumerated; - -#define NativeEnumerated_free NativeInteger_free - -#if !defined(ASN_DISABLE_PRINT_SUPPORT) -#define NativeEnumerated_print NativeInteger_print -#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ - -#define NativeEnumerated_compare NativeInteger_compare - -#define NativeEnumerated_constraint asn_generic_no_constraint - -#if !defined(ASN_DISABLE_BER_SUPPORT) -#define NativeEnumerated_decode_ber NativeInteger_decode_ber -#define NativeEnumerated_encode_der NativeInteger_encode_der -#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ - -#if !defined(ASN_DISABLE_XER_SUPPORT) -#define NativeEnumerated_decode_xer NativeInteger_decode_xer -xer_type_encoder_f NativeEnumerated_encode_xer; -#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ - -#if !defined(ASN_DISABLE_JER_SUPPORT) -jer_type_encoder_f NativeEnumerated_encode_jer; -#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ - -#if !defined(ASN_DISABLE_OER_SUPPORT) -oer_type_decoder_f NativeEnumerated_decode_oer; -oer_type_encoder_f NativeEnumerated_encode_oer; -#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ - -#if !defined(ASN_DISABLE_UPER_SUPPORT) -per_type_decoder_f NativeEnumerated_decode_uper; -per_type_encoder_f NativeEnumerated_encode_uper; -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ -#if !defined(ASN_DISABLE_APER_SUPPORT) -per_type_decoder_f NativeEnumerated_decode_aper; -per_type_encoder_f NativeEnumerated_encode_aper; -#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ - -#if !defined(ASN_DISABLE_RFILL_SUPPORT) -#define NativeEnumerated_random_fill NativeInteger_random_fill -#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ - -#if !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) -int NativeEnumerated__compar_value2enum( - const void *ap, - const void *bp); -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) */ - -#ifdef __cplusplus -} -#endif - -#endif /* _NativeEnumerated_H_ */ +/* + * Copyright (c) 2004-2017 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +/* + * This type differs from the standard ENUMERATED in that it is modelled using + * the fixed machine type (long, int, short), so it can hold only values of + * limited length. There is no type (i.e., NativeEnumerated_t, any integer type + * will do). + * This type may be used when integer range is limited by subtype constraints. + */ +#ifndef _NativeEnumerated_H_ +#define _NativeEnumerated_H_ + +#include + +#ifdef __cplusplus +extern "C" { +#endif + +extern asn_TYPE_descriptor_t asn_DEF_NativeEnumerated; +extern asn_TYPE_operation_t asn_OP_NativeEnumerated; + +#define NativeEnumerated_free NativeInteger_free + +#if !defined(ASN_DISABLE_PRINT_SUPPORT) +#define NativeEnumerated_print NativeInteger_print +#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ + +#define NativeEnumerated_compare NativeInteger_compare + +#define NativeEnumerated_constraint asn_generic_no_constraint + +#if !defined(ASN_DISABLE_BER_SUPPORT) +#define NativeEnumerated_decode_ber NativeInteger_decode_ber +#define NativeEnumerated_encode_der NativeInteger_encode_der +#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ + +#if !defined(ASN_DISABLE_XER_SUPPORT) +#define NativeEnumerated_decode_xer NativeInteger_decode_xer +xer_type_encoder_f NativeEnumerated_encode_xer; +#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ + +#if !defined(ASN_DISABLE_JER_SUPPORT) +jer_type_encoder_f NativeEnumerated_encode_jer; +#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ + +#if !defined(ASN_DISABLE_OER_SUPPORT) +oer_type_decoder_f NativeEnumerated_decode_oer; +oer_type_encoder_f NativeEnumerated_encode_oer; +#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ + +#if !defined(ASN_DISABLE_UPER_SUPPORT) +per_type_decoder_f NativeEnumerated_decode_uper; +per_type_encoder_f NativeEnumerated_encode_uper; +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ +#if !defined(ASN_DISABLE_APER_SUPPORT) +per_type_decoder_f NativeEnumerated_decode_aper; +per_type_encoder_f NativeEnumerated_encode_aper; +#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ + +#if !defined(ASN_DISABLE_RFILL_SUPPORT) +#define NativeEnumerated_random_fill NativeInteger_random_fill +#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ + +#if !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) +int NativeEnumerated__compar_value2enum( + const void *ap, + const void *bp); +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) */ + +#ifdef __cplusplus +} +#endif + +#endif /* _NativeEnumerated_H_ */ diff --git a/certgen/asncodec/NativeEnumerated_oer.c b/certgen/asncodec/NativeEnumerated_oer.c index 52dbcb86087e8e2c6abcb6d6d8839bb120ca3b27..176a3ce4bd3bd440ead7d00b020940c6724f84bd 100644 --- a/certgen/asncodec/NativeEnumerated_oer.c +++ b/certgen/asncodec/NativeEnumerated_oer.c @@ -1,144 +1,144 @@ -/* - * Copyright (c) 2017 Lev Walkin . - * All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include - -static long -asn__nativeenumerated_convert(const uint8_t *b, const uint8_t *end) { - unsigned long value; - - /* Perform the sign initialization */ - /* Actually value = -(*b >> 7); gains nothing, yet unreadable! */ - if((*b >> 7)) { - value = (unsigned long)(-1); - } else { - value = 0; - } - - /* Conversion engine */ - for(; b < end; b++) { - value = (value << 8) | *b; - } - - return value; -} - -asn_dec_rval_t -NativeEnumerated_decode_oer(const asn_codec_ctx_t *opt_codec_ctx, - const asn_TYPE_descriptor_t *td, - const asn_oer_constraints_t *constraints, - void **nint_ptr, const void *ptr, size_t size) { - asn_dec_rval_t rval = {RC_OK, 0}; - long *native = (long *)*nint_ptr; - const uint8_t *b = ptr; - - (void)opt_codec_ctx; - (void)constraints; - - if(size < 1) { - ASN__DECODE_STARVED; - } - - if((*b & 0x80) == 0) { - /* - * X.696 (08/2015) #11.2 Short form for Enumerated. - */ - if(!native) { - native = (long *)(*nint_ptr = CALLOC(1, sizeof(*native))); - if(!native) ASN__DECODE_FAILED; - } - - *native = *b; - rval.consumed = 1; - } else { - /* - * X.696 (08/2015) #11.4 Long form for Enumerated. - */ - size_t length = *b & 0x7f; - const uint8_t *bend; - long value; - - if(length < 1 || length > sizeof(*native)) { - ASN__DECODE_FAILED; - } - if((1 + length) > size) { - ASN__DECODE_STARVED; - } - b++; - bend = b + length; - - value = asn__nativeenumerated_convert(b, bend); - if(value < 0) { - const asn_INTEGER_specifics_t *specs = - (const asn_INTEGER_specifics_t *)td->specifics; - if(specs && specs->field_unsigned) { - ASN__DECODE_FAILED; - } - } - - if(!native) { - native = (long *)(*nint_ptr = CALLOC(1, sizeof(*native))); - if(!native) ASN__DECODE_FAILED; - } - - *native = value; - - rval.consumed = (1 + length); - } - - return rval; -} - -/* - * Encode as Canonical OER. - */ -asn_enc_rval_t -NativeEnumerated_encode_oer(const asn_TYPE_descriptor_t *td, - const asn_oer_constraints_t *constraints, - const void *sptr, asn_app_consume_bytes_f *cb, - void *app_key) { - asn_enc_rval_t er = {0,0,0}; - long native; - - (void)constraints; - - if(!sptr) ASN__ENCODE_FAILED; - - native = *(const long *)sptr; - - if(native >= 0 && native <= 127) { - /* #11.2 Short form */ - uint8_t b = native; - er.encoded = 1; - if(cb(&b, er.encoded, app_key) < 0) { - ASN__ENCODE_FAILED; - } - ASN__ENCODED_OK(er); - } else { - /* #11.2 Long form */ - uint8_t buf[1 + sizeof(native)]; - uint8_t *b = &buf[sizeof(native)]; /* Last addressable */ - long final_pattern = -1 * (native < 0); - - for(;;) { - *b-- = native; - native >>= 8; - if(native == final_pattern) { - if(final_pattern) { - if((b[1] & 0x80)) break; - } else { - if(!(b[1] & 0x80)) break; - } - } - } - *b = 0x80 | (&buf[sizeof(native)] - b); - er.encoded = 1 + (&buf[sizeof(native)] - b); - if(cb(b, er.encoded, app_key) < 0) { - ASN__ENCODE_FAILED; - } - ASN__ENCODED_OK(er); - } -} +/* + * Copyright (c) 2017 Lev Walkin . + * All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include + +static long +asn__nativeenumerated_convert(const uint8_t *b, const uint8_t *end) { + unsigned long value; + + /* Perform the sign initialization */ + /* Actually value = -(*b >> 7); gains nothing, yet unreadable! */ + if((*b >> 7)) { + value = (unsigned long)(-1); + } else { + value = 0; + } + + /* Conversion engine */ + for(; b < end; b++) { + value = (value << 8) | *b; + } + + return value; +} + +asn_dec_rval_t +NativeEnumerated_decode_oer(const asn_codec_ctx_t *opt_codec_ctx, + const asn_TYPE_descriptor_t *td, + const asn_oer_constraints_t *constraints, + void **nint_ptr, const void *ptr, size_t size) { + asn_dec_rval_t rval = {RC_OK, 0}; + long *native = (long *)*nint_ptr; + const uint8_t *b = ptr; + + (void)opt_codec_ctx; + (void)constraints; + + if(size < 1) { + ASN__DECODE_STARVED; + } + + if((*b & 0x80) == 0) { + /* + * X.696 (08/2015) #11.2 Short form for Enumerated. + */ + if(!native) { + native = (long *)(*nint_ptr = CALLOC(1, sizeof(*native))); + if(!native) ASN__DECODE_FAILED; + } + + *native = *b; + rval.consumed = 1; + } else { + /* + * X.696 (08/2015) #11.4 Long form for Enumerated. + */ + size_t length = *b & 0x7f; + const uint8_t *bend; + long value; + + if(length < 1 || length > sizeof(*native)) { + ASN__DECODE_FAILED; + } + if((1 + length) > size) { + ASN__DECODE_STARVED; + } + b++; + bend = b + length; + + value = asn__nativeenumerated_convert(b, bend); + if(value < 0) { + const asn_INTEGER_specifics_t *specs = + (const asn_INTEGER_specifics_t *)td->specifics; + if(specs && specs->field_unsigned) { + ASN__DECODE_FAILED; + } + } + + if(!native) { + native = (long *)(*nint_ptr = CALLOC(1, sizeof(*native))); + if(!native) ASN__DECODE_FAILED; + } + + *native = value; + + rval.consumed = (1 + length); + } + + return rval; +} + +/* + * Encode as Canonical OER. + */ +asn_enc_rval_t +NativeEnumerated_encode_oer(const asn_TYPE_descriptor_t *td, + const asn_oer_constraints_t *constraints, + const void *sptr, asn_app_consume_bytes_f *cb, + void *app_key) { + asn_enc_rval_t er = {0,0,0}; + long native; + + (void)constraints; + + if(!sptr) ASN__ENCODE_FAILED; + + native = *(const long *)sptr; + + if(native >= 0 && native <= 127) { + /* #11.2 Short form */ + uint8_t b = native; + er.encoded = 1; + if(cb(&b, er.encoded, app_key) < 0) { + ASN__ENCODE_FAILED; + } + ASN__ENCODED_OK(er); + } else { + /* #11.2 Long form */ + uint8_t buf[1 + sizeof(native)]; + uint8_t *b = &buf[sizeof(native)]; /* Last addressable */ + long final_pattern = -1 * (native < 0); + + for(;;) { + *b-- = native; + native >>= 8; + if(native == final_pattern) { + if(final_pattern) { + if((b[1] & 0x80)) break; + } else { + if(!(b[1] & 0x80)) break; + } + } + } + *b = 0x80 | (&buf[sizeof(native)] - b); + er.encoded = 1 + (&buf[sizeof(native)] - b); + if(cb(b, er.encoded, app_key) < 0) { + ASN__ENCODE_FAILED; + } + ASN__ENCODED_OK(er); + } +} diff --git a/certgen/asncodec/NativeEnumerated_xer.c b/certgen/asncodec/NativeEnumerated_xer.c index e8d6d0debffc0237d50e92ff732dab80dd7e7b71..de1c1959a724aebf06fc26037b9f4ce2010cb2cf 100644 --- a/certgen/asncodec/NativeEnumerated_xer.c +++ b/certgen/asncodec/NativeEnumerated_xer.c @@ -1,36 +1,36 @@ -/* - * Copyright (c) 2017 Lev Walkin . - * All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include - -asn_enc_rval_t -NativeEnumerated_encode_xer(const asn_TYPE_descriptor_t *td, const void *sptr, - int ilevel, enum xer_encoder_flags_e flags, - asn_app_consume_bytes_f *cb, void *app_key) { - const asn_INTEGER_specifics_t *specs = - (const asn_INTEGER_specifics_t *)td->specifics; - asn_enc_rval_t er = {0,0,0}; - const long *native = (const long *)sptr; - const asn_INTEGER_enum_map_t *el; - - (void)ilevel; - (void)flags; - - if(!native) ASN__ENCODE_FAILED; - - el = INTEGER_map_value2enum(specs, *native); - if(el) { - er.encoded = - asn__format_to_callback(cb, app_key, "<%s/>", el->enum_name); - if(er.encoded < 0) ASN__ENCODE_FAILED; - ASN__ENCODED_OK(er); - } else { - ASN_DEBUG( - "ASN.1 forbids dealing with " - "unknown value of ENUMERATED type"); - ASN__ENCODE_FAILED; - } -} +/* + * Copyright (c) 2017 Lev Walkin . + * All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include + +asn_enc_rval_t +NativeEnumerated_encode_xer(const asn_TYPE_descriptor_t *td, const void *sptr, + int ilevel, enum xer_encoder_flags_e flags, + asn_app_consume_bytes_f *cb, void *app_key) { + const asn_INTEGER_specifics_t *specs = + (const asn_INTEGER_specifics_t *)td->specifics; + asn_enc_rval_t er = {0,0,0}; + const long *native = (const long *)sptr; + const asn_INTEGER_enum_map_t *el; + + (void)ilevel; + (void)flags; + + if(!native) ASN__ENCODE_FAILED; + + el = INTEGER_map_value2enum(specs, *native); + if(el) { + er.encoded = + asn__format_to_callback(cb, app_key, "<%s/>", el->enum_name); + if(er.encoded < 0) ASN__ENCODE_FAILED; + ASN__ENCODED_OK(er); + } else { + ASN_DEBUG( + "ASN.1 forbids dealing with " + "unknown value of ENUMERATED type"); + ASN__ENCODE_FAILED; + } +} diff --git a/certgen/asncodec/NativeInteger.c b/certgen/asncodec/NativeInteger.c index f0309b0d2d6f18dfd718d1b65c2213432f996eb1..e6971b88d39db82ebed78604cac0fc38decfb28f 100644 --- a/certgen/asncodec/NativeInteger.c +++ b/certgen/asncodec/NativeInteger.c @@ -1,152 +1,152 @@ -/*- - * Copyright (c) 2004, 2005, 2006 Lev Walkin . - * All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -/* - * Read the NativeInteger.h for the explanation wrt. differences between - * INTEGER and NativeInteger. - * Basically, both are decoders and encoders of ASN.1 INTEGER type, but this - * implementation deals with the standard (machine-specific) representation - * of them instead of using the platform-independent buffer. - */ -#include -#include - -/* - * NativeInteger basic type description. - */ -static const ber_tlv_tag_t asn_DEF_NativeInteger_tags[] = { - (ASN_TAG_CLASS_UNIVERSAL | (2 << 2)) -}; -asn_TYPE_operation_t asn_OP_NativeInteger = { - NativeInteger_free, -#if !defined(ASN_DISABLE_PRINT_SUPPORT) - NativeInteger_print, -#else - 0, -#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ - NativeInteger_compare, -#if !defined(ASN_DISABLE_BER_SUPPORT) - NativeInteger_decode_ber, - NativeInteger_encode_der, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ -#if !defined(ASN_DISABLE_XER_SUPPORT) - NativeInteger_decode_xer, - NativeInteger_encode_xer, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ -#if !defined(ASN_DISABLE_JER_SUPPORT) - NativeInteger_encode_jer, -#else - 0, -#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ -#if !defined(ASN_DISABLE_OER_SUPPORT) - NativeInteger_decode_oer, /* OER decoder */ - NativeInteger_encode_oer, /* Canonical OER encoder */ -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ -#if !defined(ASN_DISABLE_UPER_SUPPORT) - NativeInteger_decode_uper, /* Unaligned PER decoder */ - NativeInteger_encode_uper, /* Unaligned PER encoder */ -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ -#if !defined(ASN_DISABLE_APER_SUPPORT) - NativeInteger_decode_aper, /* Aligned PER decoder */ - NativeInteger_encode_aper, /* Aligned PER encoder */ -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ -#if !defined(ASN_DISABLE_RFILL_SUPPORT) - NativeInteger_random_fill, -#else - 0, -#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ - 0 /* Use generic outmost tag fetcher */ -}; -asn_TYPE_descriptor_t asn_DEF_NativeInteger = { - "INTEGER", /* The ASN.1 type is still INTEGER */ - "INTEGER", - &asn_OP_NativeInteger, - asn_DEF_NativeInteger_tags, - sizeof(asn_DEF_NativeInteger_tags) / sizeof(asn_DEF_NativeInteger_tags[0]), - asn_DEF_NativeInteger_tags, /* Same as above */ - sizeof(asn_DEF_NativeInteger_tags) / sizeof(asn_DEF_NativeInteger_tags[0]), - { -#if !defined(ASN_DISABLE_OER_SUPPORT) - 0, -#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ -#if !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) - 0, -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) */ - asn_generic_no_constraint - }, - 0, 0, /* No members */ - 0 /* No specifics */ -}; - -void -NativeInteger_free(const asn_TYPE_descriptor_t *td, void *ptr, - enum asn_struct_free_method method) { - if(!td || !ptr) - return; - - ASN_DEBUG("Freeing %s as INTEGER (%d, %p, Native)", - td->name, method, ptr); - - switch(method) { - case ASFM_FREE_EVERYTHING: - FREEMEM(ptr); - break; - case ASFM_FREE_UNDERLYING: - break; - case ASFM_FREE_UNDERLYING_AND_RESET: - memset(ptr, 0, sizeof(long)); - break; - } -} - -int -NativeInteger_compare(const asn_TYPE_descriptor_t *td, const void *aptr, const void *bptr) { - (void)td; - - if(aptr && bptr) { - const asn_INTEGER_specifics_t *specs = - (const asn_INTEGER_specifics_t *)td->specifics; - if(specs && specs->field_unsigned) { - const unsigned long *a = aptr; - const unsigned long *b = bptr; - if(*a < *b) { - return -1; - } else if(*a > *b) { - return 1; - } else { - return 0; - } - } else { - const long *a = aptr; - const long *b = bptr; - if(*a < *b) { - return -1; - } else if(*a > *b) { - return 1; - } else { - return 0; - } - } - } else if(!aptr) { - return -1; - } else { - return 1; - } -} +/*- + * Copyright (c) 2004, 2005, 2006 Lev Walkin . + * All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +/* + * Read the NativeInteger.h for the explanation wrt. differences between + * INTEGER and NativeInteger. + * Basically, both are decoders and encoders of ASN.1 INTEGER type, but this + * implementation deals with the standard (machine-specific) representation + * of them instead of using the platform-independent buffer. + */ +#include +#include + +/* + * NativeInteger basic type description. + */ +static const ber_tlv_tag_t asn_DEF_NativeInteger_tags[] = { + (ASN_TAG_CLASS_UNIVERSAL | (2 << 2)) +}; +asn_TYPE_operation_t asn_OP_NativeInteger = { + NativeInteger_free, +#if !defined(ASN_DISABLE_PRINT_SUPPORT) + NativeInteger_print, +#else + 0, +#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ + NativeInteger_compare, +#if !defined(ASN_DISABLE_BER_SUPPORT) + NativeInteger_decode_ber, + NativeInteger_encode_der, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ +#if !defined(ASN_DISABLE_XER_SUPPORT) + NativeInteger_decode_xer, + NativeInteger_encode_xer, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ +#if !defined(ASN_DISABLE_JER_SUPPORT) + NativeInteger_encode_jer, +#else + 0, +#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ +#if !defined(ASN_DISABLE_OER_SUPPORT) + NativeInteger_decode_oer, /* OER decoder */ + NativeInteger_encode_oer, /* Canonical OER encoder */ +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ +#if !defined(ASN_DISABLE_UPER_SUPPORT) + NativeInteger_decode_uper, /* Unaligned PER decoder */ + NativeInteger_encode_uper, /* Unaligned PER encoder */ +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ +#if !defined(ASN_DISABLE_APER_SUPPORT) + NativeInteger_decode_aper, /* Aligned PER decoder */ + NativeInteger_encode_aper, /* Aligned PER encoder */ +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ +#if !defined(ASN_DISABLE_RFILL_SUPPORT) + NativeInteger_random_fill, +#else + 0, +#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ + 0 /* Use generic outmost tag fetcher */ +}; +asn_TYPE_descriptor_t asn_DEF_NativeInteger = { + "INTEGER", /* The ASN.1 type is still INTEGER */ + "INTEGER", + &asn_OP_NativeInteger, + asn_DEF_NativeInteger_tags, + sizeof(asn_DEF_NativeInteger_tags) / sizeof(asn_DEF_NativeInteger_tags[0]), + asn_DEF_NativeInteger_tags, /* Same as above */ + sizeof(asn_DEF_NativeInteger_tags) / sizeof(asn_DEF_NativeInteger_tags[0]), + { +#if !defined(ASN_DISABLE_OER_SUPPORT) + 0, +#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ +#if !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) + 0, +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) */ + asn_generic_no_constraint + }, + 0, 0, /* No members */ + 0 /* No specifics */ +}; + +void +NativeInteger_free(const asn_TYPE_descriptor_t *td, void *ptr, + enum asn_struct_free_method method) { + if(!td || !ptr) + return; + + ASN_DEBUG("Freeing %s as INTEGER (%d, %p, Native)", + td->name, method, ptr); + + switch(method) { + case ASFM_FREE_EVERYTHING: + FREEMEM(ptr); + break; + case ASFM_FREE_UNDERLYING: + break; + case ASFM_FREE_UNDERLYING_AND_RESET: + memset(ptr, 0, sizeof(long)); + break; + } +} + +int +NativeInteger_compare(const asn_TYPE_descriptor_t *td, const void *aptr, const void *bptr) { + (void)td; + + if(aptr && bptr) { + const asn_INTEGER_specifics_t *specs = + (const asn_INTEGER_specifics_t *)td->specifics; + if(specs && specs->field_unsigned) { + const unsigned long *a = aptr; + const unsigned long *b = bptr; + if(*a < *b) { + return -1; + } else if(*a > *b) { + return 1; + } else { + return 0; + } + } else { + const long *a = aptr; + const long *b = bptr; + if(*a < *b) { + return -1; + } else if(*a > *b) { + return 1; + } else { + return 0; + } + } + } else if(!aptr) { + return -1; + } else { + return 1; + } +} diff --git a/certgen/asncodec/NativeInteger.h b/certgen/asncodec/NativeInteger.h index 3a47c11a0abb95df5ab41ec15af2dfb6268a7432..0ebee042856d505473c5dfab30ff9a7b4ea5bce5 100644 --- a/certgen/asncodec/NativeInteger.h +++ b/certgen/asncodec/NativeInteger.h @@ -1,71 +1,71 @@ -/*- - * Copyright (c) 2004-2017 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -/* - * This type differs from the standard INTEGER in that it is modelled using - * the fixed machine type (long, int, short), so it can hold only values of - * limited length. There is no type (i.e., NativeInteger_t, any integer type - * will do). - * This type may be used when integer range is limited by subtype constraints. - */ -#ifndef _NativeInteger_H_ -#define _NativeInteger_H_ - -#include -#include - -#ifdef __cplusplus -extern "C" { -#endif - -extern asn_TYPE_descriptor_t asn_DEF_NativeInteger; -extern asn_TYPE_operation_t asn_OP_NativeInteger; - -asn_struct_free_f NativeInteger_free; - -#if !defined(ASN_DISABLE_PRINT_SUPPORT) -asn_struct_print_f NativeInteger_print; -#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ - -asn_struct_compare_f NativeInteger_compare; - -#define NativeInteger_constraint asn_generic_no_constraint - -#if !defined(ASN_DISABLE_BER_SUPPORT) -ber_type_decoder_f NativeInteger_decode_ber; -der_type_encoder_f NativeInteger_encode_der; -#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ - -#if !defined(ASN_DISABLE_XER_SUPPORT) -xer_type_decoder_f NativeInteger_decode_xer; -xer_type_encoder_f NativeInteger_encode_xer; -#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ - -#if !defined(ASN_DISABLE_JER_SUPPORT) -jer_type_encoder_f NativeInteger_encode_jer; -#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ - -#if !defined(ASN_DISABLE_OER_SUPPORT) -oer_type_decoder_f NativeInteger_decode_oer; -oer_type_encoder_f NativeInteger_encode_oer; -#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ - -#if !defined(ASN_DISABLE_UPER_SUPPORT) -per_type_decoder_f NativeInteger_decode_uper; -per_type_encoder_f NativeInteger_encode_uper; -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ -#if !defined(ASN_DISABLE_APER_SUPPORT) -per_type_decoder_f NativeInteger_decode_aper; -per_type_encoder_f NativeInteger_encode_aper; -#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ - -#if !defined(ASN_DISABLE_RFILL_SUPPORT) -asn_random_fill_f NativeInteger_random_fill; -#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ - -#ifdef __cplusplus -} -#endif - -#endif /* _NativeInteger_H_ */ +/*- + * Copyright (c) 2004-2017 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +/* + * This type differs from the standard INTEGER in that it is modelled using + * the fixed machine type (long, int, short), so it can hold only values of + * limited length. There is no type (i.e., NativeInteger_t, any integer type + * will do). + * This type may be used when integer range is limited by subtype constraints. + */ +#ifndef _NativeInteger_H_ +#define _NativeInteger_H_ + +#include +#include + +#ifdef __cplusplus +extern "C" { +#endif + +extern asn_TYPE_descriptor_t asn_DEF_NativeInteger; +extern asn_TYPE_operation_t asn_OP_NativeInteger; + +asn_struct_free_f NativeInteger_free; + +#if !defined(ASN_DISABLE_PRINT_SUPPORT) +asn_struct_print_f NativeInteger_print; +#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ + +asn_struct_compare_f NativeInteger_compare; + +#define NativeInteger_constraint asn_generic_no_constraint + +#if !defined(ASN_DISABLE_BER_SUPPORT) +ber_type_decoder_f NativeInteger_decode_ber; +der_type_encoder_f NativeInteger_encode_der; +#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ + +#if !defined(ASN_DISABLE_XER_SUPPORT) +xer_type_decoder_f NativeInteger_decode_xer; +xer_type_encoder_f NativeInteger_encode_xer; +#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ + +#if !defined(ASN_DISABLE_JER_SUPPORT) +jer_type_encoder_f NativeInteger_encode_jer; +#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ + +#if !defined(ASN_DISABLE_OER_SUPPORT) +oer_type_decoder_f NativeInteger_decode_oer; +oer_type_encoder_f NativeInteger_encode_oer; +#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ + +#if !defined(ASN_DISABLE_UPER_SUPPORT) +per_type_decoder_f NativeInteger_decode_uper; +per_type_encoder_f NativeInteger_encode_uper; +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ +#if !defined(ASN_DISABLE_APER_SUPPORT) +per_type_decoder_f NativeInteger_decode_aper; +per_type_encoder_f NativeInteger_encode_aper; +#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ + +#if !defined(ASN_DISABLE_RFILL_SUPPORT) +asn_random_fill_f NativeInteger_random_fill; +#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ + +#ifdef __cplusplus +} +#endif + +#endif /* _NativeInteger_H_ */ diff --git a/certgen/asncodec/NativeInteger_oer.c b/certgen/asncodec/NativeInteger_oer.c index 4e900462c3eae84e55f52814d9330084f1f7dca9..538bc7a290791c429042abbd55150414b415421b 100644 --- a/certgen/asncodec/NativeInteger_oer.c +++ b/certgen/asncodec/NativeInteger_oer.c @@ -1,94 +1,94 @@ -/* - * Copyright (c) 2017 Lev Walkin . - * All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include - -asn_dec_rval_t -NativeInteger_decode_oer(const asn_codec_ctx_t *opt_codec_ctx, - const asn_TYPE_descriptor_t *td, - const asn_oer_constraints_t *constraints, - void **nint_ptr, const void *ptr, size_t size) { - const asn_INTEGER_specifics_t *specs = - (const asn_INTEGER_specifics_t *)td->specifics; - asn_dec_rval_t rval = {RC_OK, 0}; - long *native = (long *)*nint_ptr; - INTEGER_t tmpint; - INTEGER_t *tmpintptr = &tmpint; - - memset(&tmpint, 0, sizeof(tmpint)); - - if(!native) { - native = (long *)(*nint_ptr = CALLOC(1, sizeof(*native))); - if(!native) ASN__DECODE_FAILED; - } - - /* - * OPTIMIZATION: Encode directly rather than passing through INTEGER. - * Saves a memory allocation. - */ - rval = INTEGER_decode_oer(opt_codec_ctx, td, constraints, - (void **)&tmpintptr, ptr, size); - if(rval.code != RC_OK) { - ASN_STRUCT_FREE_CONTENTS_ONLY(asn_DEF_INTEGER, &tmpint); - return rval; - } - - if(specs && specs->field_unsigned) { - unsigned long ul; - int ok = asn_INTEGER2ulong(&tmpint, &ul) == 0; - ASN_STRUCT_FREE_CONTENTS_ONLY(asn_DEF_INTEGER, &tmpint); - if(ok) { - *native = ul; - } else { - rval.code = RC_FAIL; - return rval; - } - } else { - long l; - int ok = asn_INTEGER2long(&tmpint, &l) == 0; - ASN_STRUCT_FREE_CONTENTS_ONLY(asn_DEF_INTEGER, &tmpint); - if(ok) { - *native = l; - } else { - rval.code = RC_FAIL; - return rval; - } - } - - return rval; -} - -/* - * Encode as Canonical OER. - */ -asn_enc_rval_t -NativeInteger_encode_oer(const asn_TYPE_descriptor_t *td, - const asn_oer_constraints_t *constraints, - const void *sptr, asn_app_consume_bytes_f *cb, - void *app_key) { - const asn_INTEGER_specifics_t *specs = - (const asn_INTEGER_specifics_t *)td->specifics; - INTEGER_t tmpint; - long native; - - if(!sptr) ASN__ENCODE_FAILED; - - native = *(const long *)sptr; - memset(&tmpint, 0, sizeof(tmpint)); - - ASN_DEBUG("Encoding %s %ld as NativeInteger", td ? td->name : "", native); - - if((specs && specs->field_unsigned) ? asn_ulong2INTEGER(&tmpint, native) - : asn_long2INTEGER(&tmpint, native)) { - ASN_STRUCT_FREE_CONTENTS_ONLY(asn_DEF_INTEGER, &tmpint); - ASN__ENCODE_FAILED; - } else { - asn_enc_rval_t er = - INTEGER_encode_oer(td, constraints, &tmpint, cb, app_key); - ASN_STRUCT_FREE_CONTENTS_ONLY(asn_DEF_INTEGER, &tmpint); - return er; - } -} +/* + * Copyright (c) 2017 Lev Walkin . + * All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include + +asn_dec_rval_t +NativeInteger_decode_oer(const asn_codec_ctx_t *opt_codec_ctx, + const asn_TYPE_descriptor_t *td, + const asn_oer_constraints_t *constraints, + void **nint_ptr, const void *ptr, size_t size) { + const asn_INTEGER_specifics_t *specs = + (const asn_INTEGER_specifics_t *)td->specifics; + asn_dec_rval_t rval = {RC_OK, 0}; + long *native = (long *)*nint_ptr; + INTEGER_t tmpint; + INTEGER_t *tmpintptr = &tmpint; + + memset(&tmpint, 0, sizeof(tmpint)); + + if(!native) { + native = (long *)(*nint_ptr = CALLOC(1, sizeof(*native))); + if(!native) ASN__DECODE_FAILED; + } + + /* + * OPTIMIZATION: Encode directly rather than passing through INTEGER. + * Saves a memory allocation. + */ + rval = INTEGER_decode_oer(opt_codec_ctx, td, constraints, + (void **)&tmpintptr, ptr, size); + if(rval.code != RC_OK) { + ASN_STRUCT_FREE_CONTENTS_ONLY(asn_DEF_INTEGER, &tmpint); + return rval; + } + + if(specs && specs->field_unsigned) { + unsigned long ul; + int ok = asn_INTEGER2ulong(&tmpint, &ul) == 0; + ASN_STRUCT_FREE_CONTENTS_ONLY(asn_DEF_INTEGER, &tmpint); + if(ok) { + *native = ul; + } else { + rval.code = RC_FAIL; + return rval; + } + } else { + long l; + int ok = asn_INTEGER2long(&tmpint, &l) == 0; + ASN_STRUCT_FREE_CONTENTS_ONLY(asn_DEF_INTEGER, &tmpint); + if(ok) { + *native = l; + } else { + rval.code = RC_FAIL; + return rval; + } + } + + return rval; +} + +/* + * Encode as Canonical OER. + */ +asn_enc_rval_t +NativeInteger_encode_oer(const asn_TYPE_descriptor_t *td, + const asn_oer_constraints_t *constraints, + const void *sptr, asn_app_consume_bytes_f *cb, + void *app_key) { + const asn_INTEGER_specifics_t *specs = + (const asn_INTEGER_specifics_t *)td->specifics; + INTEGER_t tmpint; + long native; + + if(!sptr) ASN__ENCODE_FAILED; + + native = *(const long *)sptr; + memset(&tmpint, 0, sizeof(tmpint)); + + ASN_DEBUG("Encoding %s %ld as NativeInteger", td ? td->name : "", native); + + if((specs && specs->field_unsigned) ? asn_ulong2INTEGER(&tmpint, native) + : asn_long2INTEGER(&tmpint, native)) { + ASN_STRUCT_FREE_CONTENTS_ONLY(asn_DEF_INTEGER, &tmpint); + ASN__ENCODE_FAILED; + } else { + asn_enc_rval_t er = + INTEGER_encode_oer(td, constraints, &tmpint, cb, app_key); + ASN_STRUCT_FREE_CONTENTS_ONLY(asn_DEF_INTEGER, &tmpint); + return er; + } +} diff --git a/certgen/asncodec/NativeInteger_print.c b/certgen/asncodec/NativeInteger_print.c index 0602e0d20970c8c28b73b0f9285dc8b2029dcc2e..6145657b64ac0870600459d4929e58112f53f612 100644 --- a/certgen/asncodec/NativeInteger_print.c +++ b/certgen/asncodec/NativeInteger_print.c @@ -1,43 +1,43 @@ -/* - * Copyright (c) 2017 Lev Walkin . - * All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include - -/* - * INTEGER specific human-readable output. - */ -int -NativeInteger_print(const asn_TYPE_descriptor_t *td, const void *sptr, - int ilevel, asn_app_consume_bytes_f *cb, void *app_key) { - const asn_INTEGER_specifics_t *specs = - (const asn_INTEGER_specifics_t *)td->specifics; - const long *native = (const long *)sptr; - char scratch[32]; /* Enough for 64-bit int */ - int ret; - - (void)td; /* Unused argument */ - (void)ilevel; /* Unused argument */ - - if(native) { - long value = *native; - ret = snprintf(scratch, sizeof(scratch), - (specs && specs->field_unsigned) ? "%lu" : "%ld", value); - assert(ret > 0 && (size_t)ret < sizeof(scratch)); - if(cb(scratch, ret, app_key) < 0) return -1; - if(specs && (value >= 0 || !specs->field_unsigned)) { - const asn_INTEGER_enum_map_t *el = - INTEGER_map_value2enum(specs, value); - if(el) { - if(cb(" (", 2, app_key) < 0) return -1; - if(cb(el->enum_name, el->enum_len, app_key) < 0) return -1; - if(cb(")", 1, app_key) < 0) return -1; - } - } - return 0; - } else { - return (cb("", 8, app_key) < 0) ? -1 : 0; - } -} +/* + * Copyright (c) 2017 Lev Walkin . + * All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include + +/* + * INTEGER specific human-readable output. + */ +int +NativeInteger_print(const asn_TYPE_descriptor_t *td, const void *sptr, + int ilevel, asn_app_consume_bytes_f *cb, void *app_key) { + const asn_INTEGER_specifics_t *specs = + (const asn_INTEGER_specifics_t *)td->specifics; + const long *native = (const long *)sptr; + char scratch[32]; /* Enough for 64-bit int */ + int ret; + + (void)td; /* Unused argument */ + (void)ilevel; /* Unused argument */ + + if(native) { + long value = *native; + ret = snprintf(scratch, sizeof(scratch), + (specs && specs->field_unsigned) ? "%lu" : "%ld", value); + assert(ret > 0 && (size_t)ret < sizeof(scratch)); + if(cb(scratch, ret, app_key) < 0) return -1; + if(specs && (value >= 0 || !specs->field_unsigned)) { + const asn_INTEGER_enum_map_t *el = + INTEGER_map_value2enum(specs, value); + if(el) { + if(cb(" (", 2, app_key) < 0) return -1; + if(cb(el->enum_name, el->enum_len, app_key) < 0) return -1; + if(cb(")", 1, app_key) < 0) return -1; + } + } + return 0; + } else { + return (cb("", 8, app_key) < 0) ? -1 : 0; + } +} diff --git a/certgen/asncodec/NativeInteger_xer.c b/certgen/asncodec/NativeInteger_xer.c index 18ec59af2d9cc8024b3db7ec3f1ce4bb9fd3eb65..f5dc7a3dcea85e6081ec55fdd5e13c35c5dd5428 100644 --- a/certgen/asncodec/NativeInteger_xer.c +++ b/certgen/asncodec/NativeInteger_xer.c @@ -1,78 +1,78 @@ -/* - * Copyright (c) 2017 Lev Walkin . - * All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include - -/* - * Decode the chunk of XML text encoding INTEGER. - */ -asn_dec_rval_t -NativeInteger_decode_xer(const asn_codec_ctx_t *opt_codec_ctx, - const asn_TYPE_descriptor_t *td, void **sptr, - const char *opt_mname, const void *buf_ptr, - size_t size) { - const asn_INTEGER_specifics_t *specs = - (const asn_INTEGER_specifics_t *)td->specifics; - asn_dec_rval_t rval; - INTEGER_t st; - void *st_ptr = (void *)&st; - long *native = (long *)*sptr; - - if(!native) { - native = (long *)(*sptr = CALLOC(1, sizeof(*native))); - if(!native) ASN__DECODE_FAILED; - } - - memset(&st, 0, sizeof(st)); - rval = INTEGER_decode_xer(opt_codec_ctx, td, &st_ptr, - opt_mname, buf_ptr, size); - if(rval.code == RC_OK) { - long l; - if((specs&&specs->field_unsigned) - ? asn_INTEGER2ulong(&st, (unsigned long *)&l) /* sic */ - : asn_INTEGER2long(&st, &l)) { - rval.code = RC_FAIL; - rval.consumed = 0; - } else { - *native = l; - } - } else { - /* - * Cannot restart from the middle; - * there is no place to save state in the native type. - * Request a continuation from the very beginning. - */ - rval.consumed = 0; - } - ASN_STRUCT_FREE_CONTENTS_ONLY(asn_DEF_INTEGER, &st); - return rval; -} - - -asn_enc_rval_t -NativeInteger_encode_xer(const asn_TYPE_descriptor_t *td, const void *sptr, - int ilevel, enum xer_encoder_flags_e flags, - asn_app_consume_bytes_f *cb, void *app_key) { - const asn_INTEGER_specifics_t *specs = - (const asn_INTEGER_specifics_t *)td->specifics; - char scratch[32]; /* Enough for 64-bit int */ - asn_enc_rval_t er = {0,0,0}; - const long *native = (const long *)sptr; - - (void)ilevel; - (void)flags; - - if(!native) ASN__ENCODE_FAILED; - - er.encoded = snprintf(scratch, sizeof(scratch), - (specs && specs->field_unsigned) - ? "%lu" : "%ld", *native); - if(er.encoded <= 0 || (size_t)er.encoded >= sizeof(scratch) - || cb(scratch, er.encoded, app_key) < 0) - ASN__ENCODE_FAILED; - - ASN__ENCODED_OK(er); -} +/* + * Copyright (c) 2017 Lev Walkin . + * All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include + +/* + * Decode the chunk of XML text encoding INTEGER. + */ +asn_dec_rval_t +NativeInteger_decode_xer(const asn_codec_ctx_t *opt_codec_ctx, + const asn_TYPE_descriptor_t *td, void **sptr, + const char *opt_mname, const void *buf_ptr, + size_t size) { + const asn_INTEGER_specifics_t *specs = + (const asn_INTEGER_specifics_t *)td->specifics; + asn_dec_rval_t rval; + INTEGER_t st; + void *st_ptr = (void *)&st; + long *native = (long *)*sptr; + + if(!native) { + native = (long *)(*sptr = CALLOC(1, sizeof(*native))); + if(!native) ASN__DECODE_FAILED; + } + + memset(&st, 0, sizeof(st)); + rval = INTEGER_decode_xer(opt_codec_ctx, td, &st_ptr, + opt_mname, buf_ptr, size); + if(rval.code == RC_OK) { + long l; + if((specs&&specs->field_unsigned) + ? asn_INTEGER2ulong(&st, (unsigned long *)&l) /* sic */ + : asn_INTEGER2long(&st, &l)) { + rval.code = RC_FAIL; + rval.consumed = 0; + } else { + *native = l; + } + } else { + /* + * Cannot restart from the middle; + * there is no place to save state in the native type. + * Request a continuation from the very beginning. + */ + rval.consumed = 0; + } + ASN_STRUCT_FREE_CONTENTS_ONLY(asn_DEF_INTEGER, &st); + return rval; +} + + +asn_enc_rval_t +NativeInteger_encode_xer(const asn_TYPE_descriptor_t *td, const void *sptr, + int ilevel, enum xer_encoder_flags_e flags, + asn_app_consume_bytes_f *cb, void *app_key) { + const asn_INTEGER_specifics_t *specs = + (const asn_INTEGER_specifics_t *)td->specifics; + char scratch[32]; /* Enough for 64-bit int */ + asn_enc_rval_t er = {0,0,0}; + const long *native = (const long *)sptr; + + (void)ilevel; + (void)flags; + + if(!native) ASN__ENCODE_FAILED; + + er.encoded = snprintf(scratch, sizeof(scratch), + (specs && specs->field_unsigned) + ? "%lu" : "%ld", *native); + if(er.encoded <= 0 || (size_t)er.encoded >= sizeof(scratch) + || cb(scratch, er.encoded, app_key) < 0) + ASN__ENCODE_FAILED; + + ASN__ENCODED_OK(er); +} diff --git a/certgen/asncodec/NinetyDegreeInt.c b/certgen/asncodec/NinetyDegreeInt.c index ba75f8422b9e6cc8d17d863a6313f6bca8495ab9..579249e7412b1f49217f4787a75cc32025632fdc 100644 --- a/certgen/asncodec/NinetyDegreeInt.c +++ b/certgen/asncodec/NinetyDegreeInt.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "NinetyDegreeInt.h" diff --git a/certgen/asncodec/NinetyDegreeInt.h b/certgen/asncodec/NinetyDegreeInt.h index 74c69919b6168164dcfca29932d1643d2ef2a38b..61f51c2117dfac324b4e9267d28efccb70820e86 100644 --- a/certgen/asncodec/NinetyDegreeInt.h +++ b/certgen/asncodec/NinetyDegreeInt.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/OBJECT_IDENTIFIER.c b/certgen/asncodec/OBJECT_IDENTIFIER.c index 5cf2d6066fcbd46300f04f38a8b87818caccaae1..79b7569dff7d8e6d6628a673e71eac951aee1e32 100644 --- a/certgen/asncodec/OBJECT_IDENTIFIER.c +++ b/certgen/asncodec/OBJECT_IDENTIFIER.c @@ -1,532 +1,532 @@ -/*- - * Copyright (c) 2003, 2004 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include -#include -#include -#include /* for CHAR_BIT */ -#include -#include - -/* - * OBJECT IDENTIFIER basic type description. - */ -static const ber_tlv_tag_t asn_DEF_OBJECT_IDENTIFIER_tags[] = { - (ASN_TAG_CLASS_UNIVERSAL | (6 << 2)) -}; -asn_TYPE_operation_t asn_OP_OBJECT_IDENTIFIER = { - ASN__PRIMITIVE_TYPE_free, -#if !defined(ASN_DISABLE_PRINT_SUPPORT) - OBJECT_IDENTIFIER_print, -#else - 0, -#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ - OCTET_STRING_compare, /* Implemented in terms of a string comparison */ -#if !defined(ASN_DISABLE_BER_SUPPORT) - ber_decode_primitive, - der_encode_primitive, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ -#if !defined(ASN_DISABLE_XER_SUPPORT) - OBJECT_IDENTIFIER_decode_xer, - OBJECT_IDENTIFIER_encode_xer, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ -#if !defined(ASN_DISABLE_JER_SUPPORT) - OBJECT_IDENTIFIER_encode_jer, -#else - 0, -#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ -#if !defined(ASN_DISABLE_OER_SUPPORT) - OBJECT_IDENTIFIER_decode_oer, - OBJECT_IDENTIFIER_encode_oer, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ -#if !defined(ASN_DISABLE_UPER_SUPPORT) - OCTET_STRING_decode_uper, - OCTET_STRING_encode_uper, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ -#if !defined(ASN_DISABLE_APER_SUPPORT) - OCTET_STRING_decode_aper, - OCTET_STRING_encode_aper, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ -#if !defined(ASN_DISABLE_RFILL_SUPPORT) - OBJECT_IDENTIFIER_random_fill, -#else - 0, -#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ - 0 /* Use generic outmost tag fetcher */ -}; -asn_TYPE_descriptor_t asn_DEF_OBJECT_IDENTIFIER = { - "OBJECT IDENTIFIER", - "OBJECT_IDENTIFIER", - &asn_OP_OBJECT_IDENTIFIER, - asn_DEF_OBJECT_IDENTIFIER_tags, - sizeof(asn_DEF_OBJECT_IDENTIFIER_tags) - / sizeof(asn_DEF_OBJECT_IDENTIFIER_tags[0]), - asn_DEF_OBJECT_IDENTIFIER_tags, /* Same as above */ - sizeof(asn_DEF_OBJECT_IDENTIFIER_tags) - / sizeof(asn_DEF_OBJECT_IDENTIFIER_tags[0]), - { -#if !defined(ASN_DISABLE_OER_SUPPORT) - 0, -#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ -#if !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) - 0, -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) */ - OBJECT_IDENTIFIER_constraint - }, - 0, 0, /* No members */ - 0 /* No specifics */ -}; - -int -OBJECT_IDENTIFIER_constraint(const asn_TYPE_descriptor_t *td, const void *sptr, - asn_app_constraint_failed_f *ctfailcb, - void *app_key) { - const OBJECT_IDENTIFIER_t *st = (const OBJECT_IDENTIFIER_t *)sptr; - - if(st && st->buf) { - if(st->size < 1) { - ASN__CTFAIL(app_key, td, sptr, - "%s: at least one numerical value " - "expected (%s:%d)", - td->name, __FILE__, __LINE__); - return -1; - } - } else { - ASN__CTFAIL(app_key, td, sptr, - "%s: value not given (%s:%d)", - td->name, __FILE__, __LINE__); - return -1; - } - - return 0; -} - -static ssize_t -OBJECT_IDENTIFIER_get_first_arcs(const uint8_t *arcbuf, size_t arcbuf_len, - asn_oid_arc_t *arc0, asn_oid_arc_t *arc1) { - asn_oid_arc_t value; - - ssize_t rd = OBJECT_IDENTIFIER_get_single_arc(arcbuf, arcbuf_len, &value); - if(rd <= 0) return rd; - - if(value >= 80) { - *arc0 = 2; - *arc1 = value - 80; - } else if(value >= 40) { - *arc0 = 1; - *arc1 = value - 40; - } else { - *arc0 = 0; - *arc1 = value; - } - - return rd; -} - -ssize_t -OBJECT_IDENTIFIER_get_single_arc(const uint8_t *arcbuf, size_t arcbuf_len, - asn_oid_arc_t *ret_value) { - const uint8_t *b = arcbuf; - const uint8_t *arcend = arcbuf + arcbuf_len; /* End of arc */ - - if(arcbuf == arcend) { - return 0; - } else { - asn_oid_arc_t accum; - asn_oid_arc_t upper_limit = (ASN_OID_ARC_MAX >> 7); - /* When the value reaches "upper_limit", it can take */ - /* at most one more digit. If it exceeds "upper_limit" */ - /* but there are more digits - it's an Overflow condition */ - /* Gather all bits into the accumulator */ - for(accum = 0; b < arcend; b++) { - accum = (accum << 7) | (*b & ~0x80); - if((*b & 0x80) == 0) { // no more digits - if(accum <= ASN_OID_ARC_MAX) { - *ret_value = accum; - return 1 + (b - arcbuf); - } else { - errno = ERANGE; /* Overflow */ - return -1; - } - } else { // to make sure we aren't wrapping around - if(accum > upper_limit) { - errno = ERANGE; /* Overflow */ - return -1; - } - } - } - errno = EINVAL; - return -1; - } - -} - -ssize_t -OBJECT_IDENTIFIER__dump_body(const OBJECT_IDENTIFIER_t *st, - asn_app_consume_bytes_f *cb, void *app_key) { - char scratch[32]; - asn_oid_arc_t arc0 = 0; - asn_oid_arc_t arc1 = 0; - size_t produced = 0; - size_t off = 0; - ssize_t rd; - int ret; - - rd = OBJECT_IDENTIFIER_get_first_arcs(st->buf, st->size, &arc0, &arc1); - if(rd <= 0) { - return -1; - } - - ret = snprintf(scratch, sizeof(scratch), "%"PRIu32".%"PRIu32, arc0, arc1); - if(ret >= (ssize_t)sizeof(scratch)) { - return -1; - } - produced += ret; - if(cb(scratch, ret, app_key) < 0) - return -1; - - for(off = rd; ; ) { - asn_oid_arc_t arc; - rd = OBJECT_IDENTIFIER_get_single_arc(st->buf + off, st->size - off, - &arc); - if(rd < 0) { - return -1; - } else if(rd == 0) { - /* No more arcs. */ - break; - } else { - off += rd; - assert(off <= st->size); - ret = snprintf(scratch, sizeof(scratch), ".%" PRIu32, arc); - if(ret >= (ssize_t)sizeof(scratch)) { - return -1; - } - produced += ret; - if(cb(scratch, ret, app_key) < 0) return -1; - } - } - - if(off != st->size) { - ASN_DEBUG("Could not scan to the end of Object Identifier"); - return -1; - } - - return produced; -} - -ssize_t -OBJECT_IDENTIFIER_get_arcs(const OBJECT_IDENTIFIER_t *st, asn_oid_arc_t *arcs, - size_t arc_slots) { - asn_oid_arc_t arc0 = 0; - asn_oid_arc_t arc1 = 0; - size_t num_arcs = 0; - size_t off; - ssize_t rd; - - if(!st || !st->buf) { - errno = EINVAL; - return -1; - } - - rd = OBJECT_IDENTIFIER_get_first_arcs(st->buf, st->size, &arc0, &arc1); - if(rd <= 0) { - return -1; - } - num_arcs = 2; - switch(arc_slots) { - default: - case 2: - arcs[1] = arc1; - /* Fall through */ - case 1: - arcs[0] = arc0; - /* Fall through */ - case 0: - break; - } - - for(off = rd; ; ) { - asn_oid_arc_t arc; - rd = OBJECT_IDENTIFIER_get_single_arc(st->buf + off, st->size - off, - &arc); - if(rd < 0) { - return -1; - } else if(rd == 0) { - /* No more arcs. */ - break; - } else { - off += rd; - if(num_arcs < arc_slots) { - arcs[num_arcs] = arc; - } - num_arcs++; - } - } - - if(off != st->size) { - return -1; - } - - return num_arcs; -} - - -/* - * Save the single value as an object identifier arc. - */ -ssize_t -OBJECT_IDENTIFIER_set_single_arc(uint8_t *arcbuf, size_t arcbuf_len, - asn_oid_arc_t value) { - /* - * The following conditions must hold: - * assert(arcbuf); - */ - uint8_t scratch[((sizeof(value) * CHAR_BIT + 6) / 7)]; - uint8_t *scratch_end = &scratch[sizeof(scratch)-1]; - uint8_t *b; - size_t result_len; - uint8_t mask; - - for(b = scratch_end, mask = 0; ; mask = 0x80, b--) { - *b = mask | (value & 0x7f); - value >>= 7; - if(!value) { - break; - } - } - - result_len = (scratch_end - b) + 1; - - if(result_len > arcbuf_len) { - return -1; - } - - memcpy(arcbuf, b, result_len); - - return result_len; -} - -int -OBJECT_IDENTIFIER_set_arcs(OBJECT_IDENTIFIER_t *st, const asn_oid_arc_t *arcs, - size_t arc_slots) { - uint8_t *buf; - uint8_t *bp; - ssize_t wrote; - asn_oid_arc_t arc0; - asn_oid_arc_t arc1; - size_t size; - size_t i; - - if(!st || !arcs || arc_slots < 2) { - errno = EINVAL; - return -1; - } - - arc0 = arcs[0]; - arc1 = arcs[1]; - - if(arc0 <= 1) { - if(arc1 >= 40) { - /* 8.19.4: At most 39 subsequent values (including 0) */ - errno = ERANGE; - return -1; - } - } else if(arc0 == 2) { - if(arc1 > ASN_OID_ARC_MAX - 80) { - errno = ERANGE; - return -1; - } - } else if(arc0 > 2) { - /* 8.19.4: Only three values are allocated from the root node */ - errno = ERANGE; - return -1; - } - - /* - * After above tests it is known that the value of arc0 is completely - * trustworthy (0..2). However, the arc1's value is still meaningless. - */ - - /* - * Roughly estimate the maximum size necessary to encode these arcs. - * This estimation implicitly takes in account the following facts, - * that cancel each other: - * * the first two arcs are encoded in a single value. - * * the first value may require more space (+1 byte) - * * the value of the first arc which is in range (0..2) - */ - size = ((sizeof(asn_oid_arc_t) * CHAR_BIT + 6) / 7) * arc_slots; - bp = buf = (uint8_t *)MALLOC(size + 1); - if(!buf) { - /* ENOMEM */ - return -1; - } - - wrote = OBJECT_IDENTIFIER_set_single_arc(bp, size, arc0 * 40 + arc1); - if(wrote <= 0) { - FREEMEM(buf); - return -1; - } - assert((size_t)wrote <= size); - bp += wrote; - size -= wrote; - - for(i = 2; i < arc_slots; i++) { - wrote = OBJECT_IDENTIFIER_set_single_arc(bp, size, arcs[i]); - if(wrote <= 0) { - FREEMEM(buf); - return -1; - } - assert((size_t)wrote <= size); - bp += wrote; - size -= wrote; - } - - /* - * Replace buffer. - */ - st->size = bp - buf; - bp = st->buf; - st->buf = buf; - st->buf[st->size] = '\0'; - if(bp) FREEMEM(bp); - - return 0; -} - -ssize_t -OBJECT_IDENTIFIER_parse_arcs(const char *oid_text, ssize_t oid_txt_length, - asn_oid_arc_t *arcs, size_t arcs_count, - const char **opt_oid_text_end) { - size_t num_arcs = 0; - const char *oid_end; - enum { - ST_LEADSPACE, - ST_TAILSPACE, - ST_AFTERVALUE, /* Next character ought to be '.' or a space */ - ST_WAITDIGITS /* Next character is expected to be a digit */ - } state = ST_LEADSPACE; - - if(!oid_text || oid_txt_length < -1 || (arcs_count && !arcs)) { - if(opt_oid_text_end) *opt_oid_text_end = oid_text; - errno = EINVAL; - return -1; - } - - if(oid_txt_length == -1) - oid_txt_length = strlen(oid_text); - -#define _OID_CAPTURE_ARC(oid_text, oid_end) \ - do { \ - const char *endp = oid_end; \ - unsigned long value; \ - switch(asn_strtoul_lim(oid_text, &endp, &value)) { \ - case ASN_STRTOX_EXTRA_DATA: \ - case ASN_STRTOX_OK: \ - if(value <= ASN_OID_ARC_MAX) { \ - if(num_arcs < arcs_count) arcs[num_arcs] = value; \ - num_arcs++; \ - oid_text = endp - 1; \ - break; \ - } \ - /* Fall through */ \ - case ASN_STRTOX_ERROR_RANGE: \ - if(opt_oid_text_end) *opt_oid_text_end = oid_text; \ - errno = ERANGE; \ - return -1; \ - case ASN_STRTOX_ERROR_INVAL: \ - case ASN_STRTOX_EXPECT_MORE: \ - if(opt_oid_text_end) *opt_oid_text_end = oid_text; \ - errno = EINVAL; \ - return -1; \ - } \ - } while(0) - - for(oid_end = oid_text + oid_txt_length; oid_text broken OID */ - return -1; - case ST_LEADSPACE: - case ST_WAITDIGITS: - _OID_CAPTURE_ARC(oid_text, oid_end); - state = ST_AFTERVALUE; - continue; - } - break; - default: - /* Unexpected symbols */ - state = ST_WAITDIGITS; - break; - } /* switch() */ - break; - } /* for() */ - - - if(opt_oid_text_end) *opt_oid_text_end = oid_text; - - /* Finalize last arc */ - switch(state) { - case ST_LEADSPACE: - return 0; /* No OID found in input data */ - case ST_WAITDIGITS: - errno = EINVAL; /* Broken OID */ - return -1; - case ST_AFTERVALUE: - case ST_TAILSPACE: - return num_arcs; - } - - errno = EINVAL; /* Broken OID */ - return -1; -} +/*- + * Copyright (c) 2003, 2004 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include +#include +#include +#include /* for CHAR_BIT */ +#include +#include + +/* + * OBJECT IDENTIFIER basic type description. + */ +static const ber_tlv_tag_t asn_DEF_OBJECT_IDENTIFIER_tags[] = { + (ASN_TAG_CLASS_UNIVERSAL | (6 << 2)) +}; +asn_TYPE_operation_t asn_OP_OBJECT_IDENTIFIER = { + ASN__PRIMITIVE_TYPE_free, +#if !defined(ASN_DISABLE_PRINT_SUPPORT) + OBJECT_IDENTIFIER_print, +#else + 0, +#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ + OCTET_STRING_compare, /* Implemented in terms of a string comparison */ +#if !defined(ASN_DISABLE_BER_SUPPORT) + ber_decode_primitive, + der_encode_primitive, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ +#if !defined(ASN_DISABLE_XER_SUPPORT) + OBJECT_IDENTIFIER_decode_xer, + OBJECT_IDENTIFIER_encode_xer, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ +#if !defined(ASN_DISABLE_JER_SUPPORT) + OBJECT_IDENTIFIER_encode_jer, +#else + 0, +#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ +#if !defined(ASN_DISABLE_OER_SUPPORT) + OBJECT_IDENTIFIER_decode_oer, + OBJECT_IDENTIFIER_encode_oer, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ +#if !defined(ASN_DISABLE_UPER_SUPPORT) + OCTET_STRING_decode_uper, + OCTET_STRING_encode_uper, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ +#if !defined(ASN_DISABLE_APER_SUPPORT) + OCTET_STRING_decode_aper, + OCTET_STRING_encode_aper, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ +#if !defined(ASN_DISABLE_RFILL_SUPPORT) + OBJECT_IDENTIFIER_random_fill, +#else + 0, +#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ + 0 /* Use generic outmost tag fetcher */ +}; +asn_TYPE_descriptor_t asn_DEF_OBJECT_IDENTIFIER = { + "OBJECT IDENTIFIER", + "OBJECT_IDENTIFIER", + &asn_OP_OBJECT_IDENTIFIER, + asn_DEF_OBJECT_IDENTIFIER_tags, + sizeof(asn_DEF_OBJECT_IDENTIFIER_tags) + / sizeof(asn_DEF_OBJECT_IDENTIFIER_tags[0]), + asn_DEF_OBJECT_IDENTIFIER_tags, /* Same as above */ + sizeof(asn_DEF_OBJECT_IDENTIFIER_tags) + / sizeof(asn_DEF_OBJECT_IDENTIFIER_tags[0]), + { +#if !defined(ASN_DISABLE_OER_SUPPORT) + 0, +#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ +#if !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) + 0, +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) */ + OBJECT_IDENTIFIER_constraint + }, + 0, 0, /* No members */ + 0 /* No specifics */ +}; + +int +OBJECT_IDENTIFIER_constraint(const asn_TYPE_descriptor_t *td, const void *sptr, + asn_app_constraint_failed_f *ctfailcb, + void *app_key) { + const OBJECT_IDENTIFIER_t *st = (const OBJECT_IDENTIFIER_t *)sptr; + + if(st && st->buf) { + if(st->size < 1) { + ASN__CTFAIL(app_key, td, sptr, + "%s: at least one numerical value " + "expected (%s:%d)", + td->name, __FILE__, __LINE__); + return -1; + } + } else { + ASN__CTFAIL(app_key, td, sptr, + "%s: value not given (%s:%d)", + td->name, __FILE__, __LINE__); + return -1; + } + + return 0; +} + +static ssize_t +OBJECT_IDENTIFIER_get_first_arcs(const uint8_t *arcbuf, size_t arcbuf_len, + asn_oid_arc_t *arc0, asn_oid_arc_t *arc1) { + asn_oid_arc_t value; + + ssize_t rd = OBJECT_IDENTIFIER_get_single_arc(arcbuf, arcbuf_len, &value); + if(rd <= 0) return rd; + + if(value >= 80) { + *arc0 = 2; + *arc1 = value - 80; + } else if(value >= 40) { + *arc0 = 1; + *arc1 = value - 40; + } else { + *arc0 = 0; + *arc1 = value; + } + + return rd; +} + +ssize_t +OBJECT_IDENTIFIER_get_single_arc(const uint8_t *arcbuf, size_t arcbuf_len, + asn_oid_arc_t *ret_value) { + const uint8_t *b = arcbuf; + const uint8_t *arcend = arcbuf + arcbuf_len; /* End of arc */ + + if(arcbuf == arcend) { + return 0; + } else { + asn_oid_arc_t accum; + asn_oid_arc_t upper_limit = (ASN_OID_ARC_MAX >> 7); + /* When the value reaches "upper_limit", it can take */ + /* at most one more digit. If it exceeds "upper_limit" */ + /* but there are more digits - it's an Overflow condition */ + /* Gather all bits into the accumulator */ + for(accum = 0; b < arcend; b++) { + accum = (accum << 7) | (*b & ~0x80); + if((*b & 0x80) == 0) { // no more digits + if(accum <= ASN_OID_ARC_MAX) { + *ret_value = accum; + return 1 + (b - arcbuf); + } else { + errno = ERANGE; /* Overflow */ + return -1; + } + } else { // to make sure we aren't wrapping around + if(accum > upper_limit) { + errno = ERANGE; /* Overflow */ + return -1; + } + } + } + errno = EINVAL; + return -1; + } + +} + +ssize_t +OBJECT_IDENTIFIER__dump_body(const OBJECT_IDENTIFIER_t *st, + asn_app_consume_bytes_f *cb, void *app_key) { + char scratch[32]; + asn_oid_arc_t arc0 = 0; + asn_oid_arc_t arc1 = 0; + size_t produced = 0; + size_t off = 0; + ssize_t rd; + int ret; + + rd = OBJECT_IDENTIFIER_get_first_arcs(st->buf, st->size, &arc0, &arc1); + if(rd <= 0) { + return -1; + } + + ret = snprintf(scratch, sizeof(scratch), "%"PRIu32".%"PRIu32, arc0, arc1); + if(ret >= (ssize_t)sizeof(scratch)) { + return -1; + } + produced += ret; + if(cb(scratch, ret, app_key) < 0) + return -1; + + for(off = rd; ; ) { + asn_oid_arc_t arc; + rd = OBJECT_IDENTIFIER_get_single_arc(st->buf + off, st->size - off, + &arc); + if(rd < 0) { + return -1; + } else if(rd == 0) { + /* No more arcs. */ + break; + } else { + off += rd; + assert(off <= st->size); + ret = snprintf(scratch, sizeof(scratch), ".%" PRIu32, arc); + if(ret >= (ssize_t)sizeof(scratch)) { + return -1; + } + produced += ret; + if(cb(scratch, ret, app_key) < 0) return -1; + } + } + + if(off != st->size) { + ASN_DEBUG("Could not scan to the end of Object Identifier"); + return -1; + } + + return produced; +} + +ssize_t +OBJECT_IDENTIFIER_get_arcs(const OBJECT_IDENTIFIER_t *st, asn_oid_arc_t *arcs, + size_t arc_slots) { + asn_oid_arc_t arc0 = 0; + asn_oid_arc_t arc1 = 0; + size_t num_arcs = 0; + size_t off; + ssize_t rd; + + if(!st || !st->buf) { + errno = EINVAL; + return -1; + } + + rd = OBJECT_IDENTIFIER_get_first_arcs(st->buf, st->size, &arc0, &arc1); + if(rd <= 0) { + return -1; + } + num_arcs = 2; + switch(arc_slots) { + default: + case 2: + arcs[1] = arc1; + /* Fall through */ + case 1: + arcs[0] = arc0; + /* Fall through */ + case 0: + break; + } + + for(off = rd; ; ) { + asn_oid_arc_t arc; + rd = OBJECT_IDENTIFIER_get_single_arc(st->buf + off, st->size - off, + &arc); + if(rd < 0) { + return -1; + } else if(rd == 0) { + /* No more arcs. */ + break; + } else { + off += rd; + if(num_arcs < arc_slots) { + arcs[num_arcs] = arc; + } + num_arcs++; + } + } + + if(off != st->size) { + return -1; + } + + return num_arcs; +} + + +/* + * Save the single value as an object identifier arc. + */ +ssize_t +OBJECT_IDENTIFIER_set_single_arc(uint8_t *arcbuf, size_t arcbuf_len, + asn_oid_arc_t value) { + /* + * The following conditions must hold: + * assert(arcbuf); + */ + uint8_t scratch[((sizeof(value) * CHAR_BIT + 6) / 7)]; + uint8_t *scratch_end = &scratch[sizeof(scratch)-1]; + uint8_t *b; + size_t result_len; + uint8_t mask; + + for(b = scratch_end, mask = 0; ; mask = 0x80, b--) { + *b = mask | (value & 0x7f); + value >>= 7; + if(!value) { + break; + } + } + + result_len = (scratch_end - b) + 1; + + if(result_len > arcbuf_len) { + return -1; + } + + memcpy(arcbuf, b, result_len); + + return result_len; +} + +int +OBJECT_IDENTIFIER_set_arcs(OBJECT_IDENTIFIER_t *st, const asn_oid_arc_t *arcs, + size_t arc_slots) { + uint8_t *buf; + uint8_t *bp; + ssize_t wrote; + asn_oid_arc_t arc0; + asn_oid_arc_t arc1; + size_t size; + size_t i; + + if(!st || !arcs || arc_slots < 2) { + errno = EINVAL; + return -1; + } + + arc0 = arcs[0]; + arc1 = arcs[1]; + + if(arc0 <= 1) { + if(arc1 >= 40) { + /* 8.19.4: At most 39 subsequent values (including 0) */ + errno = ERANGE; + return -1; + } + } else if(arc0 == 2) { + if(arc1 > ASN_OID_ARC_MAX - 80) { + errno = ERANGE; + return -1; + } + } else if(arc0 > 2) { + /* 8.19.4: Only three values are allocated from the root node */ + errno = ERANGE; + return -1; + } + + /* + * After above tests it is known that the value of arc0 is completely + * trustworthy (0..2). However, the arc1's value is still meaningless. + */ + + /* + * Roughly estimate the maximum size necessary to encode these arcs. + * This estimation implicitly takes in account the following facts, + * that cancel each other: + * * the first two arcs are encoded in a single value. + * * the first value may require more space (+1 byte) + * * the value of the first arc which is in range (0..2) + */ + size = ((sizeof(asn_oid_arc_t) * CHAR_BIT + 6) / 7) * arc_slots; + bp = buf = (uint8_t *)MALLOC(size + 1); + if(!buf) { + /* ENOMEM */ + return -1; + } + + wrote = OBJECT_IDENTIFIER_set_single_arc(bp, size, arc0 * 40 + arc1); + if(wrote <= 0) { + FREEMEM(buf); + return -1; + } + assert((size_t)wrote <= size); + bp += wrote; + size -= wrote; + + for(i = 2; i < arc_slots; i++) { + wrote = OBJECT_IDENTIFIER_set_single_arc(bp, size, arcs[i]); + if(wrote <= 0) { + FREEMEM(buf); + return -1; + } + assert((size_t)wrote <= size); + bp += wrote; + size -= wrote; + } + + /* + * Replace buffer. + */ + st->size = bp - buf; + bp = st->buf; + st->buf = buf; + st->buf[st->size] = '\0'; + if(bp) FREEMEM(bp); + + return 0; +} + +ssize_t +OBJECT_IDENTIFIER_parse_arcs(const char *oid_text, ssize_t oid_txt_length, + asn_oid_arc_t *arcs, size_t arcs_count, + const char **opt_oid_text_end) { + size_t num_arcs = 0; + const char *oid_end; + enum { + ST_LEADSPACE, + ST_TAILSPACE, + ST_AFTERVALUE, /* Next character ought to be '.' or a space */ + ST_WAITDIGITS /* Next character is expected to be a digit */ + } state = ST_LEADSPACE; + + if(!oid_text || oid_txt_length < -1 || (arcs_count && !arcs)) { + if(opt_oid_text_end) *opt_oid_text_end = oid_text; + errno = EINVAL; + return -1; + } + + if(oid_txt_length == -1) + oid_txt_length = strlen(oid_text); + +#define _OID_CAPTURE_ARC(oid_text, oid_end) \ + do { \ + const char *endp = oid_end; \ + unsigned long value; \ + switch(asn_strtoul_lim(oid_text, &endp, &value)) { \ + case ASN_STRTOX_EXTRA_DATA: \ + case ASN_STRTOX_OK: \ + if(value <= ASN_OID_ARC_MAX) { \ + if(num_arcs < arcs_count) arcs[num_arcs] = value; \ + num_arcs++; \ + oid_text = endp - 1; \ + break; \ + } \ + /* Fall through */ \ + case ASN_STRTOX_ERROR_RANGE: \ + if(opt_oid_text_end) *opt_oid_text_end = oid_text; \ + errno = ERANGE; \ + return -1; \ + case ASN_STRTOX_ERROR_INVAL: \ + case ASN_STRTOX_EXPECT_MORE: \ + if(opt_oid_text_end) *opt_oid_text_end = oid_text; \ + errno = EINVAL; \ + return -1; \ + } \ + } while(0) + + for(oid_end = oid_text + oid_txt_length; oid_text broken OID */ + return -1; + case ST_LEADSPACE: + case ST_WAITDIGITS: + _OID_CAPTURE_ARC(oid_text, oid_end); + state = ST_AFTERVALUE; + continue; + } + break; + default: + /* Unexpected symbols */ + state = ST_WAITDIGITS; + break; + } /* switch() */ + break; + } /* for() */ + + + if(opt_oid_text_end) *opt_oid_text_end = oid_text; + + /* Finalize last arc */ + switch(state) { + case ST_LEADSPACE: + return 0; /* No OID found in input data */ + case ST_WAITDIGITS: + errno = EINVAL; /* Broken OID */ + return -1; + case ST_AFTERVALUE: + case ST_TAILSPACE: + return num_arcs; + } + + errno = EINVAL; /* Broken OID */ + return -1; +} diff --git a/certgen/asncodec/OBJECT_IDENTIFIER.h b/certgen/asncodec/OBJECT_IDENTIFIER.h index f878055c6050349d7efa5b52ffb6cba2021b25a1..ed4a80529e33e0b70a5cf0d78c210e7b1f4c5326 100644 --- a/certgen/asncodec/OBJECT_IDENTIFIER.h +++ b/certgen/asncodec/OBJECT_IDENTIFIER.h @@ -1,184 +1,184 @@ -/* - * Copyright (c) 2003-2017 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#ifndef _OBJECT_IDENTIFIER_H_ -#define _OBJECT_IDENTIFIER_H_ - -#include -#include -#include - -#ifdef __cplusplus -extern "C" { -#endif - -typedef uint32_t asn_oid_arc_t; -#define ASN_OID_ARC_MAX (~((asn_oid_arc_t)0)) - -typedef ASN__PRIMITIVE_TYPE_t OBJECT_IDENTIFIER_t; - -extern asn_TYPE_descriptor_t asn_DEF_OBJECT_IDENTIFIER; -extern asn_TYPE_operation_t asn_OP_OBJECT_IDENTIFIER; - -ssize_t OBJECT_IDENTIFIER__dump_body(const OBJECT_IDENTIFIER_t *st, - asn_app_consume_bytes_f *cb, - void *app_key); - -#define OBJECT_IDENTIFIER_free ASN__PRIMITIVE_TYPE_free - -#if !defined(ASN_DISABLE_PRINT_SUPPORT) -asn_struct_print_f OBJECT_IDENTIFIER_print; -#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ - -#define OBJECT_IDENTIFIER_compare OCTET_STRING_compare - -asn_constr_check_f OBJECT_IDENTIFIER_constraint; - -#if !defined(ASN_DISABLE_BER_SUPPORT) -#define OBJECT_IDENTIFIER_decode_ber ber_decode_primitive -#define OBJECT_IDENTIFIER_encode_der der_encode_primitive -#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ - -#if !defined(ASN_DISABLE_XER_SUPPORT) -xer_type_decoder_f OBJECT_IDENTIFIER_decode_xer; -xer_type_encoder_f OBJECT_IDENTIFIER_encode_xer; -#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ - -#if !defined(ASN_DISABLE_JER_SUPPORT) -jer_type_encoder_f OBJECT_IDENTIFIER_encode_jer; -#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ - -#if !defined(ASN_DISABLE_OER_SUPPORT) -#define OBJECT_IDENTIFIER_decode_oer oer_decode_primitive -#define OBJECT_IDENTIFIER_encode_oer oer_encode_primitive -#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ - -#if !defined(ASN_DISABLE_UPER_SUPPORT) -#define OBJECT_IDENTIFIER_decode_uper OCTET_STRING_decode_uper -#define OBJECT_IDENTIFIER_encode_uper OCTET_STRING_encode_uper -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ -#if !defined(ASN_DISABLE_APER_SUPPORT) -#define OBJECT_IDENTIFIER_decode_aper OCTET_STRING_decode_aper -#define OBJECT_IDENTIFIER_encode_aper OCTET_STRING_encode_aper -#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ - -#if !defined(ASN_DISABLE_RFILL_SUPPORT) -asn_random_fill_f OBJECT_IDENTIFIER_random_fill; -#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ - -/********************************** - * Some handy conversion routines * - **********************************/ - -/* - * This function fills an (arcs) array with OBJECT IDENTIFIER arcs - * up to specified (arc_slots) elements. - * - * EXAMPLE: - * void print_arcs(OBJECT_IDENTIFIER_t *oid) { - * asn_oid_arc_t fixed_arcs[10]; // Try with fixed space first - * asn_oid_arc_t *arcs = fixed_arcs; - * size_t arc_slots = sizeof(fixed_arcs)/sizeof(fixed_arcs[0]); // 10 - * ssize_t count; // Real number of arcs. - * int i; - * - * count = OBJECT_IDENTIFIER_get_arcs(oid, arcs, arc_slots); - * // If necessary, reallocate arcs array and try again. - * if(count > arc_slots) { - * arc_slots = count; - * arcs = malloc(sizeof(asn_oid_arc_t) * arc_slots); - * if(!arcs) return; - * count = OBJECT_IDENTIFIER_get_arcs(oid, arcs, arc_slots); - * assert(count == arc_slots); - * } - * - * // Print the contents of the arcs array. - * for(i = 0; i < count; i++) - * printf("%"PRIu32"\n", arcs[i]); - * - * // Avoid memory leak. - * if(arcs != fixed_arcs) free(arcs); - * } - * - * RETURN VALUES: - * -1/EINVAL: Invalid arguments (oid is missing) - * -1/ERANGE: One or more arcs have value out of array cell type range. - * >=0: Number of arcs contained in the OBJECT IDENTIFIER - * - * WARNING: The function always returns the actual number of arcs, - * even if there is no sufficient (arc_slots) provided. - */ -ssize_t OBJECT_IDENTIFIER_get_arcs(const OBJECT_IDENTIFIER_t *oid, - asn_oid_arc_t *arcs, size_t arc_slots); - -/* - * This functions initializes the OBJECT IDENTIFIER object with - * the given set of arcs. - * The minimum of two arcs must be present; some restrictions apply. - * RETURN VALUES: - * -1/EINVAL: Invalid arguments - * -1/ERANGE: The first two arcs do not conform to ASN.1 restrictions. - * -1/ENOMEM: Memory allocation failed - * 0: The object was initialized with new arcs. - */ -int OBJECT_IDENTIFIER_set_arcs(OBJECT_IDENTIFIER_t *oid, - const asn_oid_arc_t *arcs, size_t arcs_count); - - -/* - * Parse the OBJECT IDENTIFIER textual representation ("1.3.6.1.4.1.9363"). - * No arc can exceed the (0..ASN_OID_ARC_MAX, which is the same as UINT32_MAX). - * This function is not specific to OBJECT IDENTIFIER, it may be used to parse - * the RELATIVE-OID data, or any other data consisting of dot-separated - * series of numeric values. - * - * If (oid_txt_length == -1), the strlen() will be invoked to determine the - * size of the (oid_text) string. - * - * After return, the optional (opt_oid_text_end) is set to the character after - * the last parsed one. (opt_oid_text_end) is never less than (oid_text). - * - * RETURN VALUES: - * -1: Parse error. - * >= 0: Number of arcs contained in the OBJECT IDENTIFIER. - * - * WARNING: The function always returns the real number of arcs, - * even if there is no sufficient (arc_slots) provided. - * This is useful for (arc_slots) value estimation. - */ -ssize_t OBJECT_IDENTIFIER_parse_arcs(const char *oid_text, - ssize_t oid_txt_length, - asn_oid_arc_t *arcs, size_t arcs_count, - const char **opt_oid_text_end); - -/* - * Internal functions. - * Used by RELATIVE-OID implementation in particular. - */ - -/* - * Retrieve a single arc of size from the (arcbuf) buffer. - * RETURN VALUES: - * -1: Failed to retrieve the value from the (arcbuf). - * >0: Number of bytes consumed from the (arcbuf), <= (arcbuf_len). - */ -ssize_t OBJECT_IDENTIFIER_get_single_arc(const uint8_t *arcbuf, - size_t arcbuf_len, - asn_oid_arc_t *ret_value); - -/* - * Write the unterminated arc value into the (arcbuf) which has the size at - * least (arcbuf_len). - * RETURN VALUES: - * -1: (arcbuf_len) size is not sufficient to write the value. - * : Number of bytes appended to the arcbuf (<= arcbuf_len). - */ -ssize_t OBJECT_IDENTIFIER_set_single_arc(uint8_t *arcbuf, size_t arcbuf_len, - asn_oid_arc_t arc_value); - -#ifdef __cplusplus -} -#endif - -#endif /* _OBJECT_IDENTIFIER_H_ */ +/* + * Copyright (c) 2003-2017 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#ifndef _OBJECT_IDENTIFIER_H_ +#define _OBJECT_IDENTIFIER_H_ + +#include +#include +#include + +#ifdef __cplusplus +extern "C" { +#endif + +typedef uint32_t asn_oid_arc_t; +#define ASN_OID_ARC_MAX (~((asn_oid_arc_t)0)) + +typedef ASN__PRIMITIVE_TYPE_t OBJECT_IDENTIFIER_t; + +extern asn_TYPE_descriptor_t asn_DEF_OBJECT_IDENTIFIER; +extern asn_TYPE_operation_t asn_OP_OBJECT_IDENTIFIER; + +ssize_t OBJECT_IDENTIFIER__dump_body(const OBJECT_IDENTIFIER_t *st, + asn_app_consume_bytes_f *cb, + void *app_key); + +#define OBJECT_IDENTIFIER_free ASN__PRIMITIVE_TYPE_free + +#if !defined(ASN_DISABLE_PRINT_SUPPORT) +asn_struct_print_f OBJECT_IDENTIFIER_print; +#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ + +#define OBJECT_IDENTIFIER_compare OCTET_STRING_compare + +asn_constr_check_f OBJECT_IDENTIFIER_constraint; + +#if !defined(ASN_DISABLE_BER_SUPPORT) +#define OBJECT_IDENTIFIER_decode_ber ber_decode_primitive +#define OBJECT_IDENTIFIER_encode_der der_encode_primitive +#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ + +#if !defined(ASN_DISABLE_XER_SUPPORT) +xer_type_decoder_f OBJECT_IDENTIFIER_decode_xer; +xer_type_encoder_f OBJECT_IDENTIFIER_encode_xer; +#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ + +#if !defined(ASN_DISABLE_JER_SUPPORT) +jer_type_encoder_f OBJECT_IDENTIFIER_encode_jer; +#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ + +#if !defined(ASN_DISABLE_OER_SUPPORT) +#define OBJECT_IDENTIFIER_decode_oer oer_decode_primitive +#define OBJECT_IDENTIFIER_encode_oer oer_encode_primitive +#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ + +#if !defined(ASN_DISABLE_UPER_SUPPORT) +#define OBJECT_IDENTIFIER_decode_uper OCTET_STRING_decode_uper +#define OBJECT_IDENTIFIER_encode_uper OCTET_STRING_encode_uper +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ +#if !defined(ASN_DISABLE_APER_SUPPORT) +#define OBJECT_IDENTIFIER_decode_aper OCTET_STRING_decode_aper +#define OBJECT_IDENTIFIER_encode_aper OCTET_STRING_encode_aper +#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ + +#if !defined(ASN_DISABLE_RFILL_SUPPORT) +asn_random_fill_f OBJECT_IDENTIFIER_random_fill; +#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ + +/********************************** + * Some handy conversion routines * + **********************************/ + +/* + * This function fills an (arcs) array with OBJECT IDENTIFIER arcs + * up to specified (arc_slots) elements. + * + * EXAMPLE: + * void print_arcs(OBJECT_IDENTIFIER_t *oid) { + * asn_oid_arc_t fixed_arcs[10]; // Try with fixed space first + * asn_oid_arc_t *arcs = fixed_arcs; + * size_t arc_slots = sizeof(fixed_arcs)/sizeof(fixed_arcs[0]); // 10 + * ssize_t count; // Real number of arcs. + * int i; + * + * count = OBJECT_IDENTIFIER_get_arcs(oid, arcs, arc_slots); + * // If necessary, reallocate arcs array and try again. + * if(count > arc_slots) { + * arc_slots = count; + * arcs = malloc(sizeof(asn_oid_arc_t) * arc_slots); + * if(!arcs) return; + * count = OBJECT_IDENTIFIER_get_arcs(oid, arcs, arc_slots); + * assert(count == arc_slots); + * } + * + * // Print the contents of the arcs array. + * for(i = 0; i < count; i++) + * printf("%"PRIu32"\n", arcs[i]); + * + * // Avoid memory leak. + * if(arcs != fixed_arcs) free(arcs); + * } + * + * RETURN VALUES: + * -1/EINVAL: Invalid arguments (oid is missing) + * -1/ERANGE: One or more arcs have value out of array cell type range. + * >=0: Number of arcs contained in the OBJECT IDENTIFIER + * + * WARNING: The function always returns the actual number of arcs, + * even if there is no sufficient (arc_slots) provided. + */ +ssize_t OBJECT_IDENTIFIER_get_arcs(const OBJECT_IDENTIFIER_t *oid, + asn_oid_arc_t *arcs, size_t arc_slots); + +/* + * This functions initializes the OBJECT IDENTIFIER object with + * the given set of arcs. + * The minimum of two arcs must be present; some restrictions apply. + * RETURN VALUES: + * -1/EINVAL: Invalid arguments + * -1/ERANGE: The first two arcs do not conform to ASN.1 restrictions. + * -1/ENOMEM: Memory allocation failed + * 0: The object was initialized with new arcs. + */ +int OBJECT_IDENTIFIER_set_arcs(OBJECT_IDENTIFIER_t *oid, + const asn_oid_arc_t *arcs, size_t arcs_count); + + +/* + * Parse the OBJECT IDENTIFIER textual representation ("1.3.6.1.4.1.9363"). + * No arc can exceed the (0..ASN_OID_ARC_MAX, which is the same as UINT32_MAX). + * This function is not specific to OBJECT IDENTIFIER, it may be used to parse + * the RELATIVE-OID data, or any other data consisting of dot-separated + * series of numeric values. + * + * If (oid_txt_length == -1), the strlen() will be invoked to determine the + * size of the (oid_text) string. + * + * After return, the optional (opt_oid_text_end) is set to the character after + * the last parsed one. (opt_oid_text_end) is never less than (oid_text). + * + * RETURN VALUES: + * -1: Parse error. + * >= 0: Number of arcs contained in the OBJECT IDENTIFIER. + * + * WARNING: The function always returns the real number of arcs, + * even if there is no sufficient (arc_slots) provided. + * This is useful for (arc_slots) value estimation. + */ +ssize_t OBJECT_IDENTIFIER_parse_arcs(const char *oid_text, + ssize_t oid_txt_length, + asn_oid_arc_t *arcs, size_t arcs_count, + const char **opt_oid_text_end); + +/* + * Internal functions. + * Used by RELATIVE-OID implementation in particular. + */ + +/* + * Retrieve a single arc of size from the (arcbuf) buffer. + * RETURN VALUES: + * -1: Failed to retrieve the value from the (arcbuf). + * >0: Number of bytes consumed from the (arcbuf), <= (arcbuf_len). + */ +ssize_t OBJECT_IDENTIFIER_get_single_arc(const uint8_t *arcbuf, + size_t arcbuf_len, + asn_oid_arc_t *ret_value); + +/* + * Write the unterminated arc value into the (arcbuf) which has the size at + * least (arcbuf_len). + * RETURN VALUES: + * -1: (arcbuf_len) size is not sufficient to write the value. + * : Number of bytes appended to the arcbuf (<= arcbuf_len). + */ +ssize_t OBJECT_IDENTIFIER_set_single_arc(uint8_t *arcbuf, size_t arcbuf_len, + asn_oid_arc_t arc_value); + +#ifdef __cplusplus +} +#endif + +#endif /* _OBJECT_IDENTIFIER_H_ */ diff --git a/certgen/asncodec/OBJECT_IDENTIFIER_print.c b/certgen/asncodec/OBJECT_IDENTIFIER_print.c index b0c3a9e840f5ee57d59edca3a0e53ba79b417b4e..fc2d4cea0b28454055e6f62536d4686dc7943aa1 100644 --- a/certgen/asncodec/OBJECT_IDENTIFIER_print.c +++ b/certgen/asncodec/OBJECT_IDENTIFIER_print.c @@ -1,30 +1,30 @@ -/* - * Copyright (c) 2017 Lev Walkin . - * All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include - -int -OBJECT_IDENTIFIER_print(const asn_TYPE_descriptor_t *td, const void *sptr, - int ilevel, asn_app_consume_bytes_f *cb, - void *app_key) { - const OBJECT_IDENTIFIER_t *st = (const OBJECT_IDENTIFIER_t *)sptr; - - (void)td; /* Unused argument */ - (void)ilevel; /* Unused argument */ - - if(!st || !st->buf) - return (cb("", 8, app_key) < 0) ? -1 : 0; - - /* Dump preamble */ - if(cb("{ ", 2, app_key) < 0) - return -1; - - if(OBJECT_IDENTIFIER__dump_body(st, cb, app_key) < 0) { - return -1; - } - - return (cb(" }", 2, app_key) < 0) ? -1 : 0; -} +/* + * Copyright (c) 2017 Lev Walkin . + * All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include + +int +OBJECT_IDENTIFIER_print(const asn_TYPE_descriptor_t *td, const void *sptr, + int ilevel, asn_app_consume_bytes_f *cb, + void *app_key) { + const OBJECT_IDENTIFIER_t *st = (const OBJECT_IDENTIFIER_t *)sptr; + + (void)td; /* Unused argument */ + (void)ilevel; /* Unused argument */ + + if(!st || !st->buf) + return (cb("", 8, app_key) < 0) ? -1 : 0; + + /* Dump preamble */ + if(cb("{ ", 2, app_key) < 0) + return -1; + + if(OBJECT_IDENTIFIER__dump_body(st, cb, app_key) < 0) { + return -1; + } + + return (cb(" }", 2, app_key) < 0) ? -1 : 0; +} diff --git a/certgen/asncodec/OBJECT_IDENTIFIER_xer.c b/certgen/asncodec/OBJECT_IDENTIFIER_xer.c index 706e51a94d45b28cdb6bee3f3bbb3c5b454e8b80..4aa0a80f5d187153e20ac8dbac0007dc83c8af23 100644 --- a/certgen/asncodec/OBJECT_IDENTIFIER_xer.c +++ b/certgen/asncodec/OBJECT_IDENTIFIER_xer.c @@ -1,80 +1,80 @@ -/* - * Copyright (c) 2017 Lev Walkin . - * All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include - -static enum xer_pbd_rval -OBJECT_IDENTIFIER__xer_body_decode(const asn_TYPE_descriptor_t *td, void *sptr, - const void *chunk_buf, size_t chunk_size) { - OBJECT_IDENTIFIER_t *st = (OBJECT_IDENTIFIER_t *)sptr; - const char *chunk_end = (const char *)chunk_buf + chunk_size; - const char *endptr; - asn_oid_arc_t s_arcs[10]; - asn_oid_arc_t *arcs = s_arcs; - ssize_t num_arcs; - ssize_t ret; - - (void)td; - - num_arcs = OBJECT_IDENTIFIER_parse_arcs( - (const char *)chunk_buf, chunk_size, arcs, - sizeof(s_arcs) / sizeof(s_arcs[0]), &endptr); - if(num_arcs < 0) { - /* Expecting more than zero arcs */ - return XPBD_BROKEN_ENCODING; - } else if(num_arcs == 0) { - return XPBD_NOT_BODY_IGNORE; - } - (void)chunk_end; - assert(endptr == chunk_end); - - if((size_t)num_arcs > sizeof(s_arcs)/sizeof(s_arcs[0])) { - arcs = (asn_oid_arc_t *)MALLOC(num_arcs * sizeof(asn_oid_arc_t)); - if(!arcs) return XPBD_SYSTEM_FAILURE; - ret = OBJECT_IDENTIFIER_parse_arcs((const char *)chunk_buf, chunk_size, - arcs, num_arcs, &endptr); - if(ret != num_arcs) - return XPBD_SYSTEM_FAILURE; /* assert?.. */ - } - - /* - * Convert arcs into BER representation. - */ - ret = OBJECT_IDENTIFIER_set_arcs(st, arcs, num_arcs); - if(arcs != s_arcs) FREEMEM(arcs); - - return ret ? XPBD_SYSTEM_FAILURE : XPBD_BODY_CONSUMED; -} - -asn_dec_rval_t -OBJECT_IDENTIFIER_decode_xer(const asn_codec_ctx_t *opt_codec_ctx, - const asn_TYPE_descriptor_t *td, void **sptr, - const char *opt_mname, const void *buf_ptr, - size_t size) { - return xer_decode_primitive(opt_codec_ctx, td, - sptr, sizeof(OBJECT_IDENTIFIER_t), opt_mname, - buf_ptr, size, OBJECT_IDENTIFIER__xer_body_decode); -} - -asn_enc_rval_t -OBJECT_IDENTIFIER_encode_xer(const asn_TYPE_descriptor_t *td, const void *sptr, - int ilevel, enum xer_encoder_flags_e flags, - asn_app_consume_bytes_f *cb, void *app_key) { - const OBJECT_IDENTIFIER_t *st = (const OBJECT_IDENTIFIER_t *)sptr; - asn_enc_rval_t er = {0,0,0}; - - (void)ilevel; - (void)flags; - - if(!st || !st->buf) { - ASN__ENCODE_FAILED; - } - - er.encoded = OBJECT_IDENTIFIER__dump_body(st, cb, app_key); - if(er.encoded < 0) ASN__ENCODE_FAILED; - - ASN__ENCODED_OK(er); -} +/* + * Copyright (c) 2017 Lev Walkin . + * All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include + +static enum xer_pbd_rval +OBJECT_IDENTIFIER__xer_body_decode(const asn_TYPE_descriptor_t *td, void *sptr, + const void *chunk_buf, size_t chunk_size) { + OBJECT_IDENTIFIER_t *st = (OBJECT_IDENTIFIER_t *)sptr; + const char *chunk_end = (const char *)chunk_buf + chunk_size; + const char *endptr; + asn_oid_arc_t s_arcs[10]; + asn_oid_arc_t *arcs = s_arcs; + ssize_t num_arcs; + ssize_t ret; + + (void)td; + + num_arcs = OBJECT_IDENTIFIER_parse_arcs( + (const char *)chunk_buf, chunk_size, arcs, + sizeof(s_arcs) / sizeof(s_arcs[0]), &endptr); + if(num_arcs < 0) { + /* Expecting more than zero arcs */ + return XPBD_BROKEN_ENCODING; + } else if(num_arcs == 0) { + return XPBD_NOT_BODY_IGNORE; + } + (void)chunk_end; + assert(endptr == chunk_end); + + if((size_t)num_arcs > sizeof(s_arcs)/sizeof(s_arcs[0])) { + arcs = (asn_oid_arc_t *)MALLOC(num_arcs * sizeof(asn_oid_arc_t)); + if(!arcs) return XPBD_SYSTEM_FAILURE; + ret = OBJECT_IDENTIFIER_parse_arcs((const char *)chunk_buf, chunk_size, + arcs, num_arcs, &endptr); + if(ret != num_arcs) + return XPBD_SYSTEM_FAILURE; /* assert?.. */ + } + + /* + * Convert arcs into BER representation. + */ + ret = OBJECT_IDENTIFIER_set_arcs(st, arcs, num_arcs); + if(arcs != s_arcs) FREEMEM(arcs); + + return ret ? XPBD_SYSTEM_FAILURE : XPBD_BODY_CONSUMED; +} + +asn_dec_rval_t +OBJECT_IDENTIFIER_decode_xer(const asn_codec_ctx_t *opt_codec_ctx, + const asn_TYPE_descriptor_t *td, void **sptr, + const char *opt_mname, const void *buf_ptr, + size_t size) { + return xer_decode_primitive(opt_codec_ctx, td, + sptr, sizeof(OBJECT_IDENTIFIER_t), opt_mname, + buf_ptr, size, OBJECT_IDENTIFIER__xer_body_decode); +} + +asn_enc_rval_t +OBJECT_IDENTIFIER_encode_xer(const asn_TYPE_descriptor_t *td, const void *sptr, + int ilevel, enum xer_encoder_flags_e flags, + asn_app_consume_bytes_f *cb, void *app_key) { + const OBJECT_IDENTIFIER_t *st = (const OBJECT_IDENTIFIER_t *)sptr; + asn_enc_rval_t er = {0,0,0}; + + (void)ilevel; + (void)flags; + + if(!st || !st->buf) { + ASN__ENCODE_FAILED; + } + + er.encoded = OBJECT_IDENTIFIER__dump_body(st, cb, app_key); + if(er.encoded < 0) ASN__ENCODE_FAILED; + + ASN__ENCODED_OK(er); +} diff --git a/certgen/asncodec/OCTET_STRING.c b/certgen/asncodec/OCTET_STRING.c index d0bdeade72fd55119e543542ab33ff1a452f0489..4a1157d4c59e464cf11ddbcbb96f5985c3700c99 100644 --- a/certgen/asncodec/OCTET_STRING.c +++ b/certgen/asncodec/OCTET_STRING.c @@ -1,383 +1,383 @@ -/*- - * Copyright (c) 2003-2017 Lev Walkin . - * All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include -#include - -/* - * OCTET STRING basic type description. - */ -static const ber_tlv_tag_t asn_DEF_OCTET_STRING_tags[] = { - (ASN_TAG_CLASS_UNIVERSAL | (4 << 2)) -}; -asn_OCTET_STRING_specifics_t asn_SPC_OCTET_STRING_specs = { - sizeof(OCTET_STRING_t), - offsetof(OCTET_STRING_t, _asn_ctx), - ASN_OSUBV_STR -}; -asn_TYPE_operation_t asn_OP_OCTET_STRING = { - OCTET_STRING_free, -#if !defined(ASN_DISABLE_PRINT_SUPPORT) - OCTET_STRING_print, /* OCTET STRING generally means a non-ascii sequence */ -#else - 0, -#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ - OCTET_STRING_compare, -#if !defined(ASN_DISABLE_BER_SUPPORT) - OCTET_STRING_decode_ber, - OCTET_STRING_encode_der, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ -#if !defined(ASN_DISABLE_XER_SUPPORT) - OCTET_STRING_decode_xer_hex, - OCTET_STRING_encode_xer, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ -#if !defined(ASN_DISABLE_JER_SUPPORT) - OCTET_STRING_encode_jer, -#else - 0, -#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ -#if !defined(ASN_DISABLE_OER_SUPPORT) - OCTET_STRING_decode_oer, - OCTET_STRING_encode_oer, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ -#if !defined(ASN_DISABLE_UPER_SUPPORT) - OCTET_STRING_decode_uper, /* Unaligned PER decoder */ - OCTET_STRING_encode_uper, /* Unaligned PER encoder */ -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ -#if !defined(ASN_DISABLE_APER_SUPPORT) - OCTET_STRING_decode_aper, /* Aligned PER decoder */ - OCTET_STRING_encode_aper, /* Aligned PER encoder */ -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ -#if !defined(ASN_DISABLE_RFILL_SUPPORT) - OCTET_STRING_random_fill, -#else - 0, -#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ - 0 /* Use generic outmost tag fetcher */ -}; -asn_TYPE_descriptor_t asn_DEF_OCTET_STRING = { - "OCTET STRING", /* Canonical name */ - "OCTET_STRING", /* XML tag name */ - &asn_OP_OCTET_STRING, - asn_DEF_OCTET_STRING_tags, - sizeof(asn_DEF_OCTET_STRING_tags) - / sizeof(asn_DEF_OCTET_STRING_tags[0]), - asn_DEF_OCTET_STRING_tags, /* Same as above */ - sizeof(asn_DEF_OCTET_STRING_tags) - / sizeof(asn_DEF_OCTET_STRING_tags[0]), - { -#if !defined(ASN_DISABLE_OER_SUPPORT) - 0, -#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ -#if !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) - 0, -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) */ - asn_generic_no_constraint - }, - 0, 0, /* No members */ - &asn_SPC_OCTET_STRING_specs -}; - -void -OCTET_STRING_free(const asn_TYPE_descriptor_t *td, void *sptr, - enum asn_struct_free_method method) { - OCTET_STRING_t *st = (OCTET_STRING_t *)sptr; - - if(!td || !st) - return; - - ASN_DEBUG("Freeing %s as OCTET STRING", td->name); - - if(st->buf) { - FREEMEM(st->buf); - st->buf = 0; - } - -#if !defined(ASN_DISABLE_BER_SUPPORT) - const asn_OCTET_STRING_specifics_t *specs; - asn_struct_ctx_t *ctx; - - specs = td->specifics - ? (const asn_OCTET_STRING_specifics_t *)td->specifics - : &asn_SPC_OCTET_STRING_specs; - ctx = (asn_struct_ctx_t *)((char *)st + specs->ctx_offset); - - /* - * Remove decode-time stack. - */ - struct _stack *stck; - stck = (struct _stack *)ctx->ptr; - if(stck) { - while(stck->tail) { - struct _stack_el *sel = stck->tail; - stck->tail = sel->prev; - FREEMEM(sel); - } - FREEMEM(stck); - } -#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ - - switch(method) { - case ASFM_FREE_EVERYTHING: - FREEMEM(sptr); - break; - case ASFM_FREE_UNDERLYING: - break; - case ASFM_FREE_UNDERLYING_AND_RESET: - memset(sptr, 0, - td->specifics - ? ((const asn_OCTET_STRING_specifics_t *)(td->specifics)) - ->struct_size - : sizeof(OCTET_STRING_t)); - break; - } -} - -/* - * Conversion routines. - */ -int -OCTET_STRING_fromBuf(OCTET_STRING_t *st, const char *str, int len) { - void *buf; - - if(st == 0 || (str == 0 && len)) { - errno = EINVAL; - return -1; - } - - /* - * Clear the OCTET STRING. - */ - if(str == NULL) { - FREEMEM(st->buf); - st->buf = 0; - st->size = 0; - return 0; - } - - /* Determine the original string size, if not explicitly given */ - if(len < 0) - len = strlen(str); - - /* Allocate and fill the memory */ - buf = MALLOC(len + 1); - if(buf == NULL) - return -1; - - memcpy(buf, str, len); - ((uint8_t *)buf)[len] = '\0'; /* Couldn't use memcpy(len+1)! */ - FREEMEM(st->buf); - st->buf = (uint8_t *)buf; - st->size = len; - - return 0; -} - -OCTET_STRING_t * -OCTET_STRING_new_fromBuf(const asn_TYPE_descriptor_t *td, const char *str, - int len) { - const asn_OCTET_STRING_specifics_t *specs = - td->specifics ? (const asn_OCTET_STRING_specifics_t *)td->specifics - : &asn_SPC_OCTET_STRING_specs; - OCTET_STRING_t *st; - - st = (OCTET_STRING_t *)CALLOC(1, specs->struct_size); - if(st && str && OCTET_STRING_fromBuf(st, str, len)) { - FREEMEM(st); - st = NULL; - } - - return st; -} - -/* - * Lexicographically compare the common prefix of both strings, - * and if it is the same return -1 for the smallest string. - */ -int -OCTET_STRING_compare(const asn_TYPE_descriptor_t *td, const void *aptr, - const void *bptr) { - const asn_OCTET_STRING_specifics_t *specs = td->specifics; - const OCTET_STRING_t *a = aptr; - const OCTET_STRING_t *b = bptr; - - (void)specs; - assert(!specs || specs->subvariant != ASN_OSUBV_BIT); - - if(a && b) { - size_t common_prefix_size = a->size <= b->size ? a->size : b->size; - int ret = memcmp(a->buf, b->buf, common_prefix_size); - if(ret == 0) { - /* Figure out which string with equal prefixes is longer. */ - if(a->size < b->size) { - return -1; - } else if(a->size > b->size) { - return 1; - } else { - return 0; - } - } else { - return ret < 0 ? -1 : 1; - } - } else if(!a && !b) { - return 0; - } else if(!a) { - return -1; - } else { - return 1; - } - -} - -#if !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) -int -OCTET_STRING_per_get_characters(asn_per_data_t *po, uint8_t *buf, - size_t units, unsigned int bpc, unsigned int unit_bits, - long lb, long ub, const asn_per_constraints_t *pc) { - uint8_t *end = buf + units * bpc; - - ASN_DEBUG("Expanding %d characters into (%ld..%ld):%d", - (int)units, lb, ub, unit_bits); - - /* X.691: 27.5.4 */ - if((unsigned long)ub <= ((unsigned long)2 << (unit_bits - 1))) { - /* Decode without translation */ - lb = 0; - } else if(pc && pc->code2value) { - if(unit_bits > 16) - return 1; /* FATAL: can't have constrained - * UniversalString with more than - * 16 million code points */ - for(; buf < end; buf += bpc) { - int value; - int code = per_get_few_bits(po, unit_bits); - if(code < 0) return -1; /* WMORE */ - value = pc->code2value(code); - if(value < 0) { - ASN_DEBUG("Code %d (0x%02x) is" - " not in map (%ld..%ld)", - code, code, lb, ub); - return 1; /* FATAL */ - } - switch(bpc) { - case 1: *buf = value; break; - case 2: buf[0] = value >> 8; buf[1] = value; break; - case 4: buf[0] = value >> 24; buf[1] = value >> 16; - buf[2] = value >> 8; buf[3] = value; break; - } - } - return 0; - } - - /* Shortcut the no-op copying to the aligned structure */ - if(lb == 0 && (unit_bits == 8 * bpc)) { - return per_get_many_bits(po, buf, 0, unit_bits * units); - } - - for(; buf < end; buf += bpc) { - int32_t code = per_get_few_bits(po, unit_bits); - int32_t ch = code + lb; - if(code < 0) return -1; /* WMORE */ - if(ch > ub) { - ASN_DEBUG("Code %d is out of range (%ld..%ld)", - ch, lb, ub); - return 1; /* FATAL */ - } - switch(bpc) { - case 1: *buf = ch; break; - case 2: buf[0] = ch >> 8; buf[1] = ch; break; - case 4: buf[0] = ch >> 24; buf[1] = ch >> 16; - buf[2] = ch >> 8; buf[3] = ch; break; - } - } - - return 0; -} - -int -OCTET_STRING_per_put_characters(asn_per_outp_t *po, const uint8_t *buf, - size_t units, unsigned int bpc, unsigned int unit_bits, - long lb, long ub, const asn_per_constraints_t *pc) { - const uint8_t *end = buf + units * bpc; - - ASN_DEBUG("Squeezing %d characters into (%ld..%ld):%d (%d bpc)", - (int)units, lb, ub, unit_bits, bpc); - - /* X.691: 27.5.4 */ - if((unsigned long)ub <= ((unsigned long)2 << (unit_bits - 1))) { - /* Encode as is */ - lb = 0; - } else if(pc && pc->value2code) { - for(; buf < end; buf += bpc) { - int code; - uint32_t value; - switch(bpc) { - case 1: value = *(const uint8_t *)buf; break; - case 2: value = (buf[0] << 8) | buf[1]; break; - case 4: value = (buf[0] << 24) | (buf[1] << 16) - | (buf[2] << 8) | buf[3]; break; - default: return -1; - } - code = pc->value2code(value); - if(code < 0) { - ASN_DEBUG("Character %d (0x%02x) is" - " not in map (%ld..%ld)", - *buf, *buf, lb, ub); - return -1; - } - if(per_put_few_bits(po, code, unit_bits)) - return -1; - } - } - - /* Shortcut the no-op copying to the aligned structure */ - if(lb == 0 && (unit_bits == 8 * bpc)) { - return per_put_many_bits(po, buf, unit_bits * units); - } - - for(ub -= lb; buf < end; buf += bpc) { - int ch; - uint32_t value; - switch(bpc) { - case 1: - value = *(const uint8_t *)buf; - break; - case 2: - value = (buf[0] << 8) | buf[1]; - break; - case 4: - value = (buf[0] << 24) | (buf[1] << 16) | (buf[2] << 8) | buf[3]; - break; - default: - return -1; - } - ch = value - lb; - if(ch < 0 || ch > ub) { - ASN_DEBUG("Character %d (0x%02x) is out of range (%ld..%ld)", *buf, - value, lb, ub + lb); - return -1; - } - if(per_put_few_bits(po, ch, unit_bits)) return -1; - } - - return 0; -} -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) */ +/*- + * Copyright (c) 2003-2017 Lev Walkin . + * All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include +#include + +/* + * OCTET STRING basic type description. + */ +static const ber_tlv_tag_t asn_DEF_OCTET_STRING_tags[] = { + (ASN_TAG_CLASS_UNIVERSAL | (4 << 2)) +}; +asn_OCTET_STRING_specifics_t asn_SPC_OCTET_STRING_specs = { + sizeof(OCTET_STRING_t), + offsetof(OCTET_STRING_t, _asn_ctx), + ASN_OSUBV_STR +}; +asn_TYPE_operation_t asn_OP_OCTET_STRING = { + OCTET_STRING_free, +#if !defined(ASN_DISABLE_PRINT_SUPPORT) + OCTET_STRING_print, /* OCTET STRING generally means a non-ascii sequence */ +#else + 0, +#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ + OCTET_STRING_compare, +#if !defined(ASN_DISABLE_BER_SUPPORT) + OCTET_STRING_decode_ber, + OCTET_STRING_encode_der, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ +#if !defined(ASN_DISABLE_XER_SUPPORT) + OCTET_STRING_decode_xer_hex, + OCTET_STRING_encode_xer, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ +#if !defined(ASN_DISABLE_JER_SUPPORT) + OCTET_STRING_encode_jer, +#else + 0, +#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ +#if !defined(ASN_DISABLE_OER_SUPPORT) + OCTET_STRING_decode_oer, + OCTET_STRING_encode_oer, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ +#if !defined(ASN_DISABLE_UPER_SUPPORT) + OCTET_STRING_decode_uper, /* Unaligned PER decoder */ + OCTET_STRING_encode_uper, /* Unaligned PER encoder */ +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ +#if !defined(ASN_DISABLE_APER_SUPPORT) + OCTET_STRING_decode_aper, /* Aligned PER decoder */ + OCTET_STRING_encode_aper, /* Aligned PER encoder */ +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ +#if !defined(ASN_DISABLE_RFILL_SUPPORT) + OCTET_STRING_random_fill, +#else + 0, +#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ + 0 /* Use generic outmost tag fetcher */ +}; +asn_TYPE_descriptor_t asn_DEF_OCTET_STRING = { + "OCTET STRING", /* Canonical name */ + "OCTET_STRING", /* XML tag name */ + &asn_OP_OCTET_STRING, + asn_DEF_OCTET_STRING_tags, + sizeof(asn_DEF_OCTET_STRING_tags) + / sizeof(asn_DEF_OCTET_STRING_tags[0]), + asn_DEF_OCTET_STRING_tags, /* Same as above */ + sizeof(asn_DEF_OCTET_STRING_tags) + / sizeof(asn_DEF_OCTET_STRING_tags[0]), + { +#if !defined(ASN_DISABLE_OER_SUPPORT) + 0, +#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ +#if !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) + 0, +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) */ + asn_generic_no_constraint + }, + 0, 0, /* No members */ + &asn_SPC_OCTET_STRING_specs +}; + +void +OCTET_STRING_free(const asn_TYPE_descriptor_t *td, void *sptr, + enum asn_struct_free_method method) { + OCTET_STRING_t *st = (OCTET_STRING_t *)sptr; + + if(!td || !st) + return; + + ASN_DEBUG("Freeing %s as OCTET STRING", td->name); + + if(st->buf) { + FREEMEM(st->buf); + st->buf = 0; + } + +#if !defined(ASN_DISABLE_BER_SUPPORT) + const asn_OCTET_STRING_specifics_t *specs; + asn_struct_ctx_t *ctx; + + specs = td->specifics + ? (const asn_OCTET_STRING_specifics_t *)td->specifics + : &asn_SPC_OCTET_STRING_specs; + ctx = (asn_struct_ctx_t *)((char *)st + specs->ctx_offset); + + /* + * Remove decode-time stack. + */ + struct _stack *stck; + stck = (struct _stack *)ctx->ptr; + if(stck) { + while(stck->tail) { + struct _stack_el *sel = stck->tail; + stck->tail = sel->prev; + FREEMEM(sel); + } + FREEMEM(stck); + } +#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ + + switch(method) { + case ASFM_FREE_EVERYTHING: + FREEMEM(sptr); + break; + case ASFM_FREE_UNDERLYING: + break; + case ASFM_FREE_UNDERLYING_AND_RESET: + memset(sptr, 0, + td->specifics + ? ((const asn_OCTET_STRING_specifics_t *)(td->specifics)) + ->struct_size + : sizeof(OCTET_STRING_t)); + break; + } +} + +/* + * Conversion routines. + */ +int +OCTET_STRING_fromBuf(OCTET_STRING_t *st, const char *str, int len) { + void *buf; + + if(st == 0 || (str == 0 && len)) { + errno = EINVAL; + return -1; + } + + /* + * Clear the OCTET STRING. + */ + if(str == NULL) { + FREEMEM(st->buf); + st->buf = 0; + st->size = 0; + return 0; + } + + /* Determine the original string size, if not explicitly given */ + if(len < 0) + len = strlen(str); + + /* Allocate and fill the memory */ + buf = MALLOC(len + 1); + if(buf == NULL) + return -1; + + memcpy(buf, str, len); + ((uint8_t *)buf)[len] = '\0'; /* Couldn't use memcpy(len+1)! */ + FREEMEM(st->buf); + st->buf = (uint8_t *)buf; + st->size = len; + + return 0; +} + +OCTET_STRING_t * +OCTET_STRING_new_fromBuf(const asn_TYPE_descriptor_t *td, const char *str, + int len) { + const asn_OCTET_STRING_specifics_t *specs = + td->specifics ? (const asn_OCTET_STRING_specifics_t *)td->specifics + : &asn_SPC_OCTET_STRING_specs; + OCTET_STRING_t *st; + + st = (OCTET_STRING_t *)CALLOC(1, specs->struct_size); + if(st && str && OCTET_STRING_fromBuf(st, str, len)) { + FREEMEM(st); + st = NULL; + } + + return st; +} + +/* + * Lexicographically compare the common prefix of both strings, + * and if it is the same return -1 for the smallest string. + */ +int +OCTET_STRING_compare(const asn_TYPE_descriptor_t *td, const void *aptr, + const void *bptr) { + const asn_OCTET_STRING_specifics_t *specs = td->specifics; + const OCTET_STRING_t *a = aptr; + const OCTET_STRING_t *b = bptr; + + (void)specs; + assert(!specs || specs->subvariant != ASN_OSUBV_BIT); + + if(a && b) { + size_t common_prefix_size = a->size <= b->size ? a->size : b->size; + int ret = memcmp(a->buf, b->buf, common_prefix_size); + if(ret == 0) { + /* Figure out which string with equal prefixes is longer. */ + if(a->size < b->size) { + return -1; + } else if(a->size > b->size) { + return 1; + } else { + return 0; + } + } else { + return ret < 0 ? -1 : 1; + } + } else if(!a && !b) { + return 0; + } else if(!a) { + return -1; + } else { + return 1; + } + +} + +#if !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) +int +OCTET_STRING_per_get_characters(asn_per_data_t *po, uint8_t *buf, + size_t units, unsigned int bpc, unsigned int unit_bits, + long lb, long ub, const asn_per_constraints_t *pc) { + uint8_t *end = buf + units * bpc; + + ASN_DEBUG("Expanding %d characters into (%ld..%ld):%d", + (int)units, lb, ub, unit_bits); + + /* X.691: 27.5.4 */ + if((unsigned long)ub <= ((unsigned long)2 << (unit_bits - 1))) { + /* Decode without translation */ + lb = 0; + } else if(pc && pc->code2value) { + if(unit_bits > 16) + return 1; /* FATAL: can't have constrained + * UniversalString with more than + * 16 million code points */ + for(; buf < end; buf += bpc) { + int value; + int code = per_get_few_bits(po, unit_bits); + if(code < 0) return -1; /* WMORE */ + value = pc->code2value(code); + if(value < 0) { + ASN_DEBUG("Code %d (0x%02x) is" + " not in map (%ld..%ld)", + code, code, lb, ub); + return 1; /* FATAL */ + } + switch(bpc) { + case 1: *buf = value; break; + case 2: buf[0] = value >> 8; buf[1] = value; break; + case 4: buf[0] = value >> 24; buf[1] = value >> 16; + buf[2] = value >> 8; buf[3] = value; break; + } + } + return 0; + } + + /* Shortcut the no-op copying to the aligned structure */ + if(lb == 0 && (unit_bits == 8 * bpc)) { + return per_get_many_bits(po, buf, 0, unit_bits * units); + } + + for(; buf < end; buf += bpc) { + int32_t code = per_get_few_bits(po, unit_bits); + int32_t ch = code + lb; + if(code < 0) return -1; /* WMORE */ + if(ch > ub) { + ASN_DEBUG("Code %d is out of range (%ld..%ld)", + ch, lb, ub); + return 1; /* FATAL */ + } + switch(bpc) { + case 1: *buf = ch; break; + case 2: buf[0] = ch >> 8; buf[1] = ch; break; + case 4: buf[0] = ch >> 24; buf[1] = ch >> 16; + buf[2] = ch >> 8; buf[3] = ch; break; + } + } + + return 0; +} + +int +OCTET_STRING_per_put_characters(asn_per_outp_t *po, const uint8_t *buf, + size_t units, unsigned int bpc, unsigned int unit_bits, + long lb, long ub, const asn_per_constraints_t *pc) { + const uint8_t *end = buf + units * bpc; + + ASN_DEBUG("Squeezing %d characters into (%ld..%ld):%d (%d bpc)", + (int)units, lb, ub, unit_bits, bpc); + + /* X.691: 27.5.4 */ + if((unsigned long)ub <= ((unsigned long)2 << (unit_bits - 1))) { + /* Encode as is */ + lb = 0; + } else if(pc && pc->value2code) { + for(; buf < end; buf += bpc) { + int code; + uint32_t value; + switch(bpc) { + case 1: value = *(const uint8_t *)buf; break; + case 2: value = (buf[0] << 8) | buf[1]; break; + case 4: value = (buf[0] << 24) | (buf[1] << 16) + | (buf[2] << 8) | buf[3]; break; + default: return -1; + } + code = pc->value2code(value); + if(code < 0) { + ASN_DEBUG("Character %d (0x%02x) is" + " not in map (%ld..%ld)", + *buf, *buf, lb, ub); + return -1; + } + if(per_put_few_bits(po, code, unit_bits)) + return -1; + } + } + + /* Shortcut the no-op copying to the aligned structure */ + if(lb == 0 && (unit_bits == 8 * bpc)) { + return per_put_many_bits(po, buf, unit_bits * units); + } + + for(ub -= lb; buf < end; buf += bpc) { + int ch; + uint32_t value; + switch(bpc) { + case 1: + value = *(const uint8_t *)buf; + break; + case 2: + value = (buf[0] << 8) | buf[1]; + break; + case 4: + value = (buf[0] << 24) | (buf[1] << 16) | (buf[2] << 8) | buf[3]; + break; + default: + return -1; + } + ch = value - lb; + if(ch < 0 || ch > ub) { + ASN_DEBUG("Character %d (0x%02x) is out of range (%ld..%ld)", *buf, + value, lb, ub + lb); + return -1; + } + if(per_put_few_bits(po, ch, unit_bits)) return -1; + } + + return 0; +} +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) */ diff --git a/certgen/asncodec/OCTET_STRING.h b/certgen/asncodec/OCTET_STRING.h index b1ace1409e0672907522bf4c7d334ec97d8084de..7f563b0ff57a5800091b3953112c86c190d49870 100644 --- a/certgen/asncodec/OCTET_STRING.h +++ b/certgen/asncodec/OCTET_STRING.h @@ -1,165 +1,165 @@ -/*- - * Copyright (c) 2003-2017 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#ifndef _OCTET_STRING_H_ -#define _OCTET_STRING_H_ - -#include - -#ifdef __cplusplus -extern "C" { -#endif - -typedef struct OCTET_STRING { - uint8_t *buf; /* Buffer with consecutive OCTET_STRING bits */ - size_t size; /* Size of the buffer */ - - asn_struct_ctx_t _asn_ctx; /* Parsing across buffer boundaries */ -} OCTET_STRING_t; - -extern asn_TYPE_descriptor_t asn_DEF_OCTET_STRING; -extern asn_TYPE_operation_t asn_OP_OCTET_STRING; - -asn_struct_free_f OCTET_STRING_free; - -#if !defined(ASN_DISABLE_PRINT_SUPPORT) -asn_struct_print_f OCTET_STRING_print; -asn_struct_print_f OCTET_STRING_print_utf8; -#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ - -asn_struct_compare_f OCTET_STRING_compare; - -#define OCTET_STRING_constraint asn_generic_no_constraint - -#if !defined(ASN_DISABLE_BER_SUPPORT) -ber_type_decoder_f OCTET_STRING_decode_ber; -der_type_encoder_f OCTET_STRING_encode_der; -#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ - -#if !defined(ASN_DISABLE_XER_SUPPORT) -xer_type_decoder_f OCTET_STRING_decode_xer_hex; /* Hexadecimal */ -xer_type_decoder_f OCTET_STRING_decode_xer_binary; /* 01010111010 */ -xer_type_decoder_f OCTET_STRING_decode_xer_utf8; /* ASCII/UTF-8 */ -xer_type_encoder_f OCTET_STRING_encode_xer; -xer_type_encoder_f OCTET_STRING_encode_xer_utf8; -#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ - -#if !defined(ASN_DISABLE_JER_SUPPORT) -jer_type_encoder_f OCTET_STRING_encode_jer; -jer_type_encoder_f OCTET_STRING_encode_jer_utf8; -#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ - -#if !defined(ASN_DISABLE_OER_SUPPORT) -oer_type_decoder_f OCTET_STRING_decode_oer; -oer_type_encoder_f OCTET_STRING_encode_oer; -#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ - -#if !defined(ASN_DISABLE_UPER_SUPPORT) -per_type_decoder_f OCTET_STRING_decode_uper; -per_type_encoder_f OCTET_STRING_encode_uper; -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ -#if !defined(ASN_DISABLE_APER_SUPPORT) -per_type_decoder_f OCTET_STRING_decode_aper; -per_type_encoder_f OCTET_STRING_encode_aper; -#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ - -#if !defined(ASN_DISABLE_RFILL_SUPPORT) -asn_random_fill_f OCTET_STRING_random_fill; -#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ - -#if !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) -int OCTET_STRING_per_get_characters( - asn_per_data_t *po, - uint8_t *buf, - size_t units, - unsigned int bpc, - unsigned int unit_bits, - long lb, - long ub, - const asn_per_constraints_t *pc); - -int OCTET_STRING_per_put_characters( - asn_per_outp_t *po, - const uint8_t *buf, - size_t units, - unsigned int bpc, - unsigned int unit_bits, - long lb, - long ub, - const asn_per_constraints_t *pc); -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) */ -/****************************** - * Handy conversion routines. * - ******************************/ - -/* - * This function clears the previous value of the OCTET STRING (if any) - * and then allocates a new memory with the specified content (str/size). - * If size = -1, the size of the original string will be determined - * using strlen(str). - * If str equals to NULL, the function will silently clear the - * current contents of the OCTET STRING. - * Returns 0 if it was possible to perform operation, -1 otherwise. - */ -int OCTET_STRING_fromBuf(OCTET_STRING_t *s, const char *str, int size); - -/* Handy conversion from the C string into the OCTET STRING. */ -#define OCTET_STRING_fromString(s, str) OCTET_STRING_fromBuf(s, str, -1) - -/* - * Allocate and fill the new OCTET STRING and return a pointer to the newly - * allocated object. NULL is permitted in str: the function will just allocate - * empty OCTET STRING. - */ -OCTET_STRING_t *OCTET_STRING_new_fromBuf(const asn_TYPE_descriptor_t *td, - const char *str, int size); - -/**************************** - * Internally useful stuff. * - ****************************/ - -typedef struct asn_OCTET_STRING_specifics_s { - /* - * Target structure description. - */ - unsigned struct_size; /* Size of the structure */ - unsigned ctx_offset; /* Offset of the asn_struct_ctx_t member */ - - enum asn_OS_Subvariant { - ASN_OSUBV_ANY, /* The open type (ANY) */ - ASN_OSUBV_BIT, /* BIT STRING */ - ASN_OSUBV_STR, /* String types, not {BMP,Universal}String */ - ASN_OSUBV_U16, /* 16-bit character (BMPString) */ - ASN_OSUBV_U32 /* 32-bit character (UniversalString) */ - } subvariant; -} asn_OCTET_STRING_specifics_t; - -extern asn_OCTET_STRING_specifics_t asn_SPC_OCTET_STRING_specs; - -size_t OCTET_STRING_random_length_constrained( - const asn_TYPE_descriptor_t *, const asn_encoding_constraints_t *, - size_t max_length); - -#if !defined(ASN_DISABLE_BER_SUPPORT) -struct _stack_el { - ber_tlv_len_t left; /* What's left to read (or -1) */ - ber_tlv_len_t got; /* What was actually processed */ - unsigned cont_level; /* Depth of subcontainment */ - int want_nulls; /* Want null "end of content" octets? */ - int bits_chopped; /* Flag in BIT STRING mode */ - ber_tlv_tag_t tag; /* For debugging purposes */ - struct _stack_el *prev; - struct _stack_el *next; -}; -struct _stack { - struct _stack_el *tail; - struct _stack_el *cur_ptr; -}; -#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ - -#ifdef __cplusplus -} -#endif - -#endif /* _OCTET_STRING_H_ */ +/*- + * Copyright (c) 2003-2017 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#ifndef _OCTET_STRING_H_ +#define _OCTET_STRING_H_ + +#include + +#ifdef __cplusplus +extern "C" { +#endif + +typedef struct OCTET_STRING { + uint8_t *buf; /* Buffer with consecutive OCTET_STRING bits */ + size_t size; /* Size of the buffer */ + + asn_struct_ctx_t _asn_ctx; /* Parsing across buffer boundaries */ +} OCTET_STRING_t; + +extern asn_TYPE_descriptor_t asn_DEF_OCTET_STRING; +extern asn_TYPE_operation_t asn_OP_OCTET_STRING; + +asn_struct_free_f OCTET_STRING_free; + +#if !defined(ASN_DISABLE_PRINT_SUPPORT) +asn_struct_print_f OCTET_STRING_print; +asn_struct_print_f OCTET_STRING_print_utf8; +#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ + +asn_struct_compare_f OCTET_STRING_compare; + +#define OCTET_STRING_constraint asn_generic_no_constraint + +#if !defined(ASN_DISABLE_BER_SUPPORT) +ber_type_decoder_f OCTET_STRING_decode_ber; +der_type_encoder_f OCTET_STRING_encode_der; +#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ + +#if !defined(ASN_DISABLE_XER_SUPPORT) +xer_type_decoder_f OCTET_STRING_decode_xer_hex; /* Hexadecimal */ +xer_type_decoder_f OCTET_STRING_decode_xer_binary; /* 01010111010 */ +xer_type_decoder_f OCTET_STRING_decode_xer_utf8; /* ASCII/UTF-8 */ +xer_type_encoder_f OCTET_STRING_encode_xer; +xer_type_encoder_f OCTET_STRING_encode_xer_utf8; +#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ + +#if !defined(ASN_DISABLE_JER_SUPPORT) +jer_type_encoder_f OCTET_STRING_encode_jer; +jer_type_encoder_f OCTET_STRING_encode_jer_utf8; +#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ + +#if !defined(ASN_DISABLE_OER_SUPPORT) +oer_type_decoder_f OCTET_STRING_decode_oer; +oer_type_encoder_f OCTET_STRING_encode_oer; +#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ + +#if !defined(ASN_DISABLE_UPER_SUPPORT) +per_type_decoder_f OCTET_STRING_decode_uper; +per_type_encoder_f OCTET_STRING_encode_uper; +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ +#if !defined(ASN_DISABLE_APER_SUPPORT) +per_type_decoder_f OCTET_STRING_decode_aper; +per_type_encoder_f OCTET_STRING_encode_aper; +#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ + +#if !defined(ASN_DISABLE_RFILL_SUPPORT) +asn_random_fill_f OCTET_STRING_random_fill; +#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ + +#if !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) +int OCTET_STRING_per_get_characters( + asn_per_data_t *po, + uint8_t *buf, + size_t units, + unsigned int bpc, + unsigned int unit_bits, + long lb, + long ub, + const asn_per_constraints_t *pc); + +int OCTET_STRING_per_put_characters( + asn_per_outp_t *po, + const uint8_t *buf, + size_t units, + unsigned int bpc, + unsigned int unit_bits, + long lb, + long ub, + const asn_per_constraints_t *pc); +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) */ +/****************************** + * Handy conversion routines. * + ******************************/ + +/* + * This function clears the previous value of the OCTET STRING (if any) + * and then allocates a new memory with the specified content (str/size). + * If size = -1, the size of the original string will be determined + * using strlen(str). + * If str equals to NULL, the function will silently clear the + * current contents of the OCTET STRING. + * Returns 0 if it was possible to perform operation, -1 otherwise. + */ +int OCTET_STRING_fromBuf(OCTET_STRING_t *s, const char *str, int size); + +/* Handy conversion from the C string into the OCTET STRING. */ +#define OCTET_STRING_fromString(s, str) OCTET_STRING_fromBuf(s, str, -1) + +/* + * Allocate and fill the new OCTET STRING and return a pointer to the newly + * allocated object. NULL is permitted in str: the function will just allocate + * empty OCTET STRING. + */ +OCTET_STRING_t *OCTET_STRING_new_fromBuf(const asn_TYPE_descriptor_t *td, + const char *str, int size); + +/**************************** + * Internally useful stuff. * + ****************************/ + +typedef struct asn_OCTET_STRING_specifics_s { + /* + * Target structure description. + */ + unsigned struct_size; /* Size of the structure */ + unsigned ctx_offset; /* Offset of the asn_struct_ctx_t member */ + + enum asn_OS_Subvariant { + ASN_OSUBV_ANY, /* The open type (ANY) */ + ASN_OSUBV_BIT, /* BIT STRING */ + ASN_OSUBV_STR, /* String types, not {BMP,Universal}String */ + ASN_OSUBV_U16, /* 16-bit character (BMPString) */ + ASN_OSUBV_U32 /* 32-bit character (UniversalString) */ + } subvariant; +} asn_OCTET_STRING_specifics_t; + +extern asn_OCTET_STRING_specifics_t asn_SPC_OCTET_STRING_specs; + +size_t OCTET_STRING_random_length_constrained( + const asn_TYPE_descriptor_t *, const asn_encoding_constraints_t *, + size_t max_length); + +#if !defined(ASN_DISABLE_BER_SUPPORT) +struct _stack_el { + ber_tlv_len_t left; /* What's left to read (or -1) */ + ber_tlv_len_t got; /* What was actually processed */ + unsigned cont_level; /* Depth of subcontainment */ + int want_nulls; /* Want null "end of content" octets? */ + int bits_chopped; /* Flag in BIT STRING mode */ + ber_tlv_tag_t tag; /* For debugging purposes */ + struct _stack_el *prev; + struct _stack_el *next; +}; +struct _stack { + struct _stack_el *tail; + struct _stack_el *cur_ptr; +}; +#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ + +#ifdef __cplusplus +} +#endif + +#endif /* _OCTET_STRING_H_ */ diff --git a/certgen/asncodec/OCTET_STRING_oer.c b/certgen/asncodec/OCTET_STRING_oer.c index e69d0a6a4f439e2703772f413f3407aecaf88508..749e7c73769f3c684459d6d3ef4dbb6d9ea32b6b 100644 --- a/certgen/asncodec/OCTET_STRING_oer.c +++ b/certgen/asncodec/OCTET_STRING_oer.c @@ -1,166 +1,166 @@ -/* - * Copyright (c) 2017 Lev Walkin . - * All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include - -asn_dec_rval_t -OCTET_STRING_decode_oer(const asn_codec_ctx_t *opt_codec_ctx, - const asn_TYPE_descriptor_t *td, - const asn_oer_constraints_t *constraints, void **sptr, - const void *ptr, size_t size) { - const asn_OCTET_STRING_specifics_t *specs = - td->specifics ? (const asn_OCTET_STRING_specifics_t *)td->specifics - : &asn_SPC_OCTET_STRING_specs; - OCTET_STRING_t *st = (OCTET_STRING_t *)*sptr; - const asn_oer_constraints_t *cts = - constraints ? constraints : td->encoding_constraints.oer_constraints; - ssize_t ct_size = cts ? cts->size : -1; - asn_dec_rval_t rval = {RC_OK, 0}; - size_t expected_length = 0; - - size_t unit_bytes; - switch(specs->subvariant) { - default: - case ASN_OSUBV_BIT: - ASN_DEBUG("Invalid use of OCTET STRING to decode BIT STRING"); - ASN__DECODE_FAILED; - case ASN_OSUBV_ANY: - /* Fall through */ - case ASN_OSUBV_STR: - unit_bytes = 1; - break; - case ASN_OSUBV_U16: - unit_bytes = 2; - break; - case ASN_OSUBV_U32: - unit_bytes = 4; - break; - } - - (void)opt_codec_ctx; - - if(!st) { - st = (OCTET_STRING_t *)(*sptr = CALLOC(1, specs->struct_size)); - if(!st) ASN__DECODE_FAILED; - } - - if(ct_size >= 0) { - expected_length = unit_bytes * ct_size; - } else { - /* - * X.696 (08/2015) #27.2 - * Encode length determinant as _number of octets_, but only - * if upper bound is not equal to lower bound. - */ - ssize_t len_len = oer_fetch_length(ptr, size, &expected_length); - if(len_len > 0) { - rval.consumed = len_len; - ptr = (const char *)ptr + len_len; - size -= len_len; - } else if(len_len == 0) { - ASN__DECODE_STARVED; - } else if(len_len < 0) { - ASN__DECODE_FAILED; - } - - if(expected_length % unit_bytes != 0) { - ASN_DEBUG( - "Data size %" ASN_PRI_SIZE " bytes is not consistent with multiplier %" ASN_PRI_SIZE "", - expected_length, unit_bytes); - ASN__DECODE_FAILED; - } - } - - if(size < expected_length) { - ASN__DECODE_STARVED; - } else { - uint8_t *buf = MALLOC(expected_length + 1); - if(buf == NULL) { - ASN__DECODE_FAILED; - } else { - memcpy(buf, ptr, expected_length); - buf[expected_length] = '\0'; - } - FREEMEM(st->buf); - st->buf = buf; - st->size = expected_length; - - rval.consumed += expected_length; - return rval; - } -} - -/* - * Encode as Canonical OER. - */ -asn_enc_rval_t -OCTET_STRING_encode_oer(const asn_TYPE_descriptor_t *td, - const asn_oer_constraints_t *constraints, - const void *sptr, asn_app_consume_bytes_f *cb, - void *app_key) { - const asn_OCTET_STRING_specifics_t *specs = - td->specifics ? (const asn_OCTET_STRING_specifics_t *)td->specifics - : &asn_SPC_OCTET_STRING_specs; - const OCTET_STRING_t *st = (const OCTET_STRING_t *)sptr; - const asn_oer_constraints_t *cts = - constraints ? constraints : td->encoding_constraints.oer_constraints; - ssize_t ct_size = cts ? cts->size : -1; - asn_enc_rval_t er = {0, 0, 0}; - - if(!st) ASN__ENCODE_FAILED; - - ASN_DEBUG("Encoding %s %" ASN_PRI_SIZE " as OCTET STRING", td ? td->name : "", st->size); - - if(ct_size >= 0) { - /* - * Check that available data matches the constraint - */ - size_t unit_bytes; - switch(specs->subvariant) { - default: - case ASN_OSUBV_BIT: - ASN_DEBUG("Invalid use of OCTET STRING to encode BIT STRING"); - ASN__ENCODE_FAILED; - case ASN_OSUBV_ANY: - /* Fall through */ - case ASN_OSUBV_STR: - unit_bytes = 1; - break; - case ASN_OSUBV_U16: - unit_bytes = 2; - break; - case ASN_OSUBV_U32: - unit_bytes = 4; - break; - } - - if(st->size != unit_bytes * (size_t)ct_size) { - ASN_DEBUG( - "Trying to encode %s (%" ASN_PRI_SIZE " bytes) which doesn't fit SIZE " - "constraint (%" ASN_PRI_SIZE ")", - td->name, st->size, ct_size); - ASN__ENCODE_FAILED; - } - } else { - /* - * X.696 (08/2015) #27.2 - * Encode length determinant as _number of octets_, but only - * if upper bound is not equal to lower bound. - */ - ssize_t ret = oer_serialize_length(st->size, cb, app_key); - if(ret < 0) { - ASN__ENCODE_FAILED; - } - er.encoded += ret; - } - - er.encoded += st->size; - if(cb(st->buf, st->size, app_key) < 0) { - ASN__ENCODE_FAILED; - } else { - ASN__ENCODED_OK(er); - } -} +/* + * Copyright (c) 2017 Lev Walkin . + * All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include + +asn_dec_rval_t +OCTET_STRING_decode_oer(const asn_codec_ctx_t *opt_codec_ctx, + const asn_TYPE_descriptor_t *td, + const asn_oer_constraints_t *constraints, void **sptr, + const void *ptr, size_t size) { + const asn_OCTET_STRING_specifics_t *specs = + td->specifics ? (const asn_OCTET_STRING_specifics_t *)td->specifics + : &asn_SPC_OCTET_STRING_specs; + OCTET_STRING_t *st = (OCTET_STRING_t *)*sptr; + const asn_oer_constraints_t *cts = + constraints ? constraints : td->encoding_constraints.oer_constraints; + ssize_t ct_size = cts ? cts->size : -1; + asn_dec_rval_t rval = {RC_OK, 0}; + size_t expected_length = 0; + + size_t unit_bytes; + switch(specs->subvariant) { + default: + case ASN_OSUBV_BIT: + ASN_DEBUG("Invalid use of OCTET STRING to decode BIT STRING"); + ASN__DECODE_FAILED; + case ASN_OSUBV_ANY: + /* Fall through */ + case ASN_OSUBV_STR: + unit_bytes = 1; + break; + case ASN_OSUBV_U16: + unit_bytes = 2; + break; + case ASN_OSUBV_U32: + unit_bytes = 4; + break; + } + + (void)opt_codec_ctx; + + if(!st) { + st = (OCTET_STRING_t *)(*sptr = CALLOC(1, specs->struct_size)); + if(!st) ASN__DECODE_FAILED; + } + + if(ct_size >= 0) { + expected_length = unit_bytes * ct_size; + } else { + /* + * X.696 (08/2015) #27.2 + * Encode length determinant as _number of octets_, but only + * if upper bound is not equal to lower bound. + */ + ssize_t len_len = oer_fetch_length(ptr, size, &expected_length); + if(len_len > 0) { + rval.consumed = len_len; + ptr = (const char *)ptr + len_len; + size -= len_len; + } else if(len_len == 0) { + ASN__DECODE_STARVED; + } else if(len_len < 0) { + ASN__DECODE_FAILED; + } + + if(expected_length % unit_bytes != 0) { + ASN_DEBUG( + "Data size %" ASN_PRI_SIZE " bytes is not consistent with multiplier %" ASN_PRI_SIZE "", + expected_length, unit_bytes); + ASN__DECODE_FAILED; + } + } + + if(size < expected_length) { + ASN__DECODE_STARVED; + } else { + uint8_t *buf = MALLOC(expected_length + 1); + if(buf == NULL) { + ASN__DECODE_FAILED; + } else { + memcpy(buf, ptr, expected_length); + buf[expected_length] = '\0'; + } + FREEMEM(st->buf); + st->buf = buf; + st->size = expected_length; + + rval.consumed += expected_length; + return rval; + } +} + +/* + * Encode as Canonical OER. + */ +asn_enc_rval_t +OCTET_STRING_encode_oer(const asn_TYPE_descriptor_t *td, + const asn_oer_constraints_t *constraints, + const void *sptr, asn_app_consume_bytes_f *cb, + void *app_key) { + const asn_OCTET_STRING_specifics_t *specs = + td->specifics ? (const asn_OCTET_STRING_specifics_t *)td->specifics + : &asn_SPC_OCTET_STRING_specs; + const OCTET_STRING_t *st = (const OCTET_STRING_t *)sptr; + const asn_oer_constraints_t *cts = + constraints ? constraints : td->encoding_constraints.oer_constraints; + ssize_t ct_size = cts ? cts->size : -1; + asn_enc_rval_t er = {0, 0, 0}; + + if(!st) ASN__ENCODE_FAILED; + + ASN_DEBUG("Encoding %s %" ASN_PRI_SIZE " as OCTET STRING", td ? td->name : "", st->size); + + if(ct_size >= 0) { + /* + * Check that available data matches the constraint + */ + size_t unit_bytes; + switch(specs->subvariant) { + default: + case ASN_OSUBV_BIT: + ASN_DEBUG("Invalid use of OCTET STRING to encode BIT STRING"); + ASN__ENCODE_FAILED; + case ASN_OSUBV_ANY: + /* Fall through */ + case ASN_OSUBV_STR: + unit_bytes = 1; + break; + case ASN_OSUBV_U16: + unit_bytes = 2; + break; + case ASN_OSUBV_U32: + unit_bytes = 4; + break; + } + + if(st->size != unit_bytes * (size_t)ct_size) { + ASN_DEBUG( + "Trying to encode %s (%" ASN_PRI_SIZE " bytes) which doesn't fit SIZE " + "constraint (%" ASN_PRI_SIZE ")", + td->name, st->size, ct_size); + ASN__ENCODE_FAILED; + } + } else { + /* + * X.696 (08/2015) #27.2 + * Encode length determinant as _number of octets_, but only + * if upper bound is not equal to lower bound. + */ + ssize_t ret = oer_serialize_length(st->size, cb, app_key); + if(ret < 0) { + ASN__ENCODE_FAILED; + } + er.encoded += ret; + } + + er.encoded += st->size; + if(cb(st->buf, st->size, app_key) < 0) { + ASN__ENCODE_FAILED; + } else { + ASN__ENCODED_OK(er); + } +} diff --git a/certgen/asncodec/OCTET_STRING_print.c b/certgen/asncodec/OCTET_STRING_print.c index 6daa33e9f2c5e813e335190faae3032820decc64..4b581bd843d0e6214a49e45f0186e5e4eaedbf15 100644 --- a/certgen/asncodec/OCTET_STRING_print.c +++ b/certgen/asncodec/OCTET_STRING_print.c @@ -1,65 +1,65 @@ -/* - * Copyright (c) 2017 Lev Walkin . - * All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include - -int -OCTET_STRING_print(const asn_TYPE_descriptor_t *td, const void *sptr, - int ilevel, asn_app_consume_bytes_f *cb, void *app_key) { - const char * const h2c = "0123456789ABCDEF"; - const OCTET_STRING_t *st = (const OCTET_STRING_t *)sptr; - char scratch[16 * 3 + 4]; - char *p = scratch; - uint8_t *buf; - uint8_t *end; - size_t i; - - (void)td; /* Unused argument */ - - if(!st || (!st->buf && st->size)) - return (cb("", 8, app_key) < 0) ? -1 : 0; - - /* - * Dump the contents of the buffer in hexadecimal. - */ - buf = st->buf; - end = (buf == NULL)? NULL : buf + st->size; - for(i = 0; buf < end; buf++, i++) { - if(!(i % 16) && (i || st->size > 16)) { - if(cb(scratch, p - scratch, app_key) < 0) - return -1; - _i_INDENT(1); - p = scratch; - } - *p++ = h2c[(*buf >> 4) & 0x0F]; - *p++ = h2c[*buf & 0x0F]; - *p++ = 0x20; - } - - if(p > scratch) { - p--; /* Remove the tail space */ - if(cb(scratch, p - scratch, app_key) < 0) - return -1; - } - - return 0; -} - -int -OCTET_STRING_print_utf8(const asn_TYPE_descriptor_t *td, const void *sptr, - int ilevel, asn_app_consume_bytes_f *cb, - void *app_key) { - const OCTET_STRING_t *st = (const OCTET_STRING_t *)sptr; - - (void)td; /* Unused argument */ - (void)ilevel; /* Unused argument */ - - if(st && (st->buf || !st->size)) { - return (cb(st->buf, st->size, app_key) < 0) ? -1 : 0; - } else { - return (cb("", 8, app_key) < 0) ? -1 : 0; - } -} +/* + * Copyright (c) 2017 Lev Walkin . + * All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include + +int +OCTET_STRING_print(const asn_TYPE_descriptor_t *td, const void *sptr, + int ilevel, asn_app_consume_bytes_f *cb, void *app_key) { + const char * const h2c = "0123456789ABCDEF"; + const OCTET_STRING_t *st = (const OCTET_STRING_t *)sptr; + char scratch[16 * 3 + 4]; + char *p = scratch; + uint8_t *buf; + uint8_t *end; + size_t i; + + (void)td; /* Unused argument */ + + if(!st || (!st->buf && st->size)) + return (cb("", 8, app_key) < 0) ? -1 : 0; + + /* + * Dump the contents of the buffer in hexadecimal. + */ + buf = st->buf; + end = (buf == NULL)? NULL : buf + st->size; + for(i = 0; buf < end; buf++, i++) { + if(!(i % 16) && (i || st->size > 16)) { + if(cb(scratch, p - scratch, app_key) < 0) + return -1; + _i_INDENT(1); + p = scratch; + } + *p++ = h2c[(*buf >> 4) & 0x0F]; + *p++ = h2c[*buf & 0x0F]; + *p++ = 0x20; + } + + if(p > scratch) { + p--; /* Remove the tail space */ + if(cb(scratch, p - scratch, app_key) < 0) + return -1; + } + + return 0; +} + +int +OCTET_STRING_print_utf8(const asn_TYPE_descriptor_t *td, const void *sptr, + int ilevel, asn_app_consume_bytes_f *cb, + void *app_key) { + const OCTET_STRING_t *st = (const OCTET_STRING_t *)sptr; + + (void)td; /* Unused argument */ + (void)ilevel; /* Unused argument */ + + if(st && (st->buf || !st->size)) { + return (cb(st->buf, st->size, app_key) < 0) ? -1 : 0; + } else { + return (cb("", 8, app_key) < 0) ? -1 : 0; + } +} diff --git a/certgen/asncodec/OCTET_STRING_xer.c b/certgen/asncodec/OCTET_STRING_xer.c index 490f362a95c982fa985a3f2e6beda16da242c082..42d59315fc2b254edfc406c953f94b00acae3138 100644 --- a/certgen/asncodec/OCTET_STRING_xer.c +++ b/certgen/asncodec/OCTET_STRING_xer.c @@ -1,627 +1,627 @@ -/* - * Copyright (c) 2017 Lev Walkin . - * All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include -#include /* for .bits_unused member */ - -asn_enc_rval_t -OCTET_STRING_encode_xer(const asn_TYPE_descriptor_t *td, const void *sptr, - int ilevel, enum xer_encoder_flags_e flags, - asn_app_consume_bytes_f *cb, void *app_key) { - const char * const h2c = "0123456789ABCDEF"; - const OCTET_STRING_t *st = (const OCTET_STRING_t *)sptr; - asn_enc_rval_t er = { 0, 0, 0 }; - char scratch[16 * 3 + 4]; - char *p = scratch; - uint8_t *buf; - uint8_t *end; - size_t i; - - if(!st || (!st->buf && st->size)) - ASN__ENCODE_FAILED; - - er.encoded = 0; - - /* - * Dump the contents of the buffer in hexadecimal. - */ - buf = st->buf; - end = buf + st->size; - if(flags & XER_F_CANONICAL) { - char *scend = scratch + (sizeof(scratch) - 2); - for(; buf < end; buf++) { - if(p >= scend) { - ASN__CALLBACK(scratch, p - scratch); - p = scratch; - } - *p++ = h2c[(*buf >> 4) & 0x0F]; - *p++ = h2c[*buf & 0x0F]; - } - - ASN__CALLBACK(scratch, p-scratch); /* Dump the rest */ - } else { - for(i = 0; buf < end; buf++, i++) { - if(!(i % 16) && (i || st->size > 16)) { - ASN__CALLBACK(scratch, p-scratch); - p = scratch; - ASN__TEXT_INDENT(1, ilevel); - } - *p++ = h2c[(*buf >> 4) & 0x0F]; - *p++ = h2c[*buf & 0x0F]; - *p++ = 0x20; - } - if(p - scratch) { - p--; /* Remove the tail space */ - ASN__CALLBACK(scratch, p-scratch); /* Dump the rest */ - if(st->size > 16) - ASN__TEXT_INDENT(1, ilevel-1); - } - } - - ASN__ENCODED_OK(er); -cb_failed: - ASN__ENCODE_FAILED; -} - -static const struct OCTET_STRING__xer_escape_table_s { - const char *string; - int size; -} OCTET_STRING__xer_escape_table[] = { -#define OSXET(s) { s, sizeof(s) - 1 } - OSXET("\074\156\165\154\057\076"), /* */ - OSXET("\074\163\157\150\057\076"), /* */ - OSXET("\074\163\164\170\057\076"), /* */ - OSXET("\074\145\164\170\057\076"), /* */ - OSXET("\074\145\157\164\057\076"), /* */ - OSXET("\074\145\156\161\057\076"), /* */ - OSXET("\074\141\143\153\057\076"), /* */ - OSXET("\074\142\145\154\057\076"), /* */ - OSXET("\074\142\163\057\076"), /* */ - OSXET("\011"), /* \t */ - OSXET("\012"), /* \n */ - OSXET("\074\166\164\057\076"), /* */ - OSXET("\074\146\146\057\076"), /* */ - OSXET("\015"), /* \r */ - OSXET("\074\163\157\057\076"), /* */ - OSXET("\074\163\151\057\076"), /* */ - OSXET("\074\144\154\145\057\076"), /* */ - OSXET("\074\144\143\061\057\076"), /* */ - OSXET("\074\144\143\062\057\076"), /* */ - OSXET("\074\144\143\063\057\076"), /* */ - OSXET("\074\144\143\064\057\076"), /* */ - OSXET("\074\156\141\153\057\076"), /* */ - OSXET("\074\163\171\156\057\076"), /* */ - OSXET("\074\145\164\142\057\076"), /* */ - OSXET("\074\143\141\156\057\076"), /* */ - OSXET("\074\145\155\057\076"), /* */ - OSXET("\074\163\165\142\057\076"), /* */ - OSXET("\074\145\163\143\057\076"), /* */ - OSXET("\074\151\163\064\057\076"), /* */ - OSXET("\074\151\163\063\057\076"), /* */ - OSXET("\074\151\163\062\057\076"), /* */ - OSXET("\074\151\163\061\057\076"), /* */ - { 0, 0 }, /* " " */ - { 0, 0 }, /* ! */ - { 0, 0 }, /* \" */ - { 0, 0 }, /* # */ - { 0, 0 }, /* $ */ - { 0, 0 }, /* % */ - OSXET("\046\141\155\160\073"), /* & */ - { 0, 0 }, /* ' */ - {0,0},{0,0},{0,0},{0,0},{0,0},{0,0},{0,0},{0,0}, /* ()*+,-./ */ - {0,0},{0,0},{0,0},{0,0},{0,0},{0,0},{0,0},{0,0}, /* 01234567 */ - {0,0},{0,0},{0,0},{0,0}, /* 89:; */ - OSXET("\046\154\164\073"), /* < */ - { 0, 0 }, /* = */ - OSXET("\046\147\164\073"), /* > */ -}; - -static int -OS__check_escaped_control_char(const void *buf, int size) { - size_t i; - /* - * Inefficient algorithm which translates the escape sequences - * defined above into characters. Returns -1 if not found. - * TODO: replace by a faster algorithm (bsearch(), hash or - * nested table lookups). - */ - for(i = 0; i < 32 /* Don't spend time on the bottom half */; i++) { - const struct OCTET_STRING__xer_escape_table_s *el; - el = &OCTET_STRING__xer_escape_table[i]; - if(el->size == size && memcmp(buf, el->string, size) == 0) - return i; - } - return -1; -} - -static int -OCTET_STRING__handle_control_chars(void *struct_ptr, const void *chunk_buf, size_t chunk_size) { - /* - * This might be one of the escape sequences - * for control characters. Check it out. - * #11.15.5 - */ - int control_char = OS__check_escaped_control_char(chunk_buf,chunk_size); - if(control_char >= 0) { - OCTET_STRING_t *st = (OCTET_STRING_t *)struct_ptr; - void *p = REALLOC(st->buf, st->size + 2); - if(p) { - st->buf = (uint8_t *)p; - st->buf[st->size++] = control_char; - st->buf[st->size] = '\0'; /* nul-termination */ - return 0; - } - } - - return -1; /* No, it's not */ -} - -asn_enc_rval_t -OCTET_STRING_encode_xer_utf8(const asn_TYPE_descriptor_t *td, const void *sptr, - int ilevel, enum xer_encoder_flags_e flags, - asn_app_consume_bytes_f *cb, void *app_key) { - const OCTET_STRING_t *st = (const OCTET_STRING_t *)sptr; - asn_enc_rval_t er = { 0, 0, 0 }; - uint8_t *buf, *end; - uint8_t *ss; /* Sequence start */ - ssize_t encoded_len = 0; - - (void)ilevel; /* Unused argument */ - (void)flags; /* Unused argument */ - - if(!st || (!st->buf && st->size)) - ASN__ENCODE_FAILED; - - buf = st->buf; - end = buf + st->size; - for(ss = buf; buf < end; buf++) { - unsigned int ch = *buf; - int s_len; /* Special encoding sequence length */ - - /* - * Escape certain characters: X.680/11.15 - */ - if(ch < sizeof(OCTET_STRING__xer_escape_table) - / sizeof(OCTET_STRING__xer_escape_table[0]) - && (s_len = OCTET_STRING__xer_escape_table[ch].size)) { - if(((buf - ss) && cb(ss, buf - ss, app_key) < 0) - || cb(OCTET_STRING__xer_escape_table[ch].string, s_len, app_key) < 0) - ASN__ENCODE_FAILED; - encoded_len += (buf - ss) + s_len; - ss = buf + 1; - } - } - - encoded_len += (buf - ss); - if((buf - ss) && cb(ss, buf - ss, app_key) < 0) - ASN__ENCODE_FAILED; - - er.encoded = encoded_len; - ASN__ENCODED_OK(er); -} - -/* - * Convert from hexadecimal format (cstring): "AB CD EF" - */ -static ssize_t OCTET_STRING__convert_hexadecimal(void *sptr, const void *chunk_buf, size_t chunk_size, int have_more) { - OCTET_STRING_t *st = (OCTET_STRING_t *)sptr; - const char *chunk_stop = (const char *)chunk_buf; - const char *p = chunk_stop; - const char *pend = p + chunk_size; - unsigned int clv = 0; - int half = 0; /* Half bit */ - uint8_t *buf; - - /* Reallocate buffer according to high cap estimation */ - size_t new_size = st->size + (chunk_size + 1) / 2; - void *nptr = REALLOC(st->buf, new_size + 1); - if(!nptr) return -1; - st->buf = (uint8_t *)nptr; - buf = st->buf + st->size; - - /* - * If something like " a b c " appears here, the " a b":3 will be - * converted, and the rest skipped. That is, unless buf_size is greater - * than chunk_size, then it'll be equivalent to "ABC0". - */ - for(; p < pend; p++) { - int ch = *(const unsigned char *)p; - switch(ch) { - case 0x09: case 0x0a: case 0x0c: case 0x0d: - case 0x20: - /* Ignore whitespace */ - continue; - case 0x30: case 0x31: case 0x32: case 0x33: case 0x34: /*01234*/ - case 0x35: case 0x36: case 0x37: case 0x38: case 0x39: /*56789*/ - clv = (clv << 4) + (ch - 0x30); - break; - case 0x41: case 0x42: case 0x43: /* ABC */ - case 0x44: case 0x45: case 0x46: /* DEF */ - clv = (clv << 4) + (ch - 0x41 + 10); - break; - case 0x61: case 0x62: case 0x63: /* abc */ - case 0x64: case 0x65: case 0x66: /* def */ - clv = (clv << 4) + (ch - 0x61 + 10); - break; - default: - *buf = 0; /* JIC */ - return -1; - } - if(half++) { - half = 0; - *buf++ = clv; - chunk_stop = p + 1; - } - } - - /* - * Check partial decoding. - */ - if(half) { - if(have_more) { - /* - * Partial specification is fine, - * because no more more PXER_TEXT data is available. - */ - *buf++ = clv << 4; - chunk_stop = p; - } - } else { - chunk_stop = p; - } - - st->size = buf - st->buf; /* Adjust the buffer size */ - assert(st->size <= new_size); - st->buf[st->size] = 0; /* Courtesy termination */ - - return (chunk_stop - (const char *)chunk_buf); /* Converted size */ -} - -/* - * Convert from binary format: "00101011101" - */ -static ssize_t OCTET_STRING__convert_binary(void *sptr, const void *chunk_buf, size_t chunk_size, int have_more) { - BIT_STRING_t *st = (BIT_STRING_t *)sptr; - const char *p = (const char *)chunk_buf; - const char *pend = (p == NULL)? NULL : p + chunk_size; - int bits_unused = st->bits_unused & 0x7; - uint8_t *buf; - - /* Reallocate buffer according to high cap estimation */ - size_t new_size = st->size + (chunk_size + 7) / 8; - void *nptr = REALLOC(st->buf, new_size + 1); - if(!nptr) return -1; - st->buf = (uint8_t *)nptr; - buf = st->buf + st->size; - - (void)have_more; - - if(bits_unused == 0) - bits_unused = 8; - else if(st->size) - buf--; - - /* - * Convert series of 0 and 1 into the octet string. - */ - for(; p < pend; p++) { - int ch = *(const unsigned char *)p; - switch(ch) { - case 0x09: case 0x0a: case 0x0c: case 0x0d: - case 0x20: - /* Ignore whitespace */ - break; - case 0x30: - case 0x31: - if(bits_unused-- <= 0) { - *++buf = 0; /* Clean the cell */ - bits_unused = 7; - } - *buf |= (ch&1) << bits_unused; - break; - default: - st->bits_unused = bits_unused; - return -1; - } - } - - if(bits_unused == 8) { - st->size = buf - st->buf; - st->bits_unused = 0; - } else { - st->size = buf - st->buf + 1; - st->bits_unused = bits_unused; - } - - assert(st->size <= new_size); - st->buf[st->size] = 0; /* Courtesy termination */ - - return chunk_size; /* Converted in full */ -} - -/* - * Something like strtod(), but with stricter rules. - */ -static int -OS__strtoent(int base, const char *buf, const char *end, int32_t *ret_value) { - const int32_t last_unicode_codepoint = 0x10ffff; - int32_t val = 0; - const char *p; - - for(p = buf; p < end; p++) { - int ch = *p; - - switch(ch) { - case 0x30: case 0x31: case 0x32: case 0x33: case 0x34: /*01234*/ - case 0x35: case 0x36: case 0x37: case 0x38: case 0x39: /*56789*/ - val = val * base + (ch - 0x30); - break; - case 0x41: case 0x42: case 0x43: /* ABC */ - case 0x44: case 0x45: case 0x46: /* DEF */ - val = val * base + (ch - 0x41 + 10); - break; - case 0x61: case 0x62: case 0x63: /* abc */ - case 0x64: case 0x65: case 0x66: /* def */ - val = val * base + (ch - 0x61 + 10); - break; - case 0x3b: /* ';' */ - *ret_value = val; - return (p - buf) + 1; - default: - return -1; /* Character set error */ - } - - /* Value exceeds the Unicode range. */ - if(val > last_unicode_codepoint) { - return -1; - } - } - - *ret_value = -1; - return (p - buf); -} - -/* - * Convert from the plain UTF-8 format, expanding entity references: "2 < 3" - */ -static ssize_t -OCTET_STRING__convert_entrefs(void *sptr, const void *chunk_buf, - size_t chunk_size, int have_more) { - OCTET_STRING_t *st = (OCTET_STRING_t *)sptr; - const char *p = (const char *)chunk_buf; - const char *pend = p + chunk_size; - uint8_t *buf; - - /* Reallocate buffer */ - size_t new_size = st->size + chunk_size; - void *nptr = REALLOC(st->buf, new_size + 1); - if(!nptr) return -1; - st->buf = (uint8_t *)nptr; - buf = st->buf + st->size; - - /* - * Convert series of 0 and 1 into the octet string. - */ - for(; p < pend; p++) { - int ch = *(const unsigned char *)p; - int len; /* Length of the rest of the chunk */ - - if(ch != 0x26 /* '&' */) { - *buf++ = ch; - continue; /* That was easy... */ - } - - /* - * Process entity reference. - */ - len = chunk_size - (p - (const char *)chunk_buf); - if(len == 1 /* "&" */) goto want_more; - if(p[1] == 0x23 /* '#' */) { - const char *pval; /* Pointer to start of digits */ - int32_t val = 0; /* Entity reference value */ - int base; - - if(len == 2 /* "&#" */) goto want_more; - if(p[2] == 0x78 /* 'x' */) - pval = p + 3, base = 16; - else - pval = p + 2, base = 10; - len = OS__strtoent(base, pval, p + len, &val); - if(len == -1) { - /* Invalid charset. Just copy verbatim. */ - *buf++ = ch; - continue; - } - if(!len || pval[len-1] != 0x3b) goto want_more; - assert(val > 0); - p += (pval - p) + len - 1; /* Advance past entref */ - - if(val < 0x80) { - *buf++ = (char)val; - } else if(val < 0x800) { - *buf++ = 0xc0 | ((val >> 6)); - *buf++ = 0x80 | ((val & 0x3f)); - } else if(val < 0x10000) { - *buf++ = 0xe0 | ((val >> 12)); - *buf++ = 0x80 | ((val >> 6) & 0x3f); - *buf++ = 0x80 | ((val & 0x3f)); - } else if(val < 0x200000) { - *buf++ = 0xf0 | ((val >> 18)); - *buf++ = 0x80 | ((val >> 12) & 0x3f); - *buf++ = 0x80 | ((val >> 6) & 0x3f); - *buf++ = 0x80 | ((val & 0x3f)); - } else if(val < 0x4000000) { - *buf++ = 0xf8 | ((val >> 24)); - *buf++ = 0x80 | ((val >> 18) & 0x3f); - *buf++ = 0x80 | ((val >> 12) & 0x3f); - *buf++ = 0x80 | ((val >> 6) & 0x3f); - *buf++ = 0x80 | ((val & 0x3f)); - } else { - *buf++ = 0xfc | ((val >> 30) & 0x1); - *buf++ = 0x80 | ((val >> 24) & 0x3f); - *buf++ = 0x80 | ((val >> 18) & 0x3f); - *buf++ = 0x80 | ((val >> 12) & 0x3f); - *buf++ = 0x80 | ((val >> 6) & 0x3f); - *buf++ = 0x80 | ((val & 0x3f)); - } - } else { - /* - * Ugly, limited parsing of & > < - */ - char *sc = (char *)memchr(p, 0x3b, len > 5 ? 5 : len); - if(!sc) goto want_more; - if((sc - p) == 4 - && p[1] == 0x61 /* 'a' */ - && p[2] == 0x6d /* 'm' */ - && p[3] == 0x70 /* 'p' */) { - *buf++ = 0x26; - p = sc; - continue; - } - if((sc - p) == 3) { - if(p[1] == 0x6c) { - *buf = 0x3c; /* '<' */ - } else if(p[1] == 0x67) { - *buf = 0x3e; /* '>' */ - } else { - /* Unsupported entity reference */ - *buf++ = ch; - continue; - } - if(p[2] != 0x74) { - /* Unsupported entity reference */ - *buf++ = ch; - continue; - } - buf++; - p = sc; - continue; - } - /* Unsupported entity reference */ - *buf++ = ch; - } - - continue; - want_more: - if(have_more) { - /* - * We know that no more data (of the same type) - * is coming. Copy the rest verbatim. - */ - *buf++ = ch; - continue; - } - chunk_size = (p - (const char *)chunk_buf); - /* Processing stalled: need more data */ - break; - } - - st->size = buf - st->buf; - assert(st->size <= new_size); - st->buf[st->size] = 0; /* Courtesy termination */ - - return chunk_size; /* Converted in full */ -} - -/* - * Decode OCTET STRING from the XML element's body. - */ -static asn_dec_rval_t -OCTET_STRING__decode_xer( - const asn_codec_ctx_t *opt_codec_ctx, const asn_TYPE_descriptor_t *td, - void **sptr, const char *opt_mname, const void *buf_ptr, size_t size, - int (*opt_unexpected_tag_decoder)(void *struct_ptr, const void *chunk_buf, - size_t chunk_size), - ssize_t (*body_receiver)(void *struct_ptr, const void *chunk_buf, - size_t chunk_size, int have_more)) { - OCTET_STRING_t *st = (OCTET_STRING_t *)*sptr; - const asn_OCTET_STRING_specifics_t *specs = td->specifics - ? (const asn_OCTET_STRING_specifics_t *)td->specifics - : &asn_SPC_OCTET_STRING_specs; - const char *xml_tag = opt_mname ? opt_mname : td->xml_tag; - asn_struct_ctx_t *ctx; /* Per-structure parser context */ - asn_dec_rval_t rval; /* Return value from the decoder */ - int st_allocated; - - /* - * Create the string if does not exist. - */ - if(!st) { - st = (OCTET_STRING_t *)CALLOC(1, specs->struct_size); - *sptr = (void *)st; - if(!st) goto sta_failed; - st_allocated = 1; - } else { - st_allocated = 0; - } - if(!st->buf) { - /* This is separate from above section */ - st->buf = (uint8_t *)CALLOC(1, 1); - if(!st->buf) { - if(st_allocated) { - *sptr = 0; - goto stb_failed; - } else { - goto sta_failed; - } - } - } - - /* Restore parsing context */ - ctx = (asn_struct_ctx_t *)(((char *)*sptr) + specs->ctx_offset); - - return xer_decode_general(opt_codec_ctx, ctx, *sptr, xml_tag, - buf_ptr, size, - opt_unexpected_tag_decoder, - body_receiver); - -stb_failed: - FREEMEM(st); -sta_failed: - rval.code = RC_FAIL; - rval.consumed = 0; - return rval; -} - -/* - * Decode OCTET STRING from the hexadecimal data. - */ -asn_dec_rval_t -OCTET_STRING_decode_xer_hex(const asn_codec_ctx_t *opt_codec_ctx, - const asn_TYPE_descriptor_t *td, void **sptr, - const char *opt_mname, const void *buf_ptr, - size_t size) { - return OCTET_STRING__decode_xer(opt_codec_ctx, td, sptr, opt_mname, - buf_ptr, size, 0, - OCTET_STRING__convert_hexadecimal); -} - -/* - * Decode OCTET STRING from the binary (0/1) data. - */ -asn_dec_rval_t -OCTET_STRING_decode_xer_binary(const asn_codec_ctx_t *opt_codec_ctx, - const asn_TYPE_descriptor_t *td, void **sptr, - const char *opt_mname, const void *buf_ptr, - size_t size) { - return OCTET_STRING__decode_xer(opt_codec_ctx, td, sptr, opt_mname, - buf_ptr, size, 0, - OCTET_STRING__convert_binary); -} - -/* - * Decode OCTET STRING from the string (ASCII/UTF-8) data. - */ -asn_dec_rval_t -OCTET_STRING_decode_xer_utf8(const asn_codec_ctx_t *opt_codec_ctx, - const asn_TYPE_descriptor_t *td, void **sptr, - const char *opt_mname, const void *buf_ptr, - size_t size) { - return OCTET_STRING__decode_xer(opt_codec_ctx, td, sptr, opt_mname, - buf_ptr, size, - OCTET_STRING__handle_control_chars, - OCTET_STRING__convert_entrefs); -} +/* + * Copyright (c) 2017 Lev Walkin . + * All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include +#include /* for .bits_unused member */ + +asn_enc_rval_t +OCTET_STRING_encode_xer(const asn_TYPE_descriptor_t *td, const void *sptr, + int ilevel, enum xer_encoder_flags_e flags, + asn_app_consume_bytes_f *cb, void *app_key) { + const char * const h2c = "0123456789ABCDEF"; + const OCTET_STRING_t *st = (const OCTET_STRING_t *)sptr; + asn_enc_rval_t er = { 0, 0, 0 }; + char scratch[16 * 3 + 4]; + char *p = scratch; + uint8_t *buf; + uint8_t *end; + size_t i; + + if(!st || (!st->buf && st->size)) + ASN__ENCODE_FAILED; + + er.encoded = 0; + + /* + * Dump the contents of the buffer in hexadecimal. + */ + buf = st->buf; + end = buf + st->size; + if(flags & XER_F_CANONICAL) { + char *scend = scratch + (sizeof(scratch) - 2); + for(; buf < end; buf++) { + if(p >= scend) { + ASN__CALLBACK(scratch, p - scratch); + p = scratch; + } + *p++ = h2c[(*buf >> 4) & 0x0F]; + *p++ = h2c[*buf & 0x0F]; + } + + ASN__CALLBACK(scratch, p-scratch); /* Dump the rest */ + } else { + for(i = 0; buf < end; buf++, i++) { + if(!(i % 16) && (i || st->size > 16)) { + ASN__CALLBACK(scratch, p-scratch); + p = scratch; + ASN__TEXT_INDENT(1, ilevel); + } + *p++ = h2c[(*buf >> 4) & 0x0F]; + *p++ = h2c[*buf & 0x0F]; + *p++ = 0x20; + } + if(p - scratch) { + p--; /* Remove the tail space */ + ASN__CALLBACK(scratch, p-scratch); /* Dump the rest */ + if(st->size > 16) + ASN__TEXT_INDENT(1, ilevel-1); + } + } + + ASN__ENCODED_OK(er); +cb_failed: + ASN__ENCODE_FAILED; +} + +static const struct OCTET_STRING__xer_escape_table_s { + const char *string; + int size; +} OCTET_STRING__xer_escape_table[] = { +#define OSXET(s) { s, sizeof(s) - 1 } + OSXET("\074\156\165\154\057\076"), /* */ + OSXET("\074\163\157\150\057\076"), /* */ + OSXET("\074\163\164\170\057\076"), /* */ + OSXET("\074\145\164\170\057\076"), /* */ + OSXET("\074\145\157\164\057\076"), /* */ + OSXET("\074\145\156\161\057\076"), /* */ + OSXET("\074\141\143\153\057\076"), /* */ + OSXET("\074\142\145\154\057\076"), /* */ + OSXET("\074\142\163\057\076"), /* */ + OSXET("\011"), /* \t */ + OSXET("\012"), /* \n */ + OSXET("\074\166\164\057\076"), /* */ + OSXET("\074\146\146\057\076"), /* */ + OSXET("\015"), /* \r */ + OSXET("\074\163\157\057\076"), /* */ + OSXET("\074\163\151\057\076"), /* */ + OSXET("\074\144\154\145\057\076"), /* */ + OSXET("\074\144\143\061\057\076"), /* */ + OSXET("\074\144\143\062\057\076"), /* */ + OSXET("\074\144\143\063\057\076"), /* */ + OSXET("\074\144\143\064\057\076"), /* */ + OSXET("\074\156\141\153\057\076"), /* */ + OSXET("\074\163\171\156\057\076"), /* */ + OSXET("\074\145\164\142\057\076"), /* */ + OSXET("\074\143\141\156\057\076"), /* */ + OSXET("\074\145\155\057\076"), /* */ + OSXET("\074\163\165\142\057\076"), /* */ + OSXET("\074\145\163\143\057\076"), /* */ + OSXET("\074\151\163\064\057\076"), /* */ + OSXET("\074\151\163\063\057\076"), /* */ + OSXET("\074\151\163\062\057\076"), /* */ + OSXET("\074\151\163\061\057\076"), /* */ + { 0, 0 }, /* " " */ + { 0, 0 }, /* ! */ + { 0, 0 }, /* \" */ + { 0, 0 }, /* # */ + { 0, 0 }, /* $ */ + { 0, 0 }, /* % */ + OSXET("\046\141\155\160\073"), /* & */ + { 0, 0 }, /* ' */ + {0,0},{0,0},{0,0},{0,0},{0,0},{0,0},{0,0},{0,0}, /* ()*+,-./ */ + {0,0},{0,0},{0,0},{0,0},{0,0},{0,0},{0,0},{0,0}, /* 01234567 */ + {0,0},{0,0},{0,0},{0,0}, /* 89:; */ + OSXET("\046\154\164\073"), /* < */ + { 0, 0 }, /* = */ + OSXET("\046\147\164\073"), /* > */ +}; + +static int +OS__check_escaped_control_char(const void *buf, int size) { + size_t i; + /* + * Inefficient algorithm which translates the escape sequences + * defined above into characters. Returns -1 if not found. + * TODO: replace by a faster algorithm (bsearch(), hash or + * nested table lookups). + */ + for(i = 0; i < 32 /* Don't spend time on the bottom half */; i++) { + const struct OCTET_STRING__xer_escape_table_s *el; + el = &OCTET_STRING__xer_escape_table[i]; + if(el->size == size && memcmp(buf, el->string, size) == 0) + return i; + } + return -1; +} + +static int +OCTET_STRING__handle_control_chars(void *struct_ptr, const void *chunk_buf, size_t chunk_size) { + /* + * This might be one of the escape sequences + * for control characters. Check it out. + * #11.15.5 + */ + int control_char = OS__check_escaped_control_char(chunk_buf,chunk_size); + if(control_char >= 0) { + OCTET_STRING_t *st = (OCTET_STRING_t *)struct_ptr; + void *p = REALLOC(st->buf, st->size + 2); + if(p) { + st->buf = (uint8_t *)p; + st->buf[st->size++] = control_char; + st->buf[st->size] = '\0'; /* nul-termination */ + return 0; + } + } + + return -1; /* No, it's not */ +} + +asn_enc_rval_t +OCTET_STRING_encode_xer_utf8(const asn_TYPE_descriptor_t *td, const void *sptr, + int ilevel, enum xer_encoder_flags_e flags, + asn_app_consume_bytes_f *cb, void *app_key) { + const OCTET_STRING_t *st = (const OCTET_STRING_t *)sptr; + asn_enc_rval_t er = { 0, 0, 0 }; + uint8_t *buf, *end; + uint8_t *ss; /* Sequence start */ + ssize_t encoded_len = 0; + + (void)ilevel; /* Unused argument */ + (void)flags; /* Unused argument */ + + if(!st || (!st->buf && st->size)) + ASN__ENCODE_FAILED; + + buf = st->buf; + end = buf + st->size; + for(ss = buf; buf < end; buf++) { + unsigned int ch = *buf; + int s_len; /* Special encoding sequence length */ + + /* + * Escape certain characters: X.680/11.15 + */ + if(ch < sizeof(OCTET_STRING__xer_escape_table) + / sizeof(OCTET_STRING__xer_escape_table[0]) + && (s_len = OCTET_STRING__xer_escape_table[ch].size)) { + if(((buf - ss) && cb(ss, buf - ss, app_key) < 0) + || cb(OCTET_STRING__xer_escape_table[ch].string, s_len, app_key) < 0) + ASN__ENCODE_FAILED; + encoded_len += (buf - ss) + s_len; + ss = buf + 1; + } + } + + encoded_len += (buf - ss); + if((buf - ss) && cb(ss, buf - ss, app_key) < 0) + ASN__ENCODE_FAILED; + + er.encoded = encoded_len; + ASN__ENCODED_OK(er); +} + +/* + * Convert from hexadecimal format (cstring): "AB CD EF" + */ +static ssize_t OCTET_STRING__convert_hexadecimal(void *sptr, const void *chunk_buf, size_t chunk_size, int have_more) { + OCTET_STRING_t *st = (OCTET_STRING_t *)sptr; + const char *chunk_stop = (const char *)chunk_buf; + const char *p = chunk_stop; + const char *pend = p + chunk_size; + unsigned int clv = 0; + int half = 0; /* Half bit */ + uint8_t *buf; + + /* Reallocate buffer according to high cap estimation */ + size_t new_size = st->size + (chunk_size + 1) / 2; + void *nptr = REALLOC(st->buf, new_size + 1); + if(!nptr) return -1; + st->buf = (uint8_t *)nptr; + buf = st->buf + st->size; + + /* + * If something like " a b c " appears here, the " a b":3 will be + * converted, and the rest skipped. That is, unless buf_size is greater + * than chunk_size, then it'll be equivalent to "ABC0". + */ + for(; p < pend; p++) { + int ch = *(const unsigned char *)p; + switch(ch) { + case 0x09: case 0x0a: case 0x0c: case 0x0d: + case 0x20: + /* Ignore whitespace */ + continue; + case 0x30: case 0x31: case 0x32: case 0x33: case 0x34: /*01234*/ + case 0x35: case 0x36: case 0x37: case 0x38: case 0x39: /*56789*/ + clv = (clv << 4) + (ch - 0x30); + break; + case 0x41: case 0x42: case 0x43: /* ABC */ + case 0x44: case 0x45: case 0x46: /* DEF */ + clv = (clv << 4) + (ch - 0x41 + 10); + break; + case 0x61: case 0x62: case 0x63: /* abc */ + case 0x64: case 0x65: case 0x66: /* def */ + clv = (clv << 4) + (ch - 0x61 + 10); + break; + default: + *buf = 0; /* JIC */ + return -1; + } + if(half++) { + half = 0; + *buf++ = clv; + chunk_stop = p + 1; + } + } + + /* + * Check partial decoding. + */ + if(half) { + if(have_more) { + /* + * Partial specification is fine, + * because no more more PXER_TEXT data is available. + */ + *buf++ = clv << 4; + chunk_stop = p; + } + } else { + chunk_stop = p; + } + + st->size = buf - st->buf; /* Adjust the buffer size */ + assert(st->size <= new_size); + st->buf[st->size] = 0; /* Courtesy termination */ + + return (chunk_stop - (const char *)chunk_buf); /* Converted size */ +} + +/* + * Convert from binary format: "00101011101" + */ +static ssize_t OCTET_STRING__convert_binary(void *sptr, const void *chunk_buf, size_t chunk_size, int have_more) { + BIT_STRING_t *st = (BIT_STRING_t *)sptr; + const char *p = (const char *)chunk_buf; + const char *pend = (p == NULL)? NULL : p + chunk_size; + int bits_unused = st->bits_unused & 0x7; + uint8_t *buf; + + /* Reallocate buffer according to high cap estimation */ + size_t new_size = st->size + (chunk_size + 7) / 8; + void *nptr = REALLOC(st->buf, new_size + 1); + if(!nptr) return -1; + st->buf = (uint8_t *)nptr; + buf = st->buf + st->size; + + (void)have_more; + + if(bits_unused == 0) + bits_unused = 8; + else if(st->size) + buf--; + + /* + * Convert series of 0 and 1 into the octet string. + */ + for(; p < pend; p++) { + int ch = *(const unsigned char *)p; + switch(ch) { + case 0x09: case 0x0a: case 0x0c: case 0x0d: + case 0x20: + /* Ignore whitespace */ + break; + case 0x30: + case 0x31: + if(bits_unused-- <= 0) { + *++buf = 0; /* Clean the cell */ + bits_unused = 7; + } + *buf |= (ch&1) << bits_unused; + break; + default: + st->bits_unused = bits_unused; + return -1; + } + } + + if(bits_unused == 8) { + st->size = buf - st->buf; + st->bits_unused = 0; + } else { + st->size = buf - st->buf + 1; + st->bits_unused = bits_unused; + } + + assert(st->size <= new_size); + st->buf[st->size] = 0; /* Courtesy termination */ + + return chunk_size; /* Converted in full */ +} + +/* + * Something like strtod(), but with stricter rules. + */ +static int +OS__strtoent(int base, const char *buf, const char *end, int32_t *ret_value) { + const int32_t last_unicode_codepoint = 0x10ffff; + int32_t val = 0; + const char *p; + + for(p = buf; p < end; p++) { + int ch = *p; + + switch(ch) { + case 0x30: case 0x31: case 0x32: case 0x33: case 0x34: /*01234*/ + case 0x35: case 0x36: case 0x37: case 0x38: case 0x39: /*56789*/ + val = val * base + (ch - 0x30); + break; + case 0x41: case 0x42: case 0x43: /* ABC */ + case 0x44: case 0x45: case 0x46: /* DEF */ + val = val * base + (ch - 0x41 + 10); + break; + case 0x61: case 0x62: case 0x63: /* abc */ + case 0x64: case 0x65: case 0x66: /* def */ + val = val * base + (ch - 0x61 + 10); + break; + case 0x3b: /* ';' */ + *ret_value = val; + return (p - buf) + 1; + default: + return -1; /* Character set error */ + } + + /* Value exceeds the Unicode range. */ + if(val > last_unicode_codepoint) { + return -1; + } + } + + *ret_value = -1; + return (p - buf); +} + +/* + * Convert from the plain UTF-8 format, expanding entity references: "2 < 3" + */ +static ssize_t +OCTET_STRING__convert_entrefs(void *sptr, const void *chunk_buf, + size_t chunk_size, int have_more) { + OCTET_STRING_t *st = (OCTET_STRING_t *)sptr; + const char *p = (const char *)chunk_buf; + const char *pend = p + chunk_size; + uint8_t *buf; + + /* Reallocate buffer */ + size_t new_size = st->size + chunk_size; + void *nptr = REALLOC(st->buf, new_size + 1); + if(!nptr) return -1; + st->buf = (uint8_t *)nptr; + buf = st->buf + st->size; + + /* + * Convert series of 0 and 1 into the octet string. + */ + for(; p < pend; p++) { + int ch = *(const unsigned char *)p; + int len; /* Length of the rest of the chunk */ + + if(ch != 0x26 /* '&' */) { + *buf++ = ch; + continue; /* That was easy... */ + } + + /* + * Process entity reference. + */ + len = chunk_size - (p - (const char *)chunk_buf); + if(len == 1 /* "&" */) goto want_more; + if(p[1] == 0x23 /* '#' */) { + const char *pval; /* Pointer to start of digits */ + int32_t val = 0; /* Entity reference value */ + int base; + + if(len == 2 /* "&#" */) goto want_more; + if(p[2] == 0x78 /* 'x' */) + pval = p + 3, base = 16; + else + pval = p + 2, base = 10; + len = OS__strtoent(base, pval, p + len, &val); + if(len == -1) { + /* Invalid charset. Just copy verbatim. */ + *buf++ = ch; + continue; + } + if(!len || pval[len-1] != 0x3b) goto want_more; + assert(val > 0); + p += (pval - p) + len - 1; /* Advance past entref */ + + if(val < 0x80) { + *buf++ = (char)val; + } else if(val < 0x800) { + *buf++ = 0xc0 | ((val >> 6)); + *buf++ = 0x80 | ((val & 0x3f)); + } else if(val < 0x10000) { + *buf++ = 0xe0 | ((val >> 12)); + *buf++ = 0x80 | ((val >> 6) & 0x3f); + *buf++ = 0x80 | ((val & 0x3f)); + } else if(val < 0x200000) { + *buf++ = 0xf0 | ((val >> 18)); + *buf++ = 0x80 | ((val >> 12) & 0x3f); + *buf++ = 0x80 | ((val >> 6) & 0x3f); + *buf++ = 0x80 | ((val & 0x3f)); + } else if(val < 0x4000000) { + *buf++ = 0xf8 | ((val >> 24)); + *buf++ = 0x80 | ((val >> 18) & 0x3f); + *buf++ = 0x80 | ((val >> 12) & 0x3f); + *buf++ = 0x80 | ((val >> 6) & 0x3f); + *buf++ = 0x80 | ((val & 0x3f)); + } else { + *buf++ = 0xfc | ((val >> 30) & 0x1); + *buf++ = 0x80 | ((val >> 24) & 0x3f); + *buf++ = 0x80 | ((val >> 18) & 0x3f); + *buf++ = 0x80 | ((val >> 12) & 0x3f); + *buf++ = 0x80 | ((val >> 6) & 0x3f); + *buf++ = 0x80 | ((val & 0x3f)); + } + } else { + /* + * Ugly, limited parsing of & > < + */ + char *sc = (char *)memchr(p, 0x3b, len > 5 ? 5 : len); + if(!sc) goto want_more; + if((sc - p) == 4 + && p[1] == 0x61 /* 'a' */ + && p[2] == 0x6d /* 'm' */ + && p[3] == 0x70 /* 'p' */) { + *buf++ = 0x26; + p = sc; + continue; + } + if((sc - p) == 3) { + if(p[1] == 0x6c) { + *buf = 0x3c; /* '<' */ + } else if(p[1] == 0x67) { + *buf = 0x3e; /* '>' */ + } else { + /* Unsupported entity reference */ + *buf++ = ch; + continue; + } + if(p[2] != 0x74) { + /* Unsupported entity reference */ + *buf++ = ch; + continue; + } + buf++; + p = sc; + continue; + } + /* Unsupported entity reference */ + *buf++ = ch; + } + + continue; + want_more: + if(have_more) { + /* + * We know that no more data (of the same type) + * is coming. Copy the rest verbatim. + */ + *buf++ = ch; + continue; + } + chunk_size = (p - (const char *)chunk_buf); + /* Processing stalled: need more data */ + break; + } + + st->size = buf - st->buf; + assert(st->size <= new_size); + st->buf[st->size] = 0; /* Courtesy termination */ + + return chunk_size; /* Converted in full */ +} + +/* + * Decode OCTET STRING from the XML element's body. + */ +static asn_dec_rval_t +OCTET_STRING__decode_xer( + const asn_codec_ctx_t *opt_codec_ctx, const asn_TYPE_descriptor_t *td, + void **sptr, const char *opt_mname, const void *buf_ptr, size_t size, + int (*opt_unexpected_tag_decoder)(void *struct_ptr, const void *chunk_buf, + size_t chunk_size), + ssize_t (*body_receiver)(void *struct_ptr, const void *chunk_buf, + size_t chunk_size, int have_more)) { + OCTET_STRING_t *st = (OCTET_STRING_t *)*sptr; + const asn_OCTET_STRING_specifics_t *specs = td->specifics + ? (const asn_OCTET_STRING_specifics_t *)td->specifics + : &asn_SPC_OCTET_STRING_specs; + const char *xml_tag = opt_mname ? opt_mname : td->xml_tag; + asn_struct_ctx_t *ctx; /* Per-structure parser context */ + asn_dec_rval_t rval; /* Return value from the decoder */ + int st_allocated; + + /* + * Create the string if does not exist. + */ + if(!st) { + st = (OCTET_STRING_t *)CALLOC(1, specs->struct_size); + *sptr = (void *)st; + if(!st) goto sta_failed; + st_allocated = 1; + } else { + st_allocated = 0; + } + if(!st->buf) { + /* This is separate from above section */ + st->buf = (uint8_t *)CALLOC(1, 1); + if(!st->buf) { + if(st_allocated) { + *sptr = 0; + goto stb_failed; + } else { + goto sta_failed; + } + } + } + + /* Restore parsing context */ + ctx = (asn_struct_ctx_t *)(((char *)*sptr) + specs->ctx_offset); + + return xer_decode_general(opt_codec_ctx, ctx, *sptr, xml_tag, + buf_ptr, size, + opt_unexpected_tag_decoder, + body_receiver); + +stb_failed: + FREEMEM(st); +sta_failed: + rval.code = RC_FAIL; + rval.consumed = 0; + return rval; +} + +/* + * Decode OCTET STRING from the hexadecimal data. + */ +asn_dec_rval_t +OCTET_STRING_decode_xer_hex(const asn_codec_ctx_t *opt_codec_ctx, + const asn_TYPE_descriptor_t *td, void **sptr, + const char *opt_mname, const void *buf_ptr, + size_t size) { + return OCTET_STRING__decode_xer(opt_codec_ctx, td, sptr, opt_mname, + buf_ptr, size, 0, + OCTET_STRING__convert_hexadecimal); +} + +/* + * Decode OCTET STRING from the binary (0/1) data. + */ +asn_dec_rval_t +OCTET_STRING_decode_xer_binary(const asn_codec_ctx_t *opt_codec_ctx, + const asn_TYPE_descriptor_t *td, void **sptr, + const char *opt_mname, const void *buf_ptr, + size_t size) { + return OCTET_STRING__decode_xer(opt_codec_ctx, td, sptr, opt_mname, + buf_ptr, size, 0, + OCTET_STRING__convert_binary); +} + +/* + * Decode OCTET STRING from the string (ASCII/UTF-8) data. + */ +asn_dec_rval_t +OCTET_STRING_decode_xer_utf8(const asn_codec_ctx_t *opt_codec_ctx, + const asn_TYPE_descriptor_t *td, void **sptr, + const char *opt_mname, const void *buf_ptr, + size_t size) { + return OCTET_STRING__decode_xer(opt_codec_ctx, td, sptr, opt_mname, + buf_ptr, size, + OCTET_STRING__handle_control_chars, + OCTET_STRING__convert_entrefs); +} diff --git a/certgen/asncodec/OPEN_TYPE.c b/certgen/asncodec/OPEN_TYPE.c index c9afecffed27fdbd4dbb00bf0dc94277d65d17b2..77b3e62119a2210e12cbe6ec41c1557e9264816c 100644 --- a/certgen/asncodec/OPEN_TYPE.c +++ b/certgen/asncodec/OPEN_TYPE.c @@ -1,63 +1,63 @@ -/* - * Copyright (c) 2017 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include -#include - -asn_TYPE_operation_t asn_OP_OPEN_TYPE = { - OPEN_TYPE_free, -#if !defined(ASN_DISABLE_PRINT_SUPPORT) - OPEN_TYPE_print, -#else - 0, -#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ - OPEN_TYPE_compare, -#if !defined(ASN_DISABLE_BER_SUPPORT) - OPEN_TYPE_decode_ber, - OPEN_TYPE_encode_der, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ -#if !defined(ASN_DISABLE_XER_SUPPORT) - OPEN_TYPE_decode_xer, - OPEN_TYPE_encode_xer, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ -#if !defined(ASN_DISABLE_JER_SUPPORT) - OPEN_TYPE_encode_jer, -#else - 0, -#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ -#if !defined(ASN_DISABLE_OER_SUPPORT) - OPEN_TYPE_decode_oer, - OPEN_TYPE_encode_oer, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ -#if !defined(ASN_DISABLE_UPER_SUPPORT) - OPEN_TYPE_decode_uper, - OPEN_TYPE_encode_uper, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ -#if !defined(ASN_DISABLE_APER_SUPPORT) - OPEN_TYPE_decode_aper, - OPEN_TYPE_encode_aper, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ -#if !defined(ASN_DISABLE_RFILL_SUPPORT) - 0, /* Random fill is not supported for open type */ -#else - 0, -#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ - 0 /* Use generic outmost tag fetcher */ -}; +/* + * Copyright (c) 2017 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include +#include + +asn_TYPE_operation_t asn_OP_OPEN_TYPE = { + OPEN_TYPE_free, +#if !defined(ASN_DISABLE_PRINT_SUPPORT) + OPEN_TYPE_print, +#else + 0, +#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ + OPEN_TYPE_compare, +#if !defined(ASN_DISABLE_BER_SUPPORT) + OPEN_TYPE_decode_ber, + OPEN_TYPE_encode_der, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ +#if !defined(ASN_DISABLE_XER_SUPPORT) + OPEN_TYPE_decode_xer, + OPEN_TYPE_encode_xer, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ +#if !defined(ASN_DISABLE_JER_SUPPORT) + OPEN_TYPE_encode_jer, +#else + 0, +#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ +#if !defined(ASN_DISABLE_OER_SUPPORT) + OPEN_TYPE_decode_oer, + OPEN_TYPE_encode_oer, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ +#if !defined(ASN_DISABLE_UPER_SUPPORT) + OPEN_TYPE_decode_uper, + OPEN_TYPE_encode_uper, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ +#if !defined(ASN_DISABLE_APER_SUPPORT) + OPEN_TYPE_decode_aper, + OPEN_TYPE_encode_aper, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ +#if !defined(ASN_DISABLE_RFILL_SUPPORT) + 0, /* Random fill is not supported for open type */ +#else + 0, +#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ + 0 /* Use generic outmost tag fetcher */ +}; diff --git a/certgen/asncodec/OPEN_TYPE.h b/certgen/asncodec/OPEN_TYPE.h index 5e979773e0a59cd15ea3903951450f3c86959e76..fa6bd725e45605cd54c27ef8e5bf44292396e58d 100644 --- a/certgen/asncodec/OPEN_TYPE.h +++ b/certgen/asncodec/OPEN_TYPE.h @@ -1,117 +1,117 @@ -/*- - * Copyright (c) 2017-2017 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#ifndef ASN_OPEN_TYPE_H -#define ASN_OPEN_TYPE_H - -#include -///////////#include - -#ifdef __cplusplus -extern "C" { -#endif - -/* - * Decode an Open Type which is potentially constraiend - * by the other members of the parent structure. - */ - -#undef ADVANCE -#define ADVANCE(num_bytes) \ - do { \ - size_t num = num_bytes; \ - ptr = ((const char *)ptr) + num; \ - size -= num; \ - consumed_myself += num; \ - } while(0) - -#define OPEN_TYPE_free CHOICE_free - -#if !defined(ASN_DISABLE_PRINT_SUPPORT) -#define OPEN_TYPE_print CHOICE_print -#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ - -#define OPEN_TYPE_compare CHOICE_compare - -#define OPEN_TYPE_constraint CHOICE_constraint - -#if !defined(ASN_DISABLE_BER_SUPPORT) -asn_dec_rval_t OPEN_TYPE_ber_get( - const asn_codec_ctx_t *opt_codec_ctx, - const asn_TYPE_descriptor_t *parent_type, - void *parent_structure, - const asn_TYPE_member_t *element, - const void *ptr, size_t size); -#define OPEN_TYPE_decode_ber NULL -#define OPEN_TYPE_encode_der CHOICE_encode_der -#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ - -#if !defined(ASN_DISABLE_XER_SUPPORT) -asn_dec_rval_t OPEN_TYPE_xer_get( - const asn_codec_ctx_t *opt_codec_ctx, - const asn_TYPE_descriptor_t *parent_type, - void *parent_structure, - const asn_TYPE_member_t *element, - const void *ptr, size_t size); -#define OPEN_TYPE_decode_xer NULL -#define OPEN_TYPE_encode_xer CHOICE_encode_xer -#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ - -#if !defined(ASN_DISABLE_JER_SUPPORT) -#define OPEN_TYPE_encode_jer CHOICE_encode_jer -#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ - -#if !defined(ASN_DISABLE_OER_SUPPORT) -asn_dec_rval_t OPEN_TYPE_oer_get( - const asn_codec_ctx_t *opt_codec_ctx, - const asn_TYPE_descriptor_t *parent_type, - void *parent_structure, - asn_TYPE_member_t *element, const void *ptr, - size_t size); -#define OPEN_TYPE_decode_oer NULL -#define OPEN_TYPE_encode_oer CHOICE_encode_oer -#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ - -#if !defined(ASN_DISABLE_UPER_SUPPORT) -asn_dec_rval_t OPEN_TYPE_uper_get( - const asn_codec_ctx_t *opt_codec_ctx, - const asn_TYPE_descriptor_t *parent_type, - void *parent_structure, - const asn_TYPE_member_t *element, - asn_per_data_t *pd); -#define OPEN_TYPE_decode_uper NULL -asn_enc_rval_t OPEN_TYPE_encode_uper( - const asn_TYPE_descriptor_t *type_descriptor, - const asn_per_constraints_t *constraints, const void *struct_ptr, - asn_per_outp_t *per_output); -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ -#if !defined(ASN_DISABLE_APER_SUPPORT) -asn_dec_rval_t OPEN_TYPE_aper_get( - const asn_codec_ctx_t *opt_codec_ctx, - const asn_TYPE_descriptor_t *parent_type, - void *parent_structure, - const asn_TYPE_member_t *element, - asn_per_data_t *pd); -#define OPEN_TYPE_decode_aper NULL -asn_enc_rval_t OPEN_TYPE_encode_aper( - const asn_TYPE_descriptor_t *type_descriptor, - const asn_per_constraints_t *constraints, const void *struct_ptr, - asn_per_outp_t *per_output); - -int OPEN_TYPE_aper_is_unknown_type( - const asn_TYPE_descriptor_t *td, - void *sptr, - const asn_TYPE_member_t *elm); - -asn_dec_rval_t OPEN_TYPE_aper_unknown_type_discard_bytes( - asn_per_data_t *pd); -#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ - -extern asn_TYPE_operation_t asn_OP_OPEN_TYPE; - -#ifdef __cplusplus -} -#endif - -#endif /* ASN_OPEN_TYPE_H */ +/*- + * Copyright (c) 2017-2017 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#ifndef ASN_OPEN_TYPE_H +#define ASN_OPEN_TYPE_H + +#include +///////////#include + +#ifdef __cplusplus +extern "C" { +#endif + +/* + * Decode an Open Type which is potentially constraiend + * by the other members of the parent structure. + */ + +#undef ADVANCE +#define ADVANCE(num_bytes) \ + do { \ + size_t num = num_bytes; \ + ptr = ((const char *)ptr) + num; \ + size -= num; \ + consumed_myself += num; \ + } while(0) + +#define OPEN_TYPE_free CHOICE_free + +#if !defined(ASN_DISABLE_PRINT_SUPPORT) +#define OPEN_TYPE_print CHOICE_print +#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ + +#define OPEN_TYPE_compare CHOICE_compare + +#define OPEN_TYPE_constraint CHOICE_constraint + +#if !defined(ASN_DISABLE_BER_SUPPORT) +asn_dec_rval_t OPEN_TYPE_ber_get( + const asn_codec_ctx_t *opt_codec_ctx, + const asn_TYPE_descriptor_t *parent_type, + void *parent_structure, + const asn_TYPE_member_t *element, + const void *ptr, size_t size); +#define OPEN_TYPE_decode_ber NULL +#define OPEN_TYPE_encode_der CHOICE_encode_der +#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ + +#if !defined(ASN_DISABLE_XER_SUPPORT) +asn_dec_rval_t OPEN_TYPE_xer_get( + const asn_codec_ctx_t *opt_codec_ctx, + const asn_TYPE_descriptor_t *parent_type, + void *parent_structure, + const asn_TYPE_member_t *element, + const void *ptr, size_t size); +#define OPEN_TYPE_decode_xer NULL +#define OPEN_TYPE_encode_xer CHOICE_encode_xer +#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ + +#if !defined(ASN_DISABLE_JER_SUPPORT) +#define OPEN_TYPE_encode_jer CHOICE_encode_jer +#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ + +#if !defined(ASN_DISABLE_OER_SUPPORT) +asn_dec_rval_t OPEN_TYPE_oer_get( + const asn_codec_ctx_t *opt_codec_ctx, + const asn_TYPE_descriptor_t *parent_type, + void *parent_structure, + asn_TYPE_member_t *element, const void *ptr, + size_t size); +#define OPEN_TYPE_decode_oer NULL +#define OPEN_TYPE_encode_oer CHOICE_encode_oer +#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ + +#if !defined(ASN_DISABLE_UPER_SUPPORT) +asn_dec_rval_t OPEN_TYPE_uper_get( + const asn_codec_ctx_t *opt_codec_ctx, + const asn_TYPE_descriptor_t *parent_type, + void *parent_structure, + const asn_TYPE_member_t *element, + asn_per_data_t *pd); +#define OPEN_TYPE_decode_uper NULL +asn_enc_rval_t OPEN_TYPE_encode_uper( + const asn_TYPE_descriptor_t *type_descriptor, + const asn_per_constraints_t *constraints, const void *struct_ptr, + asn_per_outp_t *per_output); +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ +#if !defined(ASN_DISABLE_APER_SUPPORT) +asn_dec_rval_t OPEN_TYPE_aper_get( + const asn_codec_ctx_t *opt_codec_ctx, + const asn_TYPE_descriptor_t *parent_type, + void *parent_structure, + const asn_TYPE_member_t *element, + asn_per_data_t *pd); +#define OPEN_TYPE_decode_aper NULL +asn_enc_rval_t OPEN_TYPE_encode_aper( + const asn_TYPE_descriptor_t *type_descriptor, + const asn_per_constraints_t *constraints, const void *struct_ptr, + asn_per_outp_t *per_output); + +int OPEN_TYPE_aper_is_unknown_type( + const asn_TYPE_descriptor_t *td, + void *sptr, + const asn_TYPE_member_t *elm); + +asn_dec_rval_t OPEN_TYPE_aper_unknown_type_discard_bytes( + asn_per_data_t *pd); +#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ + +extern asn_TYPE_operation_t asn_OP_OPEN_TYPE; + +#ifdef __cplusplus +} +#endif + +#endif /* ASN_OPEN_TYPE_H */ diff --git a/certgen/asncodec/OPEN_TYPE_oer.c b/certgen/asncodec/OPEN_TYPE_oer.c index 05a5eaad2795c8cfcc94005ee1c07a1835ad010c..1aa86f637c6beadcd734fb001b6dd57d52d9556c 100644 --- a/certgen/asncodec/OPEN_TYPE_oer.c +++ b/certgen/asncodec/OPEN_TYPE_oer.c @@ -1,91 +1,91 @@ -/* - * Copyright (c) 2017 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include -#include - -asn_dec_rval_t -OPEN_TYPE_oer_get(const asn_codec_ctx_t *opt_codec_ctx, - const asn_TYPE_descriptor_t *td, void *sptr, - asn_TYPE_member_t *elm, const void *ptr, size_t size) { - asn_type_selector_result_t selected; - void *memb_ptr; /* Pointer to the member */ - void **memb_ptr2; /* Pointer to that pointer */ - void *inner_value; - asn_dec_rval_t rv; - size_t ot_ret; - - - if(!(elm->flags & ATF_OPEN_TYPE)) { - ASN__DECODE_FAILED; - } - - if(!elm->type_selector) { - ASN_DEBUG("Type selector is not defined for Open Type %s->%s->%s", - td->name, elm->name, elm->type->name); - ASN__DECODE_FAILED; - } - - selected = elm->type_selector(td, sptr); - if(!selected.presence_index) { - ASN__DECODE_FAILED; - } - - /* Fetch the pointer to this member */ - if(elm->flags & ATF_POINTER) { - memb_ptr2 = (void **)((char *)sptr + elm->memb_offset); - } else { - memb_ptr = (char *)sptr + elm->memb_offset; - memb_ptr2 = &memb_ptr; - } - if(*memb_ptr2 != NULL) { - /* Make sure we reset the structure first before encoding */ - if(CHOICE_variant_set_presence(elm->type, *memb_ptr2, 0) != 0) { - ASN__DECODE_FAILED; - } - } - - inner_value = - (char *)*memb_ptr2 - + elm->type->elements[selected.presence_index - 1].memb_offset; - - ot_ret = oer_open_type_get(opt_codec_ctx, selected.type_descriptor, NULL, - &inner_value, ptr, size); - switch(ot_ret) { - default: - if(CHOICE_variant_set_presence(elm->type, *memb_ptr2, - selected.presence_index) - == 0) { - rv.code = RC_OK; - rv.consumed = ot_ret; - return rv; - } else { - /* Oh, now a full-blown failure failure */ - } - /* Fall through */ - case -1: - rv.code = RC_FAIL; - rv.consumed = ot_ret; - break; - case 0: - rv.code = RC_WMORE; - rv.consumed = 0; - break; - } - - if(*memb_ptr2) { - const asn_CHOICE_specifics_t *specs = - selected.type_descriptor->specifics; - if(elm->flags & ATF_POINTER) { - ASN_STRUCT_FREE(*selected.type_descriptor, inner_value); - *memb_ptr2 = NULL; - } else { - ASN_STRUCT_FREE_CONTENTS_ONLY(*selected.type_descriptor, - inner_value); - memset(*memb_ptr2, 0, specs->struct_size); - } - } - return rv; -} +/* + * Copyright (c) 2017 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include +#include + +asn_dec_rval_t +OPEN_TYPE_oer_get(const asn_codec_ctx_t *opt_codec_ctx, + const asn_TYPE_descriptor_t *td, void *sptr, + asn_TYPE_member_t *elm, const void *ptr, size_t size) { + asn_type_selector_result_t selected; + void *memb_ptr; /* Pointer to the member */ + void **memb_ptr2; /* Pointer to that pointer */ + void *inner_value; + asn_dec_rval_t rv; + size_t ot_ret; + + + if(!(elm->flags & ATF_OPEN_TYPE)) { + ASN__DECODE_FAILED; + } + + if(!elm->type_selector) { + ASN_DEBUG("Type selector is not defined for Open Type %s->%s->%s", + td->name, elm->name, elm->type->name); + ASN__DECODE_FAILED; + } + + selected = elm->type_selector(td, sptr); + if(!selected.presence_index) { + ASN__DECODE_FAILED; + } + + /* Fetch the pointer to this member */ + if(elm->flags & ATF_POINTER) { + memb_ptr2 = (void **)((char *)sptr + elm->memb_offset); + } else { + memb_ptr = (char *)sptr + elm->memb_offset; + memb_ptr2 = &memb_ptr; + } + if(*memb_ptr2 != NULL) { + /* Make sure we reset the structure first before encoding */ + if(CHOICE_variant_set_presence(elm->type, *memb_ptr2, 0) != 0) { + ASN__DECODE_FAILED; + } + } + + inner_value = + (char *)*memb_ptr2 + + elm->type->elements[selected.presence_index - 1].memb_offset; + + ot_ret = oer_open_type_get(opt_codec_ctx, selected.type_descriptor, NULL, + &inner_value, ptr, size); + switch(ot_ret) { + default: + if(CHOICE_variant_set_presence(elm->type, *memb_ptr2, + selected.presence_index) + == 0) { + rv.code = RC_OK; + rv.consumed = ot_ret; + return rv; + } else { + /* Oh, now a full-blown failure failure */ + } + /* Fall through */ + case -1: + rv.code = RC_FAIL; + rv.consumed = ot_ret; + break; + case 0: + rv.code = RC_WMORE; + rv.consumed = 0; + break; + } + + if(*memb_ptr2) { + const asn_CHOICE_specifics_t *specs = + selected.type_descriptor->specifics; + if(elm->flags & ATF_POINTER) { + ASN_STRUCT_FREE(*selected.type_descriptor, inner_value); + *memb_ptr2 = NULL; + } else { + ASN_STRUCT_FREE_CONTENTS_ONLY(*selected.type_descriptor, + inner_value); + memset(*memb_ptr2, 0, specs->struct_size); + } + } + return rv; +} diff --git a/certgen/asncodec/OPEN_TYPE_xer.c b/certgen/asncodec/OPEN_TYPE_xer.c index fc38562e99d76e69bf0f388ff7314ff69df4ed43..e359c3bb6c936928d52ed43365b862b76fa6cb06 100644 --- a/certgen/asncodec/OPEN_TYPE_xer.c +++ b/certgen/asncodec/OPEN_TYPE_xer.c @@ -1,166 +1,166 @@ -/* - * Copyright (c) 2017 Lev Walkin . - * All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include -#include - -asn_dec_rval_t -OPEN_TYPE_xer_get(const asn_codec_ctx_t *opt_codec_ctx, - const asn_TYPE_descriptor_t *td, void *sptr, - const asn_TYPE_member_t *elm, const void *ptr, size_t size) { - size_t consumed_myself = 0; - asn_type_selector_result_t selected; - void *memb_ptr; /* Pointer to the member */ - void **memb_ptr2; /* Pointer to that pointer */ - void *inner_value; - asn_dec_rval_t rv; - - int xer_context = 0; - ssize_t ch_size; - pxer_chunk_type_e ch_type; - - if(!(elm->flags & ATF_OPEN_TYPE)) { - ASN__DECODE_FAILED; - } - - if(!elm->type_selector) { - ASN_DEBUG("Type selector is not defined for Open Type %s->%s->%s", - td->name, elm->name, elm->type->name); - ASN__DECODE_FAILED; - } - - selected = elm->type_selector(td, sptr); - if(!selected.presence_index) { - ASN__DECODE_FAILED; - } - - /* Fetch the pointer to this member */ - assert(elm->flags == ATF_OPEN_TYPE); - if(elm->flags & ATF_POINTER) { - memb_ptr2 = (void **)((char *)sptr + elm->memb_offset); - } else { - memb_ptr = (char *)sptr + elm->memb_offset; - memb_ptr2 = &memb_ptr; - } - if(*memb_ptr2 != NULL) { - /* Make sure we reset the structure first before encoding */ - if(CHOICE_variant_set_presence(elm->type, *memb_ptr2, 0) - != 0) { - ASN__DECODE_FAILED; - } - } - - /* - * Confirm wrapper. - */ - for(;;) { - ch_size = xer_next_token(&xer_context, ptr, size, &ch_type); - if(ch_size < 0) { - ASN__DECODE_FAILED; - } else { - switch(ch_type) { - case PXER_WMORE: - ASN__DECODE_STARVED; - case PXER_COMMENT: - case PXER_TEXT: - ADVANCE(ch_size); - continue; - case PXER_TAG: - break; - } - break; - } - } - - /* - * Wrapper value confirmed. - */ - switch(xer_check_tag(ptr, ch_size, elm->name)) { - case XCT_OPENING: - ADVANCE(ch_size); - break; - case XCT_BROKEN: - default: - ASN__DECODE_FAILED; - } - - inner_value = - (char *)*memb_ptr2 - + elm->type->elements[selected.presence_index - 1].memb_offset; - - rv = selected.type_descriptor->op->xer_decoder( - opt_codec_ctx, selected.type_descriptor, &inner_value, NULL, ptr, size); - ADVANCE(rv.consumed); - rv.consumed = 0; - switch(rv.code) { - case RC_OK: - if(CHOICE_variant_set_presence(elm->type, *memb_ptr2, - selected.presence_index) - == 0) { - break; - } else { - rv.code = RC_FAIL; - } - /* Fall through */ - case RC_FAIL: - /* Point to a best position where failure occurred */ - rv.consumed = consumed_myself; - /* Fall through */ - case RC_WMORE: - /* Wrt. rv.consumed==0: - * In case a genuine RC_WMORE, the whole Open Type decoding - * will have to be restarted. - */ - if(*memb_ptr2) { - if(elm->flags & ATF_POINTER) { - ASN_STRUCT_FREE(*selected.type_descriptor, inner_value); - *memb_ptr2 = NULL; - } else { - ASN_STRUCT_RESET(*selected.type_descriptor, - inner_value); - } - } - return rv; - } - - /* - * Finalize wrapper. - */ - for(;;) { - ch_size = xer_next_token(&xer_context, ptr, size, &ch_type); - if(ch_size < 0) { - ASN__DECODE_FAILED; - } else { - switch(ch_type) { - case PXER_WMORE: - ASN__DECODE_STARVED; - case PXER_COMMENT: - case PXER_TEXT: - ADVANCE(ch_size); - continue; - case PXER_TAG: - break; - } - break; - } - } - - /* - * Wrapper value confirmed. - */ - switch(xer_check_tag(ptr, ch_size, elm->name)) { - case XCT_CLOSING: - ADVANCE(ch_size); - break; - case XCT_BROKEN: - default: - ASN__DECODE_FAILED; - } - - rv.consumed += consumed_myself; - - return rv; -} +/* + * Copyright (c) 2017 Lev Walkin . + * All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include +#include + +asn_dec_rval_t +OPEN_TYPE_xer_get(const asn_codec_ctx_t *opt_codec_ctx, + const asn_TYPE_descriptor_t *td, void *sptr, + const asn_TYPE_member_t *elm, const void *ptr, size_t size) { + size_t consumed_myself = 0; + asn_type_selector_result_t selected; + void *memb_ptr; /* Pointer to the member */ + void **memb_ptr2; /* Pointer to that pointer */ + void *inner_value; + asn_dec_rval_t rv; + + int xer_context = 0; + ssize_t ch_size; + pxer_chunk_type_e ch_type; + + if(!(elm->flags & ATF_OPEN_TYPE)) { + ASN__DECODE_FAILED; + } + + if(!elm->type_selector) { + ASN_DEBUG("Type selector is not defined for Open Type %s->%s->%s", + td->name, elm->name, elm->type->name); + ASN__DECODE_FAILED; + } + + selected = elm->type_selector(td, sptr); + if(!selected.presence_index) { + ASN__DECODE_FAILED; + } + + /* Fetch the pointer to this member */ + assert(elm->flags == ATF_OPEN_TYPE); + if(elm->flags & ATF_POINTER) { + memb_ptr2 = (void **)((char *)sptr + elm->memb_offset); + } else { + memb_ptr = (char *)sptr + elm->memb_offset; + memb_ptr2 = &memb_ptr; + } + if(*memb_ptr2 != NULL) { + /* Make sure we reset the structure first before encoding */ + if(CHOICE_variant_set_presence(elm->type, *memb_ptr2, 0) + != 0) { + ASN__DECODE_FAILED; + } + } + + /* + * Confirm wrapper. + */ + for(;;) { + ch_size = xer_next_token(&xer_context, ptr, size, &ch_type); + if(ch_size < 0) { + ASN__DECODE_FAILED; + } else { + switch(ch_type) { + case PXER_WMORE: + ASN__DECODE_STARVED; + case PXER_COMMENT: + case PXER_TEXT: + ADVANCE(ch_size); + continue; + case PXER_TAG: + break; + } + break; + } + } + + /* + * Wrapper value confirmed. + */ + switch(xer_check_tag(ptr, ch_size, elm->name)) { + case XCT_OPENING: + ADVANCE(ch_size); + break; + case XCT_BROKEN: + default: + ASN__DECODE_FAILED; + } + + inner_value = + (char *)*memb_ptr2 + + elm->type->elements[selected.presence_index - 1].memb_offset; + + rv = selected.type_descriptor->op->xer_decoder( + opt_codec_ctx, selected.type_descriptor, &inner_value, NULL, ptr, size); + ADVANCE(rv.consumed); + rv.consumed = 0; + switch(rv.code) { + case RC_OK: + if(CHOICE_variant_set_presence(elm->type, *memb_ptr2, + selected.presence_index) + == 0) { + break; + } else { + rv.code = RC_FAIL; + } + /* Fall through */ + case RC_FAIL: + /* Point to a best position where failure occurred */ + rv.consumed = consumed_myself; + /* Fall through */ + case RC_WMORE: + /* Wrt. rv.consumed==0: + * In case a genuine RC_WMORE, the whole Open Type decoding + * will have to be restarted. + */ + if(*memb_ptr2) { + if(elm->flags & ATF_POINTER) { + ASN_STRUCT_FREE(*selected.type_descriptor, inner_value); + *memb_ptr2 = NULL; + } else { + ASN_STRUCT_RESET(*selected.type_descriptor, + inner_value); + } + } + return rv; + } + + /* + * Finalize wrapper. + */ + for(;;) { + ch_size = xer_next_token(&xer_context, ptr, size, &ch_type); + if(ch_size < 0) { + ASN__DECODE_FAILED; + } else { + switch(ch_type) { + case PXER_WMORE: + ASN__DECODE_STARVED; + case PXER_COMMENT: + case PXER_TEXT: + ADVANCE(ch_size); + continue; + case PXER_TAG: + break; + } + break; + } + } + + /* + * Wrapper value confirmed. + */ + switch(xer_check_tag(ptr, ch_size, elm->name)) { + case XCT_CLOSING: + ADVANCE(ch_size); + break; + case XCT_BROKEN: + default: + ASN__DECODE_FAILED; + } + + rv.consumed += consumed_myself; + + return rv; +} diff --git a/certgen/asncodec/ObjectDescriptor.c b/certgen/asncodec/ObjectDescriptor.c index c311a9291db1620f231b97070c7b75f759ad41a5..9c298d676cd0fb4ec0d9891ebda9c02ce77a92bd 100644 --- a/certgen/asncodec/ObjectDescriptor.c +++ b/certgen/asncodec/ObjectDescriptor.c @@ -1,91 +1,91 @@ -/*- - * Copyright (c) 2003, 2004 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include - -/* - * ObjectDescriptor basic type description. - */ -static const ber_tlv_tag_t asn_DEF_ObjectDescriptor_tags[] = { - (ASN_TAG_CLASS_UNIVERSAL | (7 << 2)), /* [UNIVERSAL 7] IMPLICIT ... */ - (ASN_TAG_CLASS_UNIVERSAL | (4 << 2)) /* ... OCTET STRING */ -}; -asn_TYPE_operation_t asn_OP_ObjectDescriptor = { - OCTET_STRING_free, -#if !defined(ASN_DISABLE_PRINT_SUPPORT) - OCTET_STRING_print_utf8, /* Treat as ASCII subset (it's not) */ -#else - 0, -#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ - OCTET_STRING_compare, -#if !defined(ASN_DISABLE_BER_SUPPORT) - OCTET_STRING_decode_ber, /* Implemented in terms of OCTET STRING */ - OCTET_STRING_encode_der, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ -#if !defined(ASN_DISABLE_XER_SUPPORT) - OCTET_STRING_decode_xer_utf8, - OCTET_STRING_encode_xer_utf8, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ -#if !defined(ASN_DISABLE_JER_SUPPORT) - OCTET_STRING_encode_jer_utf8, -#else - 0, -#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ -#if !defined(ASN_DISABLE_OER_SUPPORT) - 0, - 0, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ -#if !defined(ASN_DISABLE_UPER_SUPPORT) - OCTET_STRING_decode_uper, - OCTET_STRING_encode_uper, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ -#if !defined(ASN_DISABLE_APER_SUPPORT) - OCTET_STRING_decode_aper, - OCTET_STRING_encode_aper, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ -#if !defined(ASN_DISABLE_RFILL_SUPPORT) - 0, /* Not supported for ObjectDescriptor */ -#else - 0, -#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ - 0 /* Use generic outmost tag fetcher */ -}; -asn_TYPE_descriptor_t asn_DEF_ObjectDescriptor = { - "ObjectDescriptor", - "ObjectDescriptor", - &asn_OP_ObjectDescriptor, - asn_DEF_ObjectDescriptor_tags, - sizeof(asn_DEF_ObjectDescriptor_tags) - / sizeof(asn_DEF_ObjectDescriptor_tags[0]) - 1, - asn_DEF_ObjectDescriptor_tags, - sizeof(asn_DEF_ObjectDescriptor_tags) - / sizeof(asn_DEF_ObjectDescriptor_tags[0]), - { -#if !defined(ASN_DISABLE_OER_SUPPORT) - 0, -#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ -#if !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) - 0, -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) */ - asn_generic_unknown_constraint - }, - 0, 0, /* No members */ - 0 /* No specifics */ -}; +/*- + * Copyright (c) 2003, 2004 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include + +/* + * ObjectDescriptor basic type description. + */ +static const ber_tlv_tag_t asn_DEF_ObjectDescriptor_tags[] = { + (ASN_TAG_CLASS_UNIVERSAL | (7 << 2)), /* [UNIVERSAL 7] IMPLICIT ... */ + (ASN_TAG_CLASS_UNIVERSAL | (4 << 2)) /* ... OCTET STRING */ +}; +asn_TYPE_operation_t asn_OP_ObjectDescriptor = { + OCTET_STRING_free, +#if !defined(ASN_DISABLE_PRINT_SUPPORT) + OCTET_STRING_print_utf8, /* Treat as ASCII subset (it's not) */ +#else + 0, +#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ + OCTET_STRING_compare, +#if !defined(ASN_DISABLE_BER_SUPPORT) + OCTET_STRING_decode_ber, /* Implemented in terms of OCTET STRING */ + OCTET_STRING_encode_der, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ +#if !defined(ASN_DISABLE_XER_SUPPORT) + OCTET_STRING_decode_xer_utf8, + OCTET_STRING_encode_xer_utf8, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ +#if !defined(ASN_DISABLE_JER_SUPPORT) + OCTET_STRING_encode_jer_utf8, +#else + 0, +#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ +#if !defined(ASN_DISABLE_OER_SUPPORT) + 0, + 0, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ +#if !defined(ASN_DISABLE_UPER_SUPPORT) + OCTET_STRING_decode_uper, + OCTET_STRING_encode_uper, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ +#if !defined(ASN_DISABLE_APER_SUPPORT) + OCTET_STRING_decode_aper, + OCTET_STRING_encode_aper, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ +#if !defined(ASN_DISABLE_RFILL_SUPPORT) + 0, /* Not supported for ObjectDescriptor */ +#else + 0, +#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ + 0 /* Use generic outmost tag fetcher */ +}; +asn_TYPE_descriptor_t asn_DEF_ObjectDescriptor = { + "ObjectDescriptor", + "ObjectDescriptor", + &asn_OP_ObjectDescriptor, + asn_DEF_ObjectDescriptor_tags, + sizeof(asn_DEF_ObjectDescriptor_tags) + / sizeof(asn_DEF_ObjectDescriptor_tags[0]) - 1, + asn_DEF_ObjectDescriptor_tags, + sizeof(asn_DEF_ObjectDescriptor_tags) + / sizeof(asn_DEF_ObjectDescriptor_tags[0]), + { +#if !defined(ASN_DISABLE_OER_SUPPORT) + 0, +#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ +#if !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) + 0, +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) */ + asn_generic_unknown_constraint + }, + 0, 0, /* No members */ + 0 /* No specifics */ +}; diff --git a/certgen/asncodec/ObjectDescriptor.h b/certgen/asncodec/ObjectDescriptor.h index 852c45d036fed2c3e9294d666309f3c9bc08403f..50b5e09fdb878b338245dad748c2180d54a71096 100644 --- a/certgen/asncodec/ObjectDescriptor.h +++ b/certgen/asncodec/ObjectDescriptor.h @@ -1,54 +1,54 @@ -/*- - * Copyright (c) 2003-2017 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#ifndef _ObjectDescriptor_H_ -#define _ObjectDescriptor_H_ - -#include - -#ifdef __cplusplus -extern "C" { -#endif - -typedef GraphicString_t ObjectDescriptor_t; /* Implemented via GraphicString */ - -extern asn_TYPE_descriptor_t asn_DEF_ObjectDescriptor; -extern asn_TYPE_operation_t asn_OP_ObjectDescriptor; - -#define ObjectDescriptor_free OCTET_STRING_free - -#if !defined(ASN_DISABLE_PRINT_SUPPORT) -#define ObjectDescriptor_print OCTET_STRING_print_utf8 -#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ - -#define ObjectDescriptor_constraint asn_generic_unknown_constraint - -#if !defined(ASN_DISABLE_BER_SUPPORT) -#define ObjectDescriptor_decode_ber OCTET_STRING_decode_ber -#define ObjectDescriptor_encode_der OCTET_STRING_encode_der -#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ - -#if !defined(ASN_DISABLE_XER_SUPPORT) -#define ObjectDescriptor_decode_xer OCTET_STRING_decode_xer_utf8 -#define ObjectDescriptor_encode_xer OCTET_STRING_encode_xer_utf8 -#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ - -#if !defined(ASN_DISABLE_JER_SUPPORT) -#define ObjectDescriptor_encode_jer OCTET_STRING_encode_jer_utf8 -#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ - -#if !defined(ASN_DISABLE_UPER_SUPPORT) -#define ObjectDescriptor_decode_uper OCTET_STRING_decode_uper -#define ObjectDescriptor_encode_uper OCTET_STRING_encode_uper -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ -#if !defined(ASN_DISABLE_APER_SUPPORT) -#define ObjectDescriptor_decode_aper OCTET_STRING_decode_aper -#define ObjectDescriptor_encode_aper OCTET_STRING_encode_aper -#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ - -#ifdef __cplusplus -} -#endif - -#endif /* _ObjectDescriptor_H_ */ +/*- + * Copyright (c) 2003-2017 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#ifndef _ObjectDescriptor_H_ +#define _ObjectDescriptor_H_ + +#include + +#ifdef __cplusplus +extern "C" { +#endif + +typedef GraphicString_t ObjectDescriptor_t; /* Implemented via GraphicString */ + +extern asn_TYPE_descriptor_t asn_DEF_ObjectDescriptor; +extern asn_TYPE_operation_t asn_OP_ObjectDescriptor; + +#define ObjectDescriptor_free OCTET_STRING_free + +#if !defined(ASN_DISABLE_PRINT_SUPPORT) +#define ObjectDescriptor_print OCTET_STRING_print_utf8 +#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ + +#define ObjectDescriptor_constraint asn_generic_unknown_constraint + +#if !defined(ASN_DISABLE_BER_SUPPORT) +#define ObjectDescriptor_decode_ber OCTET_STRING_decode_ber +#define ObjectDescriptor_encode_der OCTET_STRING_encode_der +#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ + +#if !defined(ASN_DISABLE_XER_SUPPORT) +#define ObjectDescriptor_decode_xer OCTET_STRING_decode_xer_utf8 +#define ObjectDescriptor_encode_xer OCTET_STRING_encode_xer_utf8 +#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ + +#if !defined(ASN_DISABLE_JER_SUPPORT) +#define ObjectDescriptor_encode_jer OCTET_STRING_encode_jer_utf8 +#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ + +#if !defined(ASN_DISABLE_UPER_SUPPORT) +#define ObjectDescriptor_decode_uper OCTET_STRING_decode_uper +#define ObjectDescriptor_encode_uper OCTET_STRING_encode_uper +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ +#if !defined(ASN_DISABLE_APER_SUPPORT) +#define ObjectDescriptor_decode_aper OCTET_STRING_decode_aper +#define ObjectDescriptor_encode_aper OCTET_STRING_encode_aper +#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ + +#ifdef __cplusplus +} +#endif + +#endif /* _ObjectDescriptor_H_ */ diff --git a/certgen/asncodec/One28BitCcmCiphertext.c b/certgen/asncodec/One28BitCcmCiphertext.c index 7682a6a3c09f803def65089f558a11129d2b86d6..767d545a274000e9ffb40e46b7bd3d9274832f04 100644 --- a/certgen/asncodec/One28BitCcmCiphertext.c +++ b/certgen/asncodec/One28BitCcmCiphertext.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "One28BitCcmCiphertext.h" diff --git a/certgen/asncodec/One28BitCcmCiphertext.h b/certgen/asncodec/One28BitCcmCiphertext.h index 0c93c56477418c176436356e824a867f96f809d9..282e7bd72415c3e0e622475afcec001864239c04 100644 --- a/certgen/asncodec/One28BitCcmCiphertext.h +++ b/certgen/asncodec/One28BitCcmCiphertext.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/OneEightyDegreeInt.c b/certgen/asncodec/OneEightyDegreeInt.c index 1cd9180e079aaaca7fd8c0fbebf758c834250149..41190d221f3d941fe271f6f29c740d34e8e23531 100644 --- a/certgen/asncodec/OneEightyDegreeInt.c +++ b/certgen/asncodec/OneEightyDegreeInt.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "OneEightyDegreeInt.h" diff --git a/certgen/asncodec/OneEightyDegreeInt.h b/certgen/asncodec/OneEightyDegreeInt.h index 2f8a9ee92a58059eaa0608ab5a9456dd5c6af639..7855180bd14a26168d461a46cab45c4913acf246 100644 --- a/certgen/asncodec/OneEightyDegreeInt.h +++ b/certgen/asncodec/OneEightyDegreeInt.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/Opaque.c b/certgen/asncodec/Opaque.c index 8b900f50be19664a2a64635a801be298e84196d0..c6ee16d06b93178438e2f4fd26704bd49243e1eb 100644 --- a/certgen/asncodec/Opaque.c +++ b/certgen/asncodec/Opaque.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "Opaque.h" diff --git a/certgen/asncodec/Opaque.h b/certgen/asncodec/Opaque.h index 813299db09be69ca1770d9b862934f02d951d2c6..157ea9e19048daa6a225db18a8d58ad613c1243e 100644 --- a/certgen/asncodec/Opaque.h +++ b/certgen/asncodec/Opaque.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/OperatingOrganizationId.c b/certgen/asncodec/OperatingOrganizationId.c index 232397c0fea20abaec51e6f5db3f3649c4340929..7b1dcbc9fdfd566578f65a4b372e2429ba1729c6 100644 --- a/certgen/asncodec/OperatingOrganizationId.c +++ b/certgen/asncodec/OperatingOrganizationId.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "OperatingOrganizationId.h" diff --git a/certgen/asncodec/OperatingOrganizationId.h b/certgen/asncodec/OperatingOrganizationId.h index 2dce7bf8a15c425a6b12ae54882c0ccd5e15f55f..12216a93ae83b4783aea8a997f4a7fae7e359b63 100644 --- a/certgen/asncodec/OperatingOrganizationId.h +++ b/certgen/asncodec/OperatingOrganizationId.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/PKRecipientInfo.c b/certgen/asncodec/PKRecipientInfo.c index a0124d27332509b98cc84c408483ae4e94de2006..24090c10efae3a0140c8b2bbf4b77a73681cda0f 100644 --- a/certgen/asncodec/PKRecipientInfo.c +++ b/certgen/asncodec/PKRecipientInfo.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "PKRecipientInfo.h" diff --git a/certgen/asncodec/PKRecipientInfo.h b/certgen/asncodec/PKRecipientInfo.h index 1d40d0f2262234b8e10177f6bc267055693e95b0..2d16e91ed30f8e90852908f8ee88c7bdf12b7048 100644 --- a/certgen/asncodec/PKRecipientInfo.h +++ b/certgen/asncodec/PKRecipientInfo.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/PduFunctionalType.c b/certgen/asncodec/PduFunctionalType.c index d0595491f175794bb152f2cf2effa60434afa9a1..367114876324c4ced6b53116388147efcf2a916d 100644 --- a/certgen/asncodec/PduFunctionalType.c +++ b/certgen/asncodec/PduFunctionalType.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "PduFunctionalType.h" diff --git a/certgen/asncodec/PduFunctionalType.h b/certgen/asncodec/PduFunctionalType.h index 9a6f6b113595b3ac3b656494eb8719583a6fe6a8..bf131485d4523b3a0f7c4fcdbcd722b86dea27ab 100644 --- a/certgen/asncodec/PduFunctionalType.h +++ b/certgen/asncodec/PduFunctionalType.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/PgSsp.c b/certgen/asncodec/PgSsp.c index 960fc888e7df29a16d963cfff5a3518f6b275b63..11c621982b0687a9de358f7bd230591848aa8626 100644 --- a/certgen/asncodec/PgSsp.c +++ b/certgen/asncodec/PgSsp.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "PgSsp.h" diff --git a/certgen/asncodec/PgSsp.h b/certgen/asncodec/PgSsp.h index bff5a177334eaa1f5e287a5c4e1be97ea1eba21c..2e562427b48f2dbfb812f22642e8a0f2e0cac6e6 100644 --- a/certgen/asncodec/PgSsp.h +++ b/certgen/asncodec/PgSsp.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/PolygonalRegion.c b/certgen/asncodec/PolygonalRegion.c index 6c8362ad41026e98967b73065b813e1eaafa425d..dfb2d4fc5244eb580f34430dd1719ffe50b9b31a 100644 --- a/certgen/asncodec/PolygonalRegion.c +++ b/certgen/asncodec/PolygonalRegion.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "PolygonalRegion.h" diff --git a/certgen/asncodec/PolygonalRegion.h b/certgen/asncodec/PolygonalRegion.h index 4ef4a1c66c046b7a7de65b6f67b063b24825489f..8c47bf97e227c13f46ef8d1bfc9d97d95086ee9b 100644 --- a/certgen/asncodec/PolygonalRegion.h +++ b/certgen/asncodec/PolygonalRegion.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/PreLinkageValue.c b/certgen/asncodec/PreLinkageValue.c index d62f09411e71f50953b4234a7044cba3e4d20eb8..f8afa4d93a047a5e917fa4e6031c5f0eb99aead1 100644 --- a/certgen/asncodec/PreLinkageValue.c +++ b/certgen/asncodec/PreLinkageValue.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1AcaRaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1AcaRaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "PreLinkageValue.h" diff --git a/certgen/asncodec/PreLinkageValue.h b/certgen/asncodec/PreLinkageValue.h index ae95a49ab61eaed2ea0cc02ffef8f0fd4e51b01b..037e09a1f2c505d9b736f3a8757cfcb00f830492 100644 --- a/certgen/asncodec/PreLinkageValue.h +++ b/certgen/asncodec/PreLinkageValue.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1AcaRaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1AcaRaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/PreSharedKeyRecipientInfo.c b/certgen/asncodec/PreSharedKeyRecipientInfo.c index bd66531c00cfba6e6e3f0086fd31d11dc515e279..51533f6cf49fbb3802d3c0de527fe0488f038e71 100644 --- a/certgen/asncodec/PreSharedKeyRecipientInfo.c +++ b/certgen/asncodec/PreSharedKeyRecipientInfo.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "PreSharedKeyRecipientInfo.h" diff --git a/certgen/asncodec/PreSharedKeyRecipientInfo.h b/certgen/asncodec/PreSharedKeyRecipientInfo.h index 4ba8c1266fa37623e1e6b9de329ebbef36e384eb..8837434d412522ece66858eae9de3943b48a8a79 100644 --- a/certgen/asncodec/PreSharedKeyRecipientInfo.h +++ b/certgen/asncodec/PreSharedKeyRecipientInfo.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/Psid.c b/certgen/asncodec/Psid.c index a91d0ea64d501f2f6326aa2b66a58df79ae403f9..aa01e9f711840ba0b030bb207616480b945425d0 100644 --- a/certgen/asncodec/Psid.c +++ b/certgen/asncodec/Psid.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "Psid.h" diff --git a/certgen/asncodec/Psid.h b/certgen/asncodec/Psid.h index 85ba7fc7de1d3cf8ad0539ecef700db7f7f1e85d..54ff4a87e7f86eb697f5f505ed40b4f2f3480de2 100644 --- a/certgen/asncodec/Psid.h +++ b/certgen/asncodec/Psid.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/PsidGroupPermissions.c b/certgen/asncodec/PsidGroupPermissions.c index b364dab3d95db8f14f331992a509f96c01f5682c..2c97d83a3fa9d7a466aac6fcd617362378e94113 100644 --- a/certgen/asncodec/PsidGroupPermissions.c +++ b/certgen/asncodec/PsidGroupPermissions.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "PsidGroupPermissions.h" diff --git a/certgen/asncodec/PsidGroupPermissions.h b/certgen/asncodec/PsidGroupPermissions.h index b335f34777634bdeaa258ddce0f749569ff8190b..06778bd6854c61ed9c875a2c50a722c1383137ef 100644 --- a/certgen/asncodec/PsidGroupPermissions.h +++ b/certgen/asncodec/PsidGroupPermissions.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/PsidSsp.c b/certgen/asncodec/PsidSsp.c index d4d1c86058b224d31484e448d4f6f375a868e1d5..778a85534e77e3646eca3e13a96c03e72ec029f3 100644 --- a/certgen/asncodec/PsidSsp.c +++ b/certgen/asncodec/PsidSsp.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "PsidSsp.h" diff --git a/certgen/asncodec/PsidSsp.h b/certgen/asncodec/PsidSsp.h index 876bb68701ed801e9f8514db5f81dac09d88fe9a..49c977e1e1ed04edc86fc23b2480d66f0a8c2668 100644 --- a/certgen/asncodec/PsidSsp.h +++ b/certgen/asncodec/PsidSsp.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/PsidSspRange.c b/certgen/asncodec/PsidSspRange.c index 0d1b3f859f4e5ade914cbd0d7e39eee79dbd7206..0ecf704bf693b8978db43570be0af6ec200b2f84 100644 --- a/certgen/asncodec/PsidSspRange.c +++ b/certgen/asncodec/PsidSspRange.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "PsidSspRange.h" diff --git a/certgen/asncodec/PsidSspRange.h b/certgen/asncodec/PsidSspRange.h index fed088139744e3f16e7eb5389224948a54b6d0bf..3f49fb3dfc2919faa1b526821a3630a90e89295b 100644 --- a/certgen/asncodec/PsidSspRange.h +++ b/certgen/asncodec/PsidSspRange.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/PublicEncryptionKey.c b/certgen/asncodec/PublicEncryptionKey.c index 9fe8e9abc69ef53a700e1c55b229f71682cf8f20..059a6dfd233eaf29ea2136ca23479c0b54ded7ca 100644 --- a/certgen/asncodec/PublicEncryptionKey.c +++ b/certgen/asncodec/PublicEncryptionKey.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "PublicEncryptionKey.h" diff --git a/certgen/asncodec/PublicEncryptionKey.h b/certgen/asncodec/PublicEncryptionKey.h index 872c4aad1b41fd20f1fd53efe93814661392e990..f9e3136afdca4be46a6009086cc0ed0bb1216290 100644 --- a/certgen/asncodec/PublicEncryptionKey.h +++ b/certgen/asncodec/PublicEncryptionKey.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/PublicKeys.c b/certgen/asncodec/PublicKeys.c index fab3946fe99c9c48abac1a9938eddf7864a854d3..73e8c52c766e140600e3068e5ccd47259a6c9e3b 100644 --- a/certgen/asncodec/PublicKeys.c +++ b/certgen/asncodec/PublicKeys.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941BaseTypes" * found in "asn1/pki_ts102941/EtsiTs102941BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "PublicKeys.h" diff --git a/certgen/asncodec/PublicKeys.h b/certgen/asncodec/PublicKeys.h index 67177b7d30b733f5427b673ed7f9bf670cf20118..0382fdf365ff3451db215eb5b3a848305cb3dfc4 100644 --- a/certgen/asncodec/PublicKeys.h +++ b/certgen/asncodec/PublicKeys.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941BaseTypes" * found in "asn1/pki_ts102941/EtsiTs102941BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/PublicVerificationKey.c b/certgen/asncodec/PublicVerificationKey.c index 0577ce22662d2d4d3a3d97c26510c8451879db43..6affa477728f925a548a7211c68830d1aa136cbb 100644 --- a/certgen/asncodec/PublicVerificationKey.c +++ b/certgen/asncodec/PublicVerificationKey.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "PublicVerificationKey.h" diff --git a/certgen/asncodec/PublicVerificationKey.h b/certgen/asncodec/PublicVerificationKey.h index b8035f09bf5b1c067f84e966dbfe02e082884c26..09b843b62b5b899e52c580d89401e5bb252bc504 100644 --- a/certgen/asncodec/PublicVerificationKey.h +++ b/certgen/asncodec/PublicVerificationKey.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/RaAcaCertRequest.c b/certgen/asncodec/RaAcaCertRequest.c index 4b8e6d6fed55c020f6695a2e49dc185b55499695..3514196c3ca1e070f473893c978ec72c8767fe98 100644 --- a/certgen/asncodec/RaAcaCertRequest.c +++ b/certgen/asncodec/RaAcaCertRequest.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1AcaRaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1AcaRaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "RaAcaCertRequest.h" diff --git a/certgen/asncodec/RaAcaCertRequest.h b/certgen/asncodec/RaAcaCertRequest.h index dffec11aa8608b82cd5ca0661455a8b006df7565..4b76c269ae1b20867e86db0928c44bb840f64a45 100644 --- a/certgen/asncodec/RaAcaCertRequest.h +++ b/certgen/asncodec/RaAcaCertRequest.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1AcaRaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1AcaRaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/RaAcaCertRequestFlags.c b/certgen/asncodec/RaAcaCertRequestFlags.c index bab315e6f8e597506f02002dc0ae747536eab042..0761ea7e6dfc67e3e76eaf1c268a12f9c61e760a 100644 --- a/certgen/asncodec/RaAcaCertRequestFlags.c +++ b/certgen/asncodec/RaAcaCertRequestFlags.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1AcaRaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1AcaRaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "RaAcaCertRequestFlags.h" diff --git a/certgen/asncodec/RaAcaCertRequestFlags.h b/certgen/asncodec/RaAcaCertRequestFlags.h index fa7990ccd45428d0e3f7b0cc7fc65f26b99dd005..a0144b4da3570e6eaa7de856649426ce0561f6f4 100644 --- a/certgen/asncodec/RaAcaCertRequestFlags.h +++ b/certgen/asncodec/RaAcaCertRequestFlags.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1AcaRaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1AcaRaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/RaAcaCertRequestSpdu.c b/certgen/asncodec/RaAcaCertRequestSpdu.c index 7d2a6043d8e5930da52f47001f411686634b843d..1b830e3fe1b41400ec55ced735cf9dae4f5d4f4a 100644 --- a/certgen/asncodec/RaAcaCertRequestSpdu.c +++ b/certgen/asncodec/RaAcaCertRequestSpdu.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "RaAcaCertRequestSpdu.h" diff --git a/certgen/asncodec/RaAcaCertRequestSpdu.h b/certgen/asncodec/RaAcaCertRequestSpdu.h index a9e24613dd99f97d3194cd8264d841b7e6116d0c..77dee73df44cc97af66c41011843ed78d942cecd 100644 --- a/certgen/asncodec/RaAcaCertRequestSpdu.h +++ b/certgen/asncodec/RaAcaCertRequestSpdu.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/RaCamBatchRequest.c b/certgen/asncodec/RaCamBatchRequest.c index ae131dfae5bf62f34e99f75e6a4f559c046aa0c2..c7195d9d9620cbef36e28f1d34172ba3c15e8c8b 100644 --- a/certgen/asncodec/RaCamBatchRequest.c +++ b/certgen/asncodec/RaCamBatchRequest.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1CamRaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1CamRaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "RaCamBatchRequest.h" diff --git a/certgen/asncodec/RaCamBatchRequest.h b/certgen/asncodec/RaCamBatchRequest.h index 05da4166c13bc9ae08d1ca3bf028c6ebfb3be57f..c7a2e53c660d7b445b222d0428c9e958bf1ac7f2 100644 --- a/certgen/asncodec/RaCamBatchRequest.h +++ b/certgen/asncodec/RaCamBatchRequest.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1CamRaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1CamRaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/RaEeCertAck.c b/certgen/asncodec/RaEeCertAck.c index a5d6c55b7fb28959efdfce05e1127e9f9f266ebd..75cfc0bc293a3d52fe9f501f04dd663d7e369c63 100644 --- a/certgen/asncodec/RaEeCertAck.c +++ b/certgen/asncodec/RaEeCertAck.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1EeRaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1EeRaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "RaEeCertAck.h" diff --git a/certgen/asncodec/RaEeCertAck.h b/certgen/asncodec/RaEeCertAck.h index 64290be49ecfd362534c715b8c67a10395d96fea..8359d3f9f09336bddda8de16522b76bab3f16bde 100644 --- a/certgen/asncodec/RaEeCertAck.h +++ b/certgen/asncodec/RaEeCertAck.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1EeRaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1EeRaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/RaEeCertAckSpdu.c b/certgen/asncodec/RaEeCertAckSpdu.c index 159929cb3a8ee54a5c50b84061cc954c572e2ead..fd92422d2315d207576553eba7743bdc8dcb9d95 100644 --- a/certgen/asncodec/RaEeCertAckSpdu.c +++ b/certgen/asncodec/RaEeCertAckSpdu.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "RaEeCertAckSpdu.h" diff --git a/certgen/asncodec/RaEeCertAckSpdu.h b/certgen/asncodec/RaEeCertAckSpdu.h index a15737aa5a8d4f0224e95bb65b968ccee29f183b..3919cd76e795c3ff5ad0aa43da8fb250d80192c2 100644 --- a/certgen/asncodec/RaEeCertAckSpdu.h +++ b/certgen/asncodec/RaEeCertAckSpdu.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/RaEeCertAndAcpcInfoSpdu.c b/certgen/asncodec/RaEeCertAndAcpcInfoSpdu.c index 634c584689ecd5c53ea71aa23d0a0e6b2910dec6..9f7155d1fe621c16415aca31b28b08aa7ba32a91 100644 --- a/certgen/asncodec/RaEeCertAndAcpcInfoSpdu.c +++ b/certgen/asncodec/RaEeCertAndAcpcInfoSpdu.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "RaEeCertAndAcpcInfoSpdu.h" diff --git a/certgen/asncodec/RaEeCertAndAcpcInfoSpdu.h b/certgen/asncodec/RaEeCertAndAcpcInfoSpdu.h index 81b1ba0e4d9e76d267573b6c7f779031cbac64d6..61a520203d427d57be7ea36ab1f4730c02981ecc 100644 --- a/certgen/asncodec/RaEeCertAndAcpcInfoSpdu.h +++ b/certgen/asncodec/RaEeCertAndAcpcInfoSpdu.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/RaEeCertInfo.c b/certgen/asncodec/RaEeCertInfo.c index 94976d20ab27a9b265200c2f8baf547551d34d82..dc70f44bb72537d7807d5283b333355a28fe8560 100644 --- a/certgen/asncodec/RaEeCertInfo.c +++ b/certgen/asncodec/RaEeCertInfo.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1EeRaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1EeRaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "RaEeCertInfo.h" diff --git a/certgen/asncodec/RaEeCertInfo.h b/certgen/asncodec/RaEeCertInfo.h index 58aae3e86e938426563f2c22231eaf754bdc66ce..596982b4f652b261a1fe3c5ffd867600cca8318a 100644 --- a/certgen/asncodec/RaEeCertInfo.h +++ b/certgen/asncodec/RaEeCertInfo.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1EeRaInterface" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1EeRaInterface.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/RaEeCertInfoSpdu.c b/certgen/asncodec/RaEeCertInfoSpdu.c index e1024bb90dd6b287fb660780518b954df74c705f..62bbe18716d1660fda23996af637943df72fb5fa 100644 --- a/certgen/asncodec/RaEeCertInfoSpdu.c +++ b/certgen/asncodec/RaEeCertInfoSpdu.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "RaEeCertInfoSpdu.h" diff --git a/certgen/asncodec/RaEeCertInfoSpdu.h b/certgen/asncodec/RaEeCertInfoSpdu.h index 968ade8366e4d151ea75940fcc2b2dd3618e9b33..ac9a93f0e55bb9f980c68b7fdbd9a703386d9d86 100644 --- a/certgen/asncodec/RaEeCertInfoSpdu.h +++ b/certgen/asncodec/RaEeCertInfoSpdu.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/RaEeEnrollmentCertAckSpdu.c b/certgen/asncodec/RaEeEnrollmentCertAckSpdu.c index 61caa278c213be93c42ad4b3249fd31a64eca81d..89844a7a2163c6ecf8480971218a16e8235c16a8 100644 --- a/certgen/asncodec/RaEeEnrollmentCertAckSpdu.c +++ b/certgen/asncodec/RaEeEnrollmentCertAckSpdu.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "RaEeEnrollmentCertAckSpdu.h" diff --git a/certgen/asncodec/RaEeEnrollmentCertAckSpdu.h b/certgen/asncodec/RaEeEnrollmentCertAckSpdu.h index 8f7438570618c3858a9d87e0afa2fe6c289fe811..b0b43b0c8ec4032dd7f8bc65f01f9cfbc4dde1d6 100644 --- a/certgen/asncodec/RaEeEnrollmentCertAckSpdu.h +++ b/certgen/asncodec/RaEeEnrollmentCertAckSpdu.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/RaSsp.c b/certgen/asncodec/RaSsp.c index 422fd9d1fa0e2b4af5538ad58b6bd7ae80400d30..33a41ca34d9d45b7f8c3aec095c84dac75734ca3 100644 --- a/certgen/asncodec/RaSsp.c +++ b/certgen/asncodec/RaSsp.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "RaSsp.h" diff --git a/certgen/asncodec/RaSsp.h b/certgen/asncodec/RaSsp.h index 3b78d9dc2b4e723f5d43b40dfd6da1a898c1266c..d74ad344bd2f7d0b1b273e7f39892debf2651e09 100644 --- a/certgen/asncodec/RaSsp.h +++ b/certgen/asncodec/RaSsp.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/RcaCertificateTrustListMessage.c b/certgen/asncodec/RcaCertificateTrustListMessage.c index 9232ec65bd11bcba176c25882cc35414bf2188ad..7a680c2000baeb42df50ee0baeb3002f26cd4802 100644 --- a/certgen/asncodec/RcaCertificateTrustListMessage.c +++ b/certgen/asncodec/RcaCertificateTrustListMessage.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941MessagesCa" - * found in "asn1/pki_ts102941/EtsiTs102941MessagesCA.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/pki_ts102941/EtsiTs102941MessagesCa.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "RcaCertificateTrustListMessage.h" diff --git a/certgen/asncodec/RcaCertificateTrustListMessage.h b/certgen/asncodec/RcaCertificateTrustListMessage.h index c9e0e91d90140cf8d1fe00bcd7ec5219ba34cda3..126702bca982fe15bb0f0e6dff627cdb4293d843 100644 --- a/certgen/asncodec/RcaCertificateTrustListMessage.h +++ b/certgen/asncodec/RcaCertificateTrustListMessage.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941MessagesCa" - * found in "asn1/pki_ts102941/EtsiTs102941MessagesCA.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/pki_ts102941/EtsiTs102941MessagesCa.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/RcaDoubleSignedLinkCertificateMessage.c b/certgen/asncodec/RcaDoubleSignedLinkCertificateMessage.c index 7846819d0b027e8e07fff17fc65af3911e22659f..bd9238cdc7b988e1126470f67ff722c2d1a9d769 100644 --- a/certgen/asncodec/RcaDoubleSignedLinkCertificateMessage.c +++ b/certgen/asncodec/RcaDoubleSignedLinkCertificateMessage.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941MessagesCa" - * found in "asn1/pki_ts102941/EtsiTs102941MessagesCA.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/pki_ts102941/EtsiTs102941MessagesCa.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "RcaDoubleSignedLinkCertificateMessage.h" diff --git a/certgen/asncodec/RcaDoubleSignedLinkCertificateMessage.h b/certgen/asncodec/RcaDoubleSignedLinkCertificateMessage.h index 0e8155b73757aef63ff5b9de138ca3198a01276a..f3ea2cc551ce223c996d979e3a9e5a6d65e68fb3 100644 --- a/certgen/asncodec/RcaDoubleSignedLinkCertificateMessage.h +++ b/certgen/asncodec/RcaDoubleSignedLinkCertificateMessage.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941MessagesCa" - * found in "asn1/pki_ts102941/EtsiTs102941MessagesCA.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/pki_ts102941/EtsiTs102941MessagesCa.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/RcaSingleSignedLinkCertificateMessage.c b/certgen/asncodec/RcaSingleSignedLinkCertificateMessage.c index 4b34b43c0903114b705c3e3546212302401171d9..648caf6409a7e824b09949d235f88a345462587c 100644 --- a/certgen/asncodec/RcaSingleSignedLinkCertificateMessage.c +++ b/certgen/asncodec/RcaSingleSignedLinkCertificateMessage.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941MessagesCa" - * found in "asn1/pki_ts102941/EtsiTs102941MessagesCA.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/pki_ts102941/EtsiTs102941MessagesCa.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "RcaSingleSignedLinkCertificateMessage.h" diff --git a/certgen/asncodec/RcaSingleSignedLinkCertificateMessage.h b/certgen/asncodec/RcaSingleSignedLinkCertificateMessage.h index b78abf4af974bf1421ce751d07a228b270cb4c82..7a643824ea8b834780ba0ddf843cee4f88314ada 100644 --- a/certgen/asncodec/RcaSingleSignedLinkCertificateMessage.h +++ b/certgen/asncodec/RcaSingleSignedLinkCertificateMessage.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941MessagesCa" - * found in "asn1/pki_ts102941/EtsiTs102941MessagesCA.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/pki_ts102941/EtsiTs102941MessagesCa.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/RecipientInfo.c b/certgen/asncodec/RecipientInfo.c index a7595298a980b80550240c9b9d3943ba41b880bf..d465fe64379af775f93eb0640f3e67e2c010e0c0 100644 --- a/certgen/asncodec/RecipientInfo.c +++ b/certgen/asncodec/RecipientInfo.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "RecipientInfo.h" diff --git a/certgen/asncodec/RecipientInfo.h b/certgen/asncodec/RecipientInfo.h index 9155c384d698bfe5585b7b618a0fd01ac0240d39..0a2eea3fec6bf5749e131d90638404562aeee190 100644 --- a/certgen/asncodec/RecipientInfo.h +++ b/certgen/asncodec/RecipientInfo.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/ReconstructionValue.c b/certgen/asncodec/ReconstructionValue.c index 51abd8169f70ce6cc720236df3f7540c21fbaf7a..980cfa852c9fb95dc3b8a9153482928f8fa51686 100644 --- a/certgen/asncodec/ReconstructionValue.c +++ b/certgen/asncodec/ReconstructionValue.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "ReconstructionValue.h" diff --git a/certgen/asncodec/ReconstructionValue.h b/certgen/asncodec/ReconstructionValue.h index 4c96c8c355a55e31370de22f6e0111405793ebaa..eb8f8630addcf56d8288f3da24d9298c7717f058 100644 --- a/certgen/asncodec/ReconstructionValue.h +++ b/certgen/asncodec/ReconstructionValue.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/RectangularRegion.c b/certgen/asncodec/RectangularRegion.c index 110159811ffd99c92e737129296a6c6d5a700d3a..875ae7ba109adfe022d300c7e664be0f5e358c04 100644 --- a/certgen/asncodec/RectangularRegion.c +++ b/certgen/asncodec/RectangularRegion.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "RectangularRegion.h" diff --git a/certgen/asncodec/RectangularRegion.h b/certgen/asncodec/RectangularRegion.h index bda7587eee88485f02496c50d6d31eda06ddd9a0..3a0232c699305b3bed1a9c32753b7edd7ab17c29 100644 --- a/certgen/asncodec/RectangularRegion.h +++ b/certgen/asncodec/RectangularRegion.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/RegionAndSubregions.c b/certgen/asncodec/RegionAndSubregions.c index 9081c216ed55a03c0a13a3f5ca4007be733d8e1e..83549dccd9417c42eda98fe815d00757d42aa1ce 100644 --- a/certgen/asncodec/RegionAndSubregions.c +++ b/certgen/asncodec/RegionAndSubregions.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "RegionAndSubregions.h" diff --git a/certgen/asncodec/RegionAndSubregions.h b/certgen/asncodec/RegionAndSubregions.h index 1f14faf7f438742d404b3fb52f5abaf79717ae0d..c0a21283206cfc311590a68f10a11e0aace06ea5 100644 --- a/certgen/asncodec/RegionAndSubregions.h +++ b/certgen/asncodec/RegionAndSubregions.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/RootCaEntry.c b/certgen/asncodec/RootCaEntry.c index 5f732cbb8424630c88c5a57a41c141b3402ce76a..0b7bdc9368b747d6d4c5893235c975ef1c8d15c8 100644 --- a/certgen/asncodec/RootCaEntry.c +++ b/certgen/asncodec/RootCaEntry.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TrustLists" * found in "asn1/pki_ts102941/EtsiTs102941TrustLists.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "RootCaEntry.h" diff --git a/certgen/asncodec/RootCaEntry.h b/certgen/asncodec/RootCaEntry.h index 7459d6ff20d085ffe464cb880cbaf6d4c78f0da7..aafd7229fff6d82dfc7f9c5abf372e499ddcd2bd 100644 --- a/certgen/asncodec/RootCaEntry.h +++ b/certgen/asncodec/RootCaEntry.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TrustLists" * found in "asn1/pki_ts102941/EtsiTs102941TrustLists.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/RootCaSsp.c b/certgen/asncodec/RootCaSsp.c index 7318463820b5a9f246d2b25007d6b88eed35b56e..2dcbe7bdbb97972fd0893fa90e70052aa48ffea3 100644 --- a/certgen/asncodec/RootCaSsp.c +++ b/certgen/asncodec/RootCaSsp.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "RootCaSsp.h" diff --git a/certgen/asncodec/RootCaSsp.h b/certgen/asncodec/RootCaSsp.h index b0990b6c153b7edc966250c2cfe2ade29d7fe75b..96c85bb0900077e04c785d45518511d6d2be1cbd 100644 --- a/certgen/asncodec/RootCaSsp.h +++ b/certgen/asncodec/RootCaSsp.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/ScmsPdu-EeEcaCertRequest.c b/certgen/asncodec/ScmsPdu-EeEcaCertRequest.c index 8a610522696cd8842b3f402c59fd01a820724ee4..6f46abde025cb673888c148170854f476a43869f 100644 --- a/certgen/asncodec/ScmsPdu-EeEcaCertRequest.c +++ b/certgen/asncodec/ScmsPdu-EeEcaCertRequest.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "ScmsPdu-EeEcaCertRequest.h" diff --git a/certgen/asncodec/ScmsPdu-EeEcaCertRequest.h b/certgen/asncodec/ScmsPdu-EeEcaCertRequest.h index d4081729f6f6797c3357dffcfb1c80ec32762c50..47d35a58be27a716d4fa6287ebad0fae47678645 100644 --- a/certgen/asncodec/ScmsPdu-EeEcaCertRequest.h +++ b/certgen/asncodec/ScmsPdu-EeEcaCertRequest.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/ScmsPdu-EeRaCertRequest.c b/certgen/asncodec/ScmsPdu-EeRaCertRequest.c index 99c0f178835aac94ef7de57401a76ba9d35c35d7..1bd1a55f4e77b47f36dd84a65695a4f449432625 100644 --- a/certgen/asncodec/ScmsPdu-EeRaCertRequest.c +++ b/certgen/asncodec/ScmsPdu-EeRaCertRequest.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "ScmsPdu-EeRaCertRequest.h" diff --git a/certgen/asncodec/ScmsPdu-EeRaCertRequest.h b/certgen/asncodec/ScmsPdu-EeRaCertRequest.h index 5ba75f42226ef2677f968b141f1d382bd678e9e9..94b14e70459380467ea2b1f027d75a69c75e02ff 100644 --- a/certgen/asncodec/ScmsPdu-EeRaCertRequest.h +++ b/certgen/asncodec/ScmsPdu-EeRaCertRequest.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/ScmsPdu-EeRaSuccessorEnrollmentCertRequest.c b/certgen/asncodec/ScmsPdu-EeRaSuccessorEnrollmentCertRequest.c index 63fb0be3ba3a64997404e47f231bf84e839f3a78..f9ab71ac20e46f28a309a7b46e97bb1fc9e388cf 100644 --- a/certgen/asncodec/ScmsPdu-EeRaSuccessorEnrollmentCertRequest.c +++ b/certgen/asncodec/ScmsPdu-EeRaSuccessorEnrollmentCertRequest.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "ScmsPdu-EeRaSuccessorEnrollmentCertRequest.h" diff --git a/certgen/asncodec/ScmsPdu-EeRaSuccessorEnrollmentCertRequest.h b/certgen/asncodec/ScmsPdu-EeRaSuccessorEnrollmentCertRequest.h index 2c92cf71794cab81194896aa446d3e053fcd200c..af663272f7b44e9096b6d26ef0d45ae578c4f927 100644 --- a/certgen/asncodec/ScmsPdu-EeRaSuccessorEnrollmentCertRequest.h +++ b/certgen/asncodec/ScmsPdu-EeRaSuccessorEnrollmentCertRequest.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/ScmsPdu-RaAcaCertRequest.c b/certgen/asncodec/ScmsPdu-RaAcaCertRequest.c index 2143d72d51c67d48dd539c1c77a81ce04a695698..76719dbc596232eda321fcde8b847d89fae60bc7 100644 --- a/certgen/asncodec/ScmsPdu-RaAcaCertRequest.c +++ b/certgen/asncodec/ScmsPdu-RaAcaCertRequest.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "ScmsPdu-RaAcaCertRequest.h" diff --git a/certgen/asncodec/ScmsPdu-RaAcaCertRequest.h b/certgen/asncodec/ScmsPdu-RaAcaCertRequest.h index 9c5c055be25d3f2692478adf1e7ace4ab465c5b7..105fa3b6d4384e3ca11759bd927fccad675e6882 100644 --- a/certgen/asncodec/ScmsPdu-RaAcaCertRequest.h +++ b/certgen/asncodec/ScmsPdu-RaAcaCertRequest.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/ScmsPdu-Scoped.c b/certgen/asncodec/ScmsPdu-Scoped.c index 60a8bdf2b2bc20345f797bc207a1536d4a36f0c0..68ab1da09f11fa36bbd741018168b7451cfee783 100644 --- a/certgen/asncodec/ScmsPdu-Scoped.c +++ b/certgen/asncodec/ScmsPdu-Scoped.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "ScmsPdu-Scoped.h" diff --git a/certgen/asncodec/ScmsPdu-Scoped.h b/certgen/asncodec/ScmsPdu-Scoped.h index 7e3a4291cf44ca49486f9920f98c603168150948..5604da1b3eeaed927ee95a844a404dd136ee7d4f 100644 --- a/certgen/asncodec/ScmsPdu-Scoped.h +++ b/certgen/asncodec/ScmsPdu-Scoped.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/ScmsPdu.c b/certgen/asncodec/ScmsPdu.c index 8cdc25bb17078f5f2d218cdf1832247a7e7f4e54..7f0edec1710b325a7043417b71fb7de899020b8a 100644 --- a/certgen/asncodec/ScmsPdu.c +++ b/certgen/asncodec/ScmsPdu.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "ScmsPdu.h" diff --git a/certgen/asncodec/ScmsPdu.h b/certgen/asncodec/ScmsPdu.h index b50bd0bc2058642d9dd3ae8e616f6ab7a34f008f..428a7b14ce6bbcf77cbceccf8bcea284a4556629 100644 --- a/certgen/asncodec/ScmsPdu.h +++ b/certgen/asncodec/ScmsPdu.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/ScopedCertificateRequest.c b/certgen/asncodec/ScopedCertificateRequest.c index 4fa9b92254e547a17199550e58b717f68d312feb..bf90605ee06c2d3476484b33edd120cb45fa225b 100644 --- a/certgen/asncodec/ScopedCertificateRequest.c +++ b/certgen/asncodec/ScopedCertificateRequest.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "ScopedCertificateRequest.h" diff --git a/certgen/asncodec/ScopedCertificateRequest.h b/certgen/asncodec/ScopedCertificateRequest.h index e149125a853f6d439fbf4a511d509f82669b37e0..751103485105e1919784ea20f39a113daf8da2b6 100644 --- a/certgen/asncodec/ScopedCertificateRequest.h +++ b/certgen/asncodec/ScopedCertificateRequest.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/SecuredCrl.c b/certgen/asncodec/SecuredCrl.c index cfc2f3409af74c5ee6b330b62285df38dc4a71f8..a1eebeab74707d218b2f80bd87784c804eb08335 100644 --- a/certgen/asncodec/SecuredCrl.c +++ b/certgen/asncodec/SecuredCrl.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Crl" * found in "asn1/ieee1609.2/Ieee1609Dot2Crl.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "SecuredCrl.h" diff --git a/certgen/asncodec/SecuredCrl.h b/certgen/asncodec/SecuredCrl.h index 77ce2163badc589254bf305a3108b0f766d9c9a8..6fd0bfd142c4f4ad5b4905352223a1022cf97194 100644 --- a/certgen/asncodec/SecuredCrl.h +++ b/certgen/asncodec/SecuredCrl.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Crl" * found in "asn1/ieee1609.2/Ieee1609Dot2Crl.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/SecurityMgmtPsid.c b/certgen/asncodec/SecurityMgmtPsid.c index f522c4fd3ebc976203dff990ee01178d87994a6c..f9f2957c8ce2f5722a4323d2a931fb1fc656adfe 100644 --- a/certgen/asncodec/SecurityMgmtPsid.c +++ b/certgen/asncodec/SecurityMgmtPsid.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "SecurityMgmtPsid.h" diff --git a/certgen/asncodec/SecurityMgmtPsid.h b/certgen/asncodec/SecurityMgmtPsid.h index e5294a44767595cc3795281ed08e36ed3f955444..55ad24a7c9b38812b31a1c3cced4524f480f08ff 100644 --- a/certgen/asncodec/SecurityMgmtPsid.h +++ b/certgen/asncodec/SecurityMgmtPsid.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/SecurityMgmtSsp.c b/certgen/asncodec/SecurityMgmtSsp.c index a80ed673523f204fe7feb2b77ec174bebb39bbeb..fba72c8c7fac5eafa0461145021b04d05748486f 100644 --- a/certgen/asncodec/SecurityMgmtSsp.c +++ b/certgen/asncodec/SecurityMgmtSsp.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "SecurityMgmtSsp.h" diff --git a/certgen/asncodec/SecurityMgmtSsp.h b/certgen/asncodec/SecurityMgmtSsp.h index 36c30de68401cfd45eaf2a825d1eec76d10e7664..1310aecac8ebc70e0ca7b13b91656dfd12f707a9 100644 --- a/certgen/asncodec/SecurityMgmtSsp.h +++ b/certgen/asncodec/SecurityMgmtSsp.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/SeedEvolutionFunctionIdentifier.c b/certgen/asncodec/SeedEvolutionFunctionIdentifier.c index e4a073514b370d0be9fce7787d5101c39b7391eb..ddfc8e1cd0956f575ddb6e979ccd0dec38801d4e 100644 --- a/certgen/asncodec/SeedEvolutionFunctionIdentifier.c +++ b/certgen/asncodec/SeedEvolutionFunctionIdentifier.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2CrlBaseTypes" * found in "asn1/ieee1609.2/Ieee1609Dot2CrlBaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "SeedEvolutionFunctionIdentifier.h" diff --git a/certgen/asncodec/SeedEvolutionFunctionIdentifier.h b/certgen/asncodec/SeedEvolutionFunctionIdentifier.h index fc7a4c14caa4d1a1301a122cd6fb4adbcd6fca6b..99190182b91bb46f886ec77ccc87e8e34e30ae41 100644 --- a/certgen/asncodec/SeedEvolutionFunctionIdentifier.h +++ b/certgen/asncodec/SeedEvolutionFunctionIdentifier.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2CrlBaseTypes" * found in "asn1/ieee1609.2/Ieee1609Dot2CrlBaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/SequenceOfAppExtensions.c b/certgen/asncodec/SequenceOfAppExtensions.c index 7e3376a15dee940d8270cf6cf68b2c93acf9c6e7..0b866e45749c1d57143e46cfa7dfa1324c1d7481 100644 --- a/certgen/asncodec/SequenceOfAppExtensions.c +++ b/certgen/asncodec/SequenceOfAppExtensions.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "SequenceOfAppExtensions.h" diff --git a/certgen/asncodec/SequenceOfAppExtensions.h b/certgen/asncodec/SequenceOfAppExtensions.h index c8118932869285c5c93123dc957a81ab929b0552..7bb8ac99a2a407fe43f1f4f5536f8f51a948e72b 100644 --- a/certgen/asncodec/SequenceOfAppExtensions.h +++ b/certgen/asncodec/SequenceOfAppExtensions.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/SequenceOfCertIssueExtensions.c b/certgen/asncodec/SequenceOfCertIssueExtensions.c index 1f7e0a20dd5eea7bf5d2afadcea76fbe4c6a0440..d18192dd1553d9e1e3bc764fb835f0503523e6ae 100644 --- a/certgen/asncodec/SequenceOfCertIssueExtensions.c +++ b/certgen/asncodec/SequenceOfCertIssueExtensions.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "SequenceOfCertIssueExtensions.h" diff --git a/certgen/asncodec/SequenceOfCertIssueExtensions.h b/certgen/asncodec/SequenceOfCertIssueExtensions.h index 62dcd2cc9ffce42cc93c9972e69a6080ac083548..69cbeedf2c43f3a3b093055823dbc346f425625f 100644 --- a/certgen/asncodec/SequenceOfCertIssueExtensions.h +++ b/certgen/asncodec/SequenceOfCertIssueExtensions.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/SequenceOfCertRequestExtensions.c b/certgen/asncodec/SequenceOfCertRequestExtensions.c index 1d9d5b9060ba1484fec1b15993769f6abfeb1a89..d84c2095c0130653fe0fe382cd71a18fca73bf50 100644 --- a/certgen/asncodec/SequenceOfCertRequestExtensions.c +++ b/certgen/asncodec/SequenceOfCertRequestExtensions.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "SequenceOfCertRequestExtensions.h" diff --git a/certgen/asncodec/SequenceOfCertRequestExtensions.h b/certgen/asncodec/SequenceOfCertRequestExtensions.h index 68251d26d31376ee6eae007733ed67688565738b..76d58400b825df8c419b4de9a62706bbaff786d6 100644 --- a/certgen/asncodec/SequenceOfCertRequestExtensions.h +++ b/certgen/asncodec/SequenceOfCertRequestExtensions.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/SequenceOfCertificate.c b/certgen/asncodec/SequenceOfCertificate.c index 83b9571815dcdef6757f5098fbdb228cca1bcbc4..5dedaeabac2177a194a1dc72955fff25af80cd95 100644 --- a/certgen/asncodec/SequenceOfCertificate.c +++ b/certgen/asncodec/SequenceOfCertificate.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "SequenceOfCertificate.h" diff --git a/certgen/asncodec/SequenceOfCertificate.h b/certgen/asncodec/SequenceOfCertificate.h index f25abd2ffd10a1579adc87c3a84893e059d742a7..cf262d7a31b604f580cb9e665777647c7d2ea818 100644 --- a/certgen/asncodec/SequenceOfCertificate.h +++ b/certgen/asncodec/SequenceOfCertificate.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/SequenceOfCrlInfoStatus.c b/certgen/asncodec/SequenceOfCrlInfoStatus.c index 8f19a819012895a0aee7211ac2fddc788bb6201a..0fa4223dc3549132bad6e9eec919893fee6901cb 100644 --- a/certgen/asncodec/SequenceOfCrlInfoStatus.c +++ b/certgen/asncodec/SequenceOfCrlInfoStatus.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1CertManagement" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1CertManagement.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "SequenceOfCrlInfoStatus.h" diff --git a/certgen/asncodec/SequenceOfCrlInfoStatus.h b/certgen/asncodec/SequenceOfCrlInfoStatus.h index c713f60a4c46e71fda138ee10d2cc5631ef66e5a..a2ccac1f2bb82671833595a8bae212aa295e321e 100644 --- a/certgen/asncodec/SequenceOfCrlInfoStatus.h +++ b/certgen/asncodec/SequenceOfCrlInfoStatus.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1CertManagement" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1CertManagement.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/SequenceOfCtlInfoStatus.c b/certgen/asncodec/SequenceOfCtlInfoStatus.c index e60f47bcc9f30095afc3481ddc840ec403a16338..e5b52cd0ae6f4638c1e6bfac784f56c158dae00d 100644 --- a/certgen/asncodec/SequenceOfCtlInfoStatus.c +++ b/certgen/asncodec/SequenceOfCtlInfoStatus.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1CertManagement" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1CertManagement.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "SequenceOfCtlInfoStatus.h" diff --git a/certgen/asncodec/SequenceOfCtlInfoStatus.h b/certgen/asncodec/SequenceOfCtlInfoStatus.h index ddec7d66a01c27c0dd8a4c0c577d2fbdf1818dde..3797cc0353d40a3cc14cb56c4dff68683da78d49 100644 --- a/certgen/asncodec/SequenceOfCtlInfoStatus.h +++ b/certgen/asncodec/SequenceOfCtlInfoStatus.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1CertManagement" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1CertManagement.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/SequenceOfGroupCrlEntry.c b/certgen/asncodec/SequenceOfGroupCrlEntry.c index dbda7d53d407f6b64b8feca9402a12b108c92c9e..26998e7758a4f610ec8c3ae55b7e98b92e1f0d34 100644 --- a/certgen/asncodec/SequenceOfGroupCrlEntry.c +++ b/certgen/asncodec/SequenceOfGroupCrlEntry.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2CrlBaseTypes" * found in "asn1/ieee1609.2/Ieee1609Dot2CrlBaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "SequenceOfGroupCrlEntry.h" diff --git a/certgen/asncodec/SequenceOfGroupCrlEntry.h b/certgen/asncodec/SequenceOfGroupCrlEntry.h index ee10198ed3697eafba96bba943a88c682c3e10d7..e0d2ee041e56faf2639e769194b3af70772181d7 100644 --- a/certgen/asncodec/SequenceOfGroupCrlEntry.h +++ b/certgen/asncodec/SequenceOfGroupCrlEntry.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2CrlBaseTypes" * found in "asn1/ieee1609.2/Ieee1609Dot2CrlBaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/SequenceOfGroupSingleSeedCrlEntry.c b/certgen/asncodec/SequenceOfGroupSingleSeedCrlEntry.c index cd5a9fbfbb71201cd25a4526f2de4ac450561cab..2ec3293cd955a7fd25ae1e8f8b3fd6440c380926 100644 --- a/certgen/asncodec/SequenceOfGroupSingleSeedCrlEntry.c +++ b/certgen/asncodec/SequenceOfGroupSingleSeedCrlEntry.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2CrlBaseTypes" * found in "asn1/ieee1609.2/Ieee1609Dot2CrlBaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "SequenceOfGroupSingleSeedCrlEntry.h" diff --git a/certgen/asncodec/SequenceOfGroupSingleSeedCrlEntry.h b/certgen/asncodec/SequenceOfGroupSingleSeedCrlEntry.h index a939e795ea39bf960ca4cc0d557fd7e7edee4548..90a09c9ec0de924034e75a0d720b94db5ee74af2 100644 --- a/certgen/asncodec/SequenceOfGroupSingleSeedCrlEntry.h +++ b/certgen/asncodec/SequenceOfGroupSingleSeedCrlEntry.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2CrlBaseTypes" * found in "asn1/ieee1609.2/Ieee1609Dot2CrlBaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/SequenceOfHashBasedRevocationInfo.c b/certgen/asncodec/SequenceOfHashBasedRevocationInfo.c index 9d9587bdaf04e0714c5a102d168cf676c6a92dff..91a9684c1c12dac926ff7de788cad3b9ff2113d4 100644 --- a/certgen/asncodec/SequenceOfHashBasedRevocationInfo.c +++ b/certgen/asncodec/SequenceOfHashBasedRevocationInfo.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2CrlBaseTypes" * found in "asn1/ieee1609.2/Ieee1609Dot2CrlBaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "SequenceOfHashBasedRevocationInfo.h" diff --git a/certgen/asncodec/SequenceOfHashBasedRevocationInfo.h b/certgen/asncodec/SequenceOfHashBasedRevocationInfo.h index ff356d5fd49e750e238a9ddb35a107bf59f82175..f29722e6283dacfae48641bc6eb4841f6b18b5a0 100644 --- a/certgen/asncodec/SequenceOfHashBasedRevocationInfo.h +++ b/certgen/asncodec/SequenceOfHashBasedRevocationInfo.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2CrlBaseTypes" * found in "asn1/ieee1609.2/Ieee1609Dot2CrlBaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/SequenceOfHashedId3.c b/certgen/asncodec/SequenceOfHashedId3.c index aceede824e42a92ffa380417a395d7c17237b4ab..63dad433d43a670a3e49318a9b6d858032afa524 100644 --- a/certgen/asncodec/SequenceOfHashedId3.c +++ b/certgen/asncodec/SequenceOfHashedId3.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "SequenceOfHashedId3.h" diff --git a/certgen/asncodec/SequenceOfHashedId3.h b/certgen/asncodec/SequenceOfHashedId3.h index 7225ff03fc7beee47bbc592d06294a6c3e2e86dd..f0469ff52f2b95ee78df6eb8773d398890ef5b3d 100644 --- a/certgen/asncodec/SequenceOfHashedId3.h +++ b/certgen/asncodec/SequenceOfHashedId3.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/SequenceOfIMaxGroup.c b/certgen/asncodec/SequenceOfIMaxGroup.c index da8fffc3fcd90d1abd56de847ebcd92588dcdc97..bacf7e49bf29ab312cdd8a016d1256e1d1f795e0 100644 --- a/certgen/asncodec/SequenceOfIMaxGroup.c +++ b/certgen/asncodec/SequenceOfIMaxGroup.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2CrlBaseTypes" * found in "asn1/ieee1609.2/Ieee1609Dot2CrlBaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "SequenceOfIMaxGroup.h" diff --git a/certgen/asncodec/SequenceOfIMaxGroup.h b/certgen/asncodec/SequenceOfIMaxGroup.h index 2d497ec87b475c68e575fbc1fa5980f21afa82b7..60da7425c672567a166a50071eb6b5a2a4018feb 100644 --- a/certgen/asncodec/SequenceOfIMaxGroup.h +++ b/certgen/asncodec/SequenceOfIMaxGroup.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2CrlBaseTypes" * found in "asn1/ieee1609.2/Ieee1609Dot2CrlBaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/SequenceOfIdentifiedRegion.c b/certgen/asncodec/SequenceOfIdentifiedRegion.c index 13fe5782da20787bf5fb313d2f7af0f53095ff29..a0c3e56219a7984a29acb231cf03713613e1f61a 100644 --- a/certgen/asncodec/SequenceOfIdentifiedRegion.c +++ b/certgen/asncodec/SequenceOfIdentifiedRegion.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "SequenceOfIdentifiedRegion.h" diff --git a/certgen/asncodec/SequenceOfIdentifiedRegion.h b/certgen/asncodec/SequenceOfIdentifiedRegion.h index 90161ada0e08cd8e1b42d0e2b3710564a1902fe6..c0b361f410e67389ebe02889c5958dd544882a45 100644 --- a/certgen/asncodec/SequenceOfIdentifiedRegion.h +++ b/certgen/asncodec/SequenceOfIdentifiedRegion.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/SequenceOfIndividualRevocation.c b/certgen/asncodec/SequenceOfIndividualRevocation.c index f09dc90416219dd7392d5ddf25010371db61c6aa..ae5380782d5002508881d769ad2c067744a69e27 100644 --- a/certgen/asncodec/SequenceOfIndividualRevocation.c +++ b/certgen/asncodec/SequenceOfIndividualRevocation.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2CrlBaseTypes" * found in "asn1/ieee1609.2/Ieee1609Dot2CrlBaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "SequenceOfIndividualRevocation.h" diff --git a/certgen/asncodec/SequenceOfIndividualRevocation.h b/certgen/asncodec/SequenceOfIndividualRevocation.h index d20df8234d7c19745bf7bd0c5cafeb54c2788c2b..76532f7cea20bcba22cb9a5bc4e82fad7542ad1c 100644 --- a/certgen/asncodec/SequenceOfIndividualRevocation.h +++ b/certgen/asncodec/SequenceOfIndividualRevocation.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2CrlBaseTypes" * found in "asn1/ieee1609.2/Ieee1609Dot2CrlBaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/SequenceOfJMaxGroup.c b/certgen/asncodec/SequenceOfJMaxGroup.c index 7d85f7a3e2baf755d05158d20ae5ee929f05e84a..3bcbf4b6f1715b12b77fe579e8a38c234244f3dc 100644 --- a/certgen/asncodec/SequenceOfJMaxGroup.c +++ b/certgen/asncodec/SequenceOfJMaxGroup.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2CrlBaseTypes" * found in "asn1/ieee1609.2/Ieee1609Dot2CrlBaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "SequenceOfJMaxGroup.h" diff --git a/certgen/asncodec/SequenceOfJMaxGroup.h b/certgen/asncodec/SequenceOfJMaxGroup.h index 498a69d27d469cebae98f1e6fbc0bdca232033da..df5451df919c8efdd574feca2bd6c1735584586e 100644 --- a/certgen/asncodec/SequenceOfJMaxGroup.h +++ b/certgen/asncodec/SequenceOfJMaxGroup.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2CrlBaseTypes" * found in "asn1/ieee1609.2/Ieee1609Dot2CrlBaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/SequenceOfLAGroup.c b/certgen/asncodec/SequenceOfLAGroup.c index ae9969258a3e7c0cfc11fdba8dbd5a5a0cc7498f..7e199042b6db355a209fffa2c0c1c27f91870844 100644 --- a/certgen/asncodec/SequenceOfLAGroup.c +++ b/certgen/asncodec/SequenceOfLAGroup.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2CrlBaseTypes" * found in "asn1/ieee1609.2/Ieee1609Dot2CrlBaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "SequenceOfLAGroup.h" diff --git a/certgen/asncodec/SequenceOfLAGroup.h b/certgen/asncodec/SequenceOfLAGroup.h index 6ad4efa0f26639f781b78c540dfc9a722e66f261..528f0fac5b94d3cfd974acaf509f8a2d134bff09 100644 --- a/certgen/asncodec/SequenceOfLAGroup.h +++ b/certgen/asncodec/SequenceOfLAGroup.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2CrlBaseTypes" * found in "asn1/ieee1609.2/Ieee1609Dot2CrlBaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/SequenceOfLinkageSeed.c b/certgen/asncodec/SequenceOfLinkageSeed.c index 7a648b847543bd60f338f68279416afe857b7a73..d8ae007ea25079d1e75772175f00a540860d6063 100644 --- a/certgen/asncodec/SequenceOfLinkageSeed.c +++ b/certgen/asncodec/SequenceOfLinkageSeed.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "SequenceOfLinkageSeed.h" diff --git a/certgen/asncodec/SequenceOfLinkageSeed.h b/certgen/asncodec/SequenceOfLinkageSeed.h index c1a677a112be2ecd42ecf0024b0b39c6f4ef5fc9..8c34c23836fc91d4b6203d8b2173bbf179bd7d2a 100644 --- a/certgen/asncodec/SequenceOfLinkageSeed.h +++ b/certgen/asncodec/SequenceOfLinkageSeed.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/SequenceOfMaInfoStatus.c b/certgen/asncodec/SequenceOfMaInfoStatus.c index ab9c443a60d6e09372d172050a0509a455e8393c..ae0a62dbf76ec7caab42c78b35f5a475afc11f9c 100644 --- a/certgen/asncodec/SequenceOfMaInfoStatus.c +++ b/certgen/asncodec/SequenceOfMaInfoStatus.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1CertManagement" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1CertManagement.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "SequenceOfMaInfoStatus.h" diff --git a/certgen/asncodec/SequenceOfMaInfoStatus.h b/certgen/asncodec/SequenceOfMaInfoStatus.h index 59694ed3fcede15f5a45f4a4e464a2bcaf07afe7..d2973115128177ea69fcad8ae7a89aeb83430281 100644 --- a/certgen/asncodec/SequenceOfMaInfoStatus.h +++ b/certgen/asncodec/SequenceOfMaInfoStatus.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1CertManagement" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1CertManagement.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/SequenceOfOctetString.c b/certgen/asncodec/SequenceOfOctetString.c index 1702e8f383a583a4e257f6b536e7c3d0783b1d3f..3174513a674d1819f7c94261b6de363ec50e0ba2 100644 --- a/certgen/asncodec/SequenceOfOctetString.c +++ b/certgen/asncodec/SequenceOfOctetString.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "SequenceOfOctetString.h" diff --git a/certgen/asncodec/SequenceOfOctetString.h b/certgen/asncodec/SequenceOfOctetString.h index f180157cb1230b3af88bb86a1bd2d37419aee5be..52285cac1604d40cb9124311d25f26f2999867aa 100644 --- a/certgen/asncodec/SequenceOfOctetString.h +++ b/certgen/asncodec/SequenceOfOctetString.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/SequenceOfPsid.c b/certgen/asncodec/SequenceOfPsid.c index 2f9b34cfdc9be6af34b2a7035104371bdb2e2466..0794571b306fb3bbffe2c6de502e6ccd21b1b4ae 100644 --- a/certgen/asncodec/SequenceOfPsid.c +++ b/certgen/asncodec/SequenceOfPsid.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "SequenceOfPsid.h" diff --git a/certgen/asncodec/SequenceOfPsid.h b/certgen/asncodec/SequenceOfPsid.h index a38f98af749c9eb9203e080535ac86812f729060..2bf06657e5bbd557b4f8e58eb4cc1f4ad50bedf8 100644 --- a/certgen/asncodec/SequenceOfPsid.h +++ b/certgen/asncodec/SequenceOfPsid.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/SequenceOfPsidGroupPermissions.c b/certgen/asncodec/SequenceOfPsidGroupPermissions.c index 37bcb869b9ff85e430c13fc0da8bbca2858449c1..dd12a5ee01d13719d2131609e123e3d48fb587df 100644 --- a/certgen/asncodec/SequenceOfPsidGroupPermissions.c +++ b/certgen/asncodec/SequenceOfPsidGroupPermissions.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "SequenceOfPsidGroupPermissions.h" diff --git a/certgen/asncodec/SequenceOfPsidGroupPermissions.h b/certgen/asncodec/SequenceOfPsidGroupPermissions.h index e114faa0b738a528702625412c278b98a60771e1..b0d481a5389f43d81bb5aec08184c0fbc086e3d1 100644 --- a/certgen/asncodec/SequenceOfPsidGroupPermissions.h +++ b/certgen/asncodec/SequenceOfPsidGroupPermissions.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/SequenceOfPsidSsp.c b/certgen/asncodec/SequenceOfPsidSsp.c index 96eafe1c10ba49cccb140763e464a3b15df3bf60..25c26d197091d6d2a3625a77154ace77a72c2f0b 100644 --- a/certgen/asncodec/SequenceOfPsidSsp.c +++ b/certgen/asncodec/SequenceOfPsidSsp.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "SequenceOfPsidSsp.h" diff --git a/certgen/asncodec/SequenceOfPsidSsp.h b/certgen/asncodec/SequenceOfPsidSsp.h index e0a90e646bfffd3fba60262eadf58f6801dd3527..adda2f40bf48463a6ad3f401fdd5930d64992af8 100644 --- a/certgen/asncodec/SequenceOfPsidSsp.h +++ b/certgen/asncodec/SequenceOfPsidSsp.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/SequenceOfPsidSspRange.c b/certgen/asncodec/SequenceOfPsidSspRange.c index 53905ab841a2b9f087edbef587df32cae56c7bbd..94551be97b9431ac48e8dd3266ae898549631832 100644 --- a/certgen/asncodec/SequenceOfPsidSspRange.c +++ b/certgen/asncodec/SequenceOfPsidSspRange.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "SequenceOfPsidSspRange.h" diff --git a/certgen/asncodec/SequenceOfPsidSspRange.h b/certgen/asncodec/SequenceOfPsidSspRange.h index fdad0d1d2cc5e1df0c00ea64397c9aafd1955a5d..436767d9436b6d88b20b069f3dae20441ffd9f77 100644 --- a/certgen/asncodec/SequenceOfPsidSspRange.h +++ b/certgen/asncodec/SequenceOfPsidSspRange.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/SequenceOfRecipientInfo.c b/certgen/asncodec/SequenceOfRecipientInfo.c index 82dcbbaa056f2221a953aefc5d735078f9ef7edd..c1a59ff3a1312f12906be587efb7f70c573c4952 100644 --- a/certgen/asncodec/SequenceOfRecipientInfo.c +++ b/certgen/asncodec/SequenceOfRecipientInfo.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "SequenceOfRecipientInfo.h" diff --git a/certgen/asncodec/SequenceOfRecipientInfo.h b/certgen/asncodec/SequenceOfRecipientInfo.h index 93e8c15483e2138092ce9f77e33fba4701ea9b31..f6a6af3d7267e45936ea25e9b6aaf1a2f93d2a44 100644 --- a/certgen/asncodec/SequenceOfRecipientInfo.h +++ b/certgen/asncodec/SequenceOfRecipientInfo.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/SequenceOfRectangularRegion.c b/certgen/asncodec/SequenceOfRectangularRegion.c index 1d719f60dca54491b38ccadac3cec2e0cb8cff9b..ab2be7616ba2cd310b770365b325f2f015ba1e5f 100644 --- a/certgen/asncodec/SequenceOfRectangularRegion.c +++ b/certgen/asncodec/SequenceOfRectangularRegion.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "SequenceOfRectangularRegion.h" diff --git a/certgen/asncodec/SequenceOfRectangularRegion.h b/certgen/asncodec/SequenceOfRectangularRegion.h index c8c951dcf1e0a55caaba48afdf7b50346796b334..6e6efa65a6c036c97ae41c517ac9a06b50b68db7 100644 --- a/certgen/asncodec/SequenceOfRectangularRegion.h +++ b/certgen/asncodec/SequenceOfRectangularRegion.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/SequenceOfRegionAndSubregions.c b/certgen/asncodec/SequenceOfRegionAndSubregions.c index d6302108192be61490394671e3748f754e1dbe8d..1357bf857ada82d9b8c13c935d1a686458127e5d 100644 --- a/certgen/asncodec/SequenceOfRegionAndSubregions.c +++ b/certgen/asncodec/SequenceOfRegionAndSubregions.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "SequenceOfRegionAndSubregions.h" diff --git a/certgen/asncodec/SequenceOfRegionAndSubregions.h b/certgen/asncodec/SequenceOfRegionAndSubregions.h index d085d92a049953476f27c16ac913289b9ed51cd4..09fef008d60bc2e74ee2e1b4955b56d07be83b95 100644 --- a/certgen/asncodec/SequenceOfRegionAndSubregions.h +++ b/certgen/asncodec/SequenceOfRegionAndSubregions.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/SequenceOfUint16.c b/certgen/asncodec/SequenceOfUint16.c index ca10d916c3f419b358398365fe7a9c656c940fd6..f61ff0b3175986ff16517cbeffbf0d24312fe19e 100644 --- a/certgen/asncodec/SequenceOfUint16.c +++ b/certgen/asncodec/SequenceOfUint16.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "SequenceOfUint16.h" diff --git a/certgen/asncodec/SequenceOfUint16.h b/certgen/asncodec/SequenceOfUint16.h index 8d4ff80c0a67c27760b92bd3f44c3f67b43840b5..303ec2ddf479fe5c854d75fa1f8c7da0a48c0da6 100644 --- a/certgen/asncodec/SequenceOfUint16.h +++ b/certgen/asncodec/SequenceOfUint16.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/SequenceOfUint8.c b/certgen/asncodec/SequenceOfUint8.c index 2be10778c4d74d74bc35cc55cb7f3f94bb3822e0..63d1e559cd425a8a76fce0a68d1871e9d9f08974 100644 --- a/certgen/asncodec/SequenceOfUint8.c +++ b/certgen/asncodec/SequenceOfUint8.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "SequenceOfUint8.h" diff --git a/certgen/asncodec/SequenceOfUint8.h b/certgen/asncodec/SequenceOfUint8.h index ce1f32ebe82037cba77df19e79fe3ce4bbd51501..63bd332ebff1dd6a9acf6a7e0d9cb0eb70970c06 100644 --- a/certgen/asncodec/SequenceOfUint8.h +++ b/certgen/asncodec/SequenceOfUint8.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/SequenceOfX509Certificate.c b/certgen/asncodec/SequenceOfX509Certificate.c index bdf2474ed6cf056dcae41b9cdbd2c1d7ddcb83ab..cc1a8384caedadf63a4d9b00a9dc484526fd72d7 100644 --- a/certgen/asncodec/SequenceOfX509Certificate.c +++ b/certgen/asncodec/SequenceOfX509Certificate.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "SequenceOfX509Certificate.h" diff --git a/certgen/asncodec/SequenceOfX509Certificate.h b/certgen/asncodec/SequenceOfX509Certificate.h index f3a973ad553ac340dd780735b1812e4885862adc..b00274e420bf141c82c18553ffbefb0c9122a35a 100644 --- a/certgen/asncodec/SequenceOfX509Certificate.h +++ b/certgen/asncodec/SequenceOfX509Certificate.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/ServiceSpecificPermissions.c b/certgen/asncodec/ServiceSpecificPermissions.c index ff2ecca7952d2e070f137dbff4bb02f9d74c217d..b21d315ed22277c81372a6b39b56fb08907fb936 100644 --- a/certgen/asncodec/ServiceSpecificPermissions.c +++ b/certgen/asncodec/ServiceSpecificPermissions.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "ServiceSpecificPermissions.h" diff --git a/certgen/asncodec/ServiceSpecificPermissions.h b/certgen/asncodec/ServiceSpecificPermissions.h index aa25f9d9d25d721dc8310bf2c4349cc038e94390..ab4208a673fbe97a7bb6b02a7f20f81319987561 100644 --- a/certgen/asncodec/ServiceSpecificPermissions.h +++ b/certgen/asncodec/ServiceSpecificPermissions.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/SharedAtRequest.c b/certgen/asncodec/SharedAtRequest.c index 58452df0d363489fb93dbb5d4511fc03f8255e14..c9cea369bec3009cabef487af9285c892a7632d4 100644 --- a/certgen/asncodec/SharedAtRequest.c +++ b/certgen/asncodec/SharedAtRequest.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TypesAuthorization" * found in "asn1/pki_ts102941/EtsiTs102941TypesAuthorization.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "SharedAtRequest.h" diff --git a/certgen/asncodec/SharedAtRequest.h b/certgen/asncodec/SharedAtRequest.h index 58ee62c1694443449f7be82ae014f606df5038b8..1ebce6946f8cacf3413a654d7f8cfbf8c14f7985 100644 --- a/certgen/asncodec/SharedAtRequest.h +++ b/certgen/asncodec/SharedAtRequest.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TypesAuthorization" * found in "asn1/pki_ts102941/EtsiTs102941TypesAuthorization.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/Signature.c b/certgen/asncodec/Signature.c index 3790a1baee7b471e0889940af3260200895e813c..96fec461ea95f77d74004489b05180723d0f2a87 100644 --- a/certgen/asncodec/Signature.c +++ b/certgen/asncodec/Signature.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "Signature.h" diff --git a/certgen/asncodec/Signature.h b/certgen/asncodec/Signature.h index 9acfd526fc7bc9db6ee12b14ea84034e4d8f2ef0..8bdc6d3dfe073f80274226214799c4fa0ef54eb4 100644 --- a/certgen/asncodec/Signature.h +++ b/certgen/asncodec/Signature.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/SignedAprvBinaryTree.c b/certgen/asncodec/SignedAprvBinaryTree.c index c082f02252edc4e07c49d9374ea479135ffc5137..986556b1503628b0bb1f395ed954d0386b4c84d9 100644 --- a/certgen/asncodec/SignedAprvBinaryTree.c +++ b/certgen/asncodec/SignedAprvBinaryTree.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Acpc" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Acpc.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "SignedAprvBinaryTree.h" diff --git a/certgen/asncodec/SignedAprvBinaryTree.h b/certgen/asncodec/SignedAprvBinaryTree.h index be160f06aac0f24b52129e5f7df54d48cf19112c..af30626b5041d0841747bd9cc2607915fa2f9121 100644 --- a/certgen/asncodec/SignedAprvBinaryTree.h +++ b/certgen/asncodec/SignedAprvBinaryTree.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Acpc" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Acpc.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/SignedCertificateRequest.c b/certgen/asncodec/SignedCertificateRequest.c index 3a8a6d0f3ca9c3d3f90acb0a3576206c8cd9fa3d..020d6075bceceacdd14ad8b4dde6241468486682 100644 --- a/certgen/asncodec/SignedCertificateRequest.c +++ b/certgen/asncodec/SignedCertificateRequest.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "SignedCertificateRequest.h" diff --git a/certgen/asncodec/SignedCertificateRequest.h b/certgen/asncodec/SignedCertificateRequest.h index d79b3fcde3a32b5beea35131a68392d9c8e8c4f4..30828f54a958a92bbc7fdfe5bd8e86d99b2f94f0 100644 --- a/certgen/asncodec/SignedCertificateRequest.h +++ b/certgen/asncodec/SignedCertificateRequest.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/SignedData.c b/certgen/asncodec/SignedData.c index 8989ac037d5a72f2af1e2083e25aca478a8d8c7a..2077df943d5a7cde5c6a60074b4d3b11e5169e6c 100644 --- a/certgen/asncodec/SignedData.c +++ b/certgen/asncodec/SignedData.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "SignedData.h" diff --git a/certgen/asncodec/SignedData.h b/certgen/asncodec/SignedData.h index 9be3c08489ef8a9150e778831513aeff5a1fc087..dd2a3a59e0f484581856655bc45b8ec2c78cb811 100644 --- a/certgen/asncodec/SignedData.h +++ b/certgen/asncodec/SignedData.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/SignedDataPayload.c b/certgen/asncodec/SignedDataPayload.c index e86a9bd1465c4158bce55bd46fdc430bd659190a..cf771ea94300a1198413f0a02148d1b2047ae3a6 100644 --- a/certgen/asncodec/SignedDataPayload.c +++ b/certgen/asncodec/SignedDataPayload.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "SignedDataPayload.h" diff --git a/certgen/asncodec/SignedDataPayload.h b/certgen/asncodec/SignedDataPayload.h index ce3f22d581f922ae6ad1a3c81dbb9fbc4c575748..8b2238f9e59f237560bcb4d775a8a5fd58da9983 100644 --- a/certgen/asncodec/SignedDataPayload.h +++ b/certgen/asncodec/SignedDataPayload.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/SignedIndividualAprv.c b/certgen/asncodec/SignedIndividualAprv.c index 1ac8e64f1bbea3bc1b4f131c8be8c2d4fd54d620..326d4d22f9ad5d7fd55d2e332906c5e311de4041 100644 --- a/certgen/asncodec/SignedIndividualAprv.c +++ b/certgen/asncodec/SignedIndividualAprv.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Acpc" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Acpc.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "SignedIndividualAprv.h" diff --git a/certgen/asncodec/SignedIndividualAprv.h b/certgen/asncodec/SignedIndividualAprv.h index 63bae3f64f2a300eee323b6b6133088aa66bc177..6925c64a180fe34702d50bbfe6a175eab3a6b45d 100644 --- a/certgen/asncodec/SignedIndividualAprv.h +++ b/certgen/asncodec/SignedIndividualAprv.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Acpc" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Acpc.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/SignedX509CertificateRequest.c b/certgen/asncodec/SignedX509CertificateRequest.c index 031ff2ede8fee35506757c4eede013cf16d2f904..8cc9d5f4cb3bb2d7be1073ea3724874690e60168 100644 --- a/certgen/asncodec/SignedX509CertificateRequest.c +++ b/certgen/asncodec/SignedX509CertificateRequest.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "SignedX509CertificateRequest.h" diff --git a/certgen/asncodec/SignedX509CertificateRequest.h b/certgen/asncodec/SignedX509CertificateRequest.h index b49756e33e0c1fdbc5c702b1f6b89998299f46bd..2c5bbd8f1915164301c6c50a413416075ae73542 100644 --- a/certgen/asncodec/SignedX509CertificateRequest.h +++ b/certgen/asncodec/SignedX509CertificateRequest.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/SignerIdentifier.c b/certgen/asncodec/SignerIdentifier.c index cba0ed4916b5b9ece84b73fb71c055144f2572dc..227051e5bcda86900e01aa211cd5ab101c192208 100644 --- a/certgen/asncodec/SignerIdentifier.c +++ b/certgen/asncodec/SignerIdentifier.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "SignerIdentifier.h" diff --git a/certgen/asncodec/SignerIdentifier.h b/certgen/asncodec/SignerIdentifier.h index 85b4c3123f1c5c5fbdbc5baebbee58d7798c471d..ea65893d8bf0b6bc9555c8334807232cca093996 100644 --- a/certgen/asncodec/SignerIdentifier.h +++ b/certgen/asncodec/SignerIdentifier.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/SignerSelf.c b/certgen/asncodec/SignerSelf.c index d6f21ffcf97e6909d45bd4f9cb1ec6e85e0ec78b..b1c322cefaf2f9202001f964c9ab2c44736e54a3 100644 --- a/certgen/asncodec/SignerSelf.c +++ b/certgen/asncodec/SignerSelf.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "SignerSelf.h" diff --git a/certgen/asncodec/SignerSelf.h b/certgen/asncodec/SignerSelf.h index 2f2874532c7ab928d4c58001b91c54517b82ed87..53c5f9c2464992703bb6171d0a7377fcc7c6a75f 100644 --- a/certgen/asncodec/SignerSelf.h +++ b/certgen/asncodec/SignerSelf.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/SignerSingleCert.c b/certgen/asncodec/SignerSingleCert.c index b2fa679e899dcd03e9e92d309040e6e76617f235..843b61bc6bde0d85c1686439a564da8e910853ff 100644 --- a/certgen/asncodec/SignerSingleCert.c +++ b/certgen/asncodec/SignerSingleCert.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "SignerSingleCert.h" diff --git a/certgen/asncodec/SignerSingleCert.h b/certgen/asncodec/SignerSingleCert.h index d20817343038e336639fbbd98b5e2e5b6a4099dd..c729549619598b6c5d308a5f7524cdc136ca0a2f 100644 --- a/certgen/asncodec/SignerSingleCert.h +++ b/certgen/asncodec/SignerSingleCert.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/SignerSingleX509Cert.c b/certgen/asncodec/SignerSingleX509Cert.c index 037e21db0e1c7a6a08050de9c651cfacac0012d6..9bff4e99bef30c72ac86d2b0f339935835e1fb37 100644 --- a/certgen/asncodec/SignerSingleX509Cert.c +++ b/certgen/asncodec/SignerSingleX509Cert.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "SignerSingleX509Cert.h" diff --git a/certgen/asncodec/SignerSingleX509Cert.h b/certgen/asncodec/SignerSingleX509Cert.h index d76d98585db29eb7ce28bab22fa3a9bccd4d1616..d86652c85ba0240f6626fe2be57a99ba99ada58e 100644 --- a/certgen/asncodec/SignerSingleX509Cert.h +++ b/certgen/asncodec/SignerSingleX509Cert.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/SspRange.c b/certgen/asncodec/SspRange.c index 7719b5a92c20f7b77fa867d0aa2c831351cab8b0..45003e135c051f3c64ca205a9f01f5fc619bd9a5 100644 --- a/certgen/asncodec/SspRange.c +++ b/certgen/asncodec/SspRange.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "SspRange.h" diff --git a/certgen/asncodec/SspRange.h b/certgen/asncodec/SspRange.h index c022bc60b5d3630361e539c4f6d696a12275b15f..2587e8f81797a064d93f7aaaa95637f39a0e2a7a 100644 --- a/certgen/asncodec/SspRange.h +++ b/certgen/asncodec/SspRange.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/SubjectAssurance.c b/certgen/asncodec/SubjectAssurance.c index 2d24b9b8273266d9a9a00b06f00549445083b4f8..875f969704eff88ec48a597006023f150732d914 100644 --- a/certgen/asncodec/SubjectAssurance.c +++ b/certgen/asncodec/SubjectAssurance.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "SubjectAssurance.h" diff --git a/certgen/asncodec/SubjectAssurance.h b/certgen/asncodec/SubjectAssurance.h index 2650bf2d164815567d51b6838cdba54871d85277..fde2a08ed2445dea1afe5bef64d41074a24ef23e 100644 --- a/certgen/asncodec/SubjectAssurance.h +++ b/certgen/asncodec/SubjectAssurance.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/SubjectPermissions.c b/certgen/asncodec/SubjectPermissions.c index 40db0e2b34b0c277786b4611537924b11cbc61f6..3c9cdb97d4192fac1d4aee2e0ef2641399a51759 100644 --- a/certgen/asncodec/SubjectPermissions.c +++ b/certgen/asncodec/SubjectPermissions.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "SubjectPermissions.h" diff --git a/certgen/asncodec/SubjectPermissions.h b/certgen/asncodec/SubjectPermissions.h index df912613b26a09cc0c744ba8c1c8141fc505a7e6..9aa123984ff96f6d01c17c4f686b9704bc1b862c 100644 --- a/certgen/asncodec/SubjectPermissions.h +++ b/certgen/asncodec/SubjectPermissions.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/SymmAlgorithm.c b/certgen/asncodec/SymmAlgorithm.c index c775d52da0899cacfc47be5a33f37f3547127685..f989c06c9782972b31f5e5d3128421c4748c60a4 100644 --- a/certgen/asncodec/SymmAlgorithm.c +++ b/certgen/asncodec/SymmAlgorithm.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "SymmAlgorithm.h" diff --git a/certgen/asncodec/SymmAlgorithm.h b/certgen/asncodec/SymmAlgorithm.h index 8582fe05a42fa1a11336a7415e40e1b6c2a9cb38..8327ed6759e5757a792d5433162b0464213b6389 100644 --- a/certgen/asncodec/SymmAlgorithm.h +++ b/certgen/asncodec/SymmAlgorithm.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/SymmRecipientInfo.c b/certgen/asncodec/SymmRecipientInfo.c index b8243c47b624960e1960dba2b1f0c6e24dc9e288..341510ec071db1ae9adfdd8ee76c1a2f054ce1ba 100644 --- a/certgen/asncodec/SymmRecipientInfo.c +++ b/certgen/asncodec/SymmRecipientInfo.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "SymmRecipientInfo.h" diff --git a/certgen/asncodec/SymmRecipientInfo.h b/certgen/asncodec/SymmRecipientInfo.h index ad725534671c3365c6c31bf369e5ac8af5d759ad..56f941a81d81285ccf81cde352de6f7f5779dcce 100644 --- a/certgen/asncodec/SymmRecipientInfo.h +++ b/certgen/asncodec/SymmRecipientInfo.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/SymmetricCiphertext.c b/certgen/asncodec/SymmetricCiphertext.c index 025526120c76d7a145dcba82ed1155c5f5598533..582f5482d184f1c70bfd023ec0a72ed80ae9acbf 100644 --- a/certgen/asncodec/SymmetricCiphertext.c +++ b/certgen/asncodec/SymmetricCiphertext.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "SymmetricCiphertext.h" diff --git a/certgen/asncodec/SymmetricCiphertext.h b/certgen/asncodec/SymmetricCiphertext.h index 2b6044a0f9a2b5e1c759a70c3380fbfbb981720d..b15766341144b664edff5c4ee3d5b22deba9364f 100644 --- a/certgen/asncodec/SymmetricCiphertext.h +++ b/certgen/asncodec/SymmetricCiphertext.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/SymmetricEncryptionKey.c b/certgen/asncodec/SymmetricEncryptionKey.c index 24f6b15507f0fd42f5b88247f5d88150e6ccf132..0df8eaa3c55177ff17d70e84f976696730f294ed 100644 --- a/certgen/asncodec/SymmetricEncryptionKey.c +++ b/certgen/asncodec/SymmetricEncryptionKey.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "SymmetricEncryptionKey.h" diff --git a/certgen/asncodec/SymmetricEncryptionKey.h b/certgen/asncodec/SymmetricEncryptionKey.h index 01ef07fabe3ac70d483adbea8b47a73b5465215d..82f15416c809a17d6728706e83591c505be3fdda 100644 --- a/certgen/asncodec/SymmetricEncryptionKey.h +++ b/certgen/asncodec/SymmetricEncryptionKey.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/TestCertificate.c b/certgen/asncodec/TestCertificate.c index d1a737dfb0d56e77531b50b3bdd1354e91c1dee5..28f2cf3866cc94754621648791fa3d7626e67e9c 100644 --- a/certgen/asncodec/TestCertificate.c +++ b/certgen/asncodec/TestCertificate.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "TestCertificate.h" diff --git a/certgen/asncodec/TestCertificate.h b/certgen/asncodec/TestCertificate.h index 4674042c7ebd7ec25de2ff269b35a98147673513..32f266f4ed5afe55c54ab862354e34801bf53dab 100644 --- a/certgen/asncodec/TestCertificate.h +++ b/certgen/asncodec/TestCertificate.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/TestSecurityMgmtSsp.c b/certgen/asncodec/TestSecurityMgmtSsp.c index 84d852cd94eb319867ffb8eb1b6d5d71043fe55b..173549d14cd927876060f8ecbb2b4700dd89f986 100644 --- a/certgen/asncodec/TestSecurityMgmtSsp.c +++ b/certgen/asncodec/TestSecurityMgmtSsp.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "TestSecurityMgmtSsp.h" diff --git a/certgen/asncodec/TestSecurityMgmtSsp.h b/certgen/asncodec/TestSecurityMgmtSsp.h index 36f6da8b488487f44aa9fa2cf06eb3b6c59b8015..6a41dd3d8a6566aa40f001d05f766cb55d5d7d1c 100644 --- a/certgen/asncodec/TestSecurityMgmtSsp.h +++ b/certgen/asncodec/TestSecurityMgmtSsp.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/ThreeDLocation.c b/certgen/asncodec/ThreeDLocation.c index 5aa2ff6149c5611926d11bc6c249d09ce67269c3..7c85d4810a1571f55f2a700751f5e37e7e5b57c8 100644 --- a/certgen/asncodec/ThreeDLocation.c +++ b/certgen/asncodec/ThreeDLocation.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "ThreeDLocation.h" diff --git a/certgen/asncodec/ThreeDLocation.h b/certgen/asncodec/ThreeDLocation.h index 96870a18c13b19bb132358e8e18612c845db8757..b1bf036fdb8432077597e4dd37e0494ca39723eb 100644 --- a/certgen/asncodec/ThreeDLocation.h +++ b/certgen/asncodec/ThreeDLocation.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/Time32.c b/certgen/asncodec/Time32.c index d5788b279ca12893c1e8faf00ca895ead9a33689..27ed481d591e69c4a9fecdf8d06490b208990836 100644 --- a/certgen/asncodec/Time32.c +++ b/certgen/asncodec/Time32.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "Time32.h" diff --git a/certgen/asncodec/Time32.h b/certgen/asncodec/Time32.h index 42f788358eaa90035d7d77526756db8e16d4cc74..7d0b2d1cf99b452af8b3b17f026ad33b7c998101 100644 --- a/certgen/asncodec/Time32.h +++ b/certgen/asncodec/Time32.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/Time64.c b/certgen/asncodec/Time64.c index cd08919a0cf77e6cae6ad9bc30f33dc79c3e6eee..4a072880241291a493ab544d9edc10ffca9acdbd 100644 --- a/certgen/asncodec/Time64.c +++ b/certgen/asncodec/Time64.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "Time64.h" diff --git a/certgen/asncodec/Time64.h b/certgen/asncodec/Time64.h index 1376fa84a6206ac651369717a155713e22caad03..a08fadc79cf6a27130c18666c6978b3d65200cf3 100644 --- a/certgen/asncodec/Time64.h +++ b/certgen/asncodec/Time64.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/TlmCertificateTrustListMessage.c b/certgen/asncodec/TlmCertificateTrustListMessage.c index 6765ea44ac294f91b78356c517daea81695f03d7..252a9f2553a7bf254098017d418bfcc373180400 100644 --- a/certgen/asncodec/TlmCertificateTrustListMessage.c +++ b/certgen/asncodec/TlmCertificateTrustListMessage.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941MessagesCa" - * found in "asn1/pki_ts102941/EtsiTs102941MessagesCA.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/pki_ts102941/EtsiTs102941MessagesCa.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "TlmCertificateTrustListMessage.h" diff --git a/certgen/asncodec/TlmCertificateTrustListMessage.h b/certgen/asncodec/TlmCertificateTrustListMessage.h index e6cf8ecce4ce995b2ab4c232439eca24dac65f22..77b4d55747cb37bc78b29f290bd254c81f820c6b 100644 --- a/certgen/asncodec/TlmCertificateTrustListMessage.h +++ b/certgen/asncodec/TlmCertificateTrustListMessage.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941MessagesCa" - * found in "asn1/pki_ts102941/EtsiTs102941MessagesCA.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/pki_ts102941/EtsiTs102941MessagesCa.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/TlmEntry.c b/certgen/asncodec/TlmEntry.c index f2d5536dd1101f2f16db4b98b598aeef21dd626b..71655787db7a38ada32deb7e6373e2504de128f7 100644 --- a/certgen/asncodec/TlmEntry.c +++ b/certgen/asncodec/TlmEntry.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TrustLists" * found in "asn1/pki_ts102941/EtsiTs102941TrustLists.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "TlmEntry.h" diff --git a/certgen/asncodec/TlmEntry.h b/certgen/asncodec/TlmEntry.h index 09b8d8308c62c9e2a94b3e7574ab566e259740e6..f231be941461893d55a4720a40dfccce46329f7d 100644 --- a/certgen/asncodec/TlmEntry.h +++ b/certgen/asncodec/TlmEntry.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TrustLists" * found in "asn1/pki_ts102941/EtsiTs102941TrustLists.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/TlmLinkCertificateMessage.c b/certgen/asncodec/TlmLinkCertificateMessage.c index 1106be8a12d13320b29efb9b171757edff6b51a9..7771a351d3694e89339936c2d8f1ad437df02ef7 100644 --- a/certgen/asncodec/TlmLinkCertificateMessage.c +++ b/certgen/asncodec/TlmLinkCertificateMessage.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941MessagesCa" - * found in "asn1/pki_ts102941/EtsiTs102941MessagesCA.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/pki_ts102941/EtsiTs102941MessagesCa.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "TlmLinkCertificateMessage.h" diff --git a/certgen/asncodec/TlmLinkCertificateMessage.h b/certgen/asncodec/TlmLinkCertificateMessage.h index aec5e259a0e39092fe6332d4427bdb532a1f5b26..4ae75f905db7c61fd7a1f93a674b7c9c51e83026 100644 --- a/certgen/asncodec/TlmLinkCertificateMessage.h +++ b/certgen/asncodec/TlmLinkCertificateMessage.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941MessagesCa" - * found in "asn1/pki_ts102941/EtsiTs102941MessagesCA.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/pki_ts102941/EtsiTs102941MessagesCa.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/ToBeSignedCertificate.c b/certgen/asncodec/ToBeSignedCertificate.c index 3ef054b5e8d4d3116eabaf8e3861ad0d6437ef76..f56f57594fea0046f507cf3f9e7fa6707a41919b 100644 --- a/certgen/asncodec/ToBeSignedCertificate.c +++ b/certgen/asncodec/ToBeSignedCertificate.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "ToBeSignedCertificate.h" diff --git a/certgen/asncodec/ToBeSignedCertificate.h b/certgen/asncodec/ToBeSignedCertificate.h index d75dd99d3cdd72fe80ff67dcebf595869b9a8f2d..561f4810e0aba7f748ce3c0c1bdc045637f9a28a 100644 --- a/certgen/asncodec/ToBeSignedCertificate.h +++ b/certgen/asncodec/ToBeSignedCertificate.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/ToBeSignedCrl.c b/certgen/asncodec/ToBeSignedCrl.c index 0c4b833f069619856cf594d0d492da169a3d9555..b1a0373ed7570a63621671a0d051e6258bac3aeb 100644 --- a/certgen/asncodec/ToBeSignedCrl.c +++ b/certgen/asncodec/ToBeSignedCrl.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TrustLists" * found in "asn1/pki_ts102941/EtsiTs102941TrustLists.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "ToBeSignedCrl.h" diff --git a/certgen/asncodec/ToBeSignedCrl.h b/certgen/asncodec/ToBeSignedCrl.h index 0e29d274c661d48ce46dbf37fb60eaaa13f9f688..90151f7a22378d01cde25240d5397934f976ce78 100644 --- a/certgen/asncodec/ToBeSignedCrl.h +++ b/certgen/asncodec/ToBeSignedCrl.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TrustLists" * found in "asn1/pki_ts102941/EtsiTs102941TrustLists.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/ToBeSignedCtlSignature.c b/certgen/asncodec/ToBeSignedCtlSignature.c index 4a0c9a6c41c9c83d80adbf1929ee7a4a161f6508..47913904bcac6f93c8464337912d6cec278a4a89 100644 --- a/certgen/asncodec/ToBeSignedCtlSignature.c +++ b/certgen/asncodec/ToBeSignedCtlSignature.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1CertManagement" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1CertManagement.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "ToBeSignedCtlSignature.h" diff --git a/certgen/asncodec/ToBeSignedCtlSignature.h b/certgen/asncodec/ToBeSignedCtlSignature.h index f0e0067e094126a3b5d581d0c064dd1f7aff8be1..fd11ee2eb6258a96ce61ce5ac5d3b9d6fe3f6c72 100644 --- a/certgen/asncodec/ToBeSignedCtlSignature.h +++ b/certgen/asncodec/ToBeSignedCtlSignature.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1CertManagement" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1CertManagement.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/ToBeSignedData.c b/certgen/asncodec/ToBeSignedData.c index 70efb8bc8482c9d7df2c665df91b9cbe91a16e28..113e971a33f65752ed687c49c5afa61fff95b0f0 100644 --- a/certgen/asncodec/ToBeSignedData.c +++ b/certgen/asncodec/ToBeSignedData.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "ToBeSignedData.h" diff --git a/certgen/asncodec/ToBeSignedData.h b/certgen/asncodec/ToBeSignedData.h index 83b854f86c2c4630bb192029824b195afd2f13d3..81b2a78706f680dab350d4f8a0ee8b00693cec0b 100644 --- a/certgen/asncodec/ToBeSignedData.h +++ b/certgen/asncodec/ToBeSignedData.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/ToBeSignedHashIdCrl.c b/certgen/asncodec/ToBeSignedHashIdCrl.c index fb7b1a402eeb18975118b9ea7f61a23a6c0eada7..f27051b2ea134f58defddf915d3052758d2913f0 100644 --- a/certgen/asncodec/ToBeSignedHashIdCrl.c +++ b/certgen/asncodec/ToBeSignedHashIdCrl.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2CrlBaseTypes" * found in "asn1/ieee1609.2/Ieee1609Dot2CrlBaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "ToBeSignedHashIdCrl.h" diff --git a/certgen/asncodec/ToBeSignedHashIdCrl.h b/certgen/asncodec/ToBeSignedHashIdCrl.h index 14b39cbf2c0588da66ebdd6e05b0b2513af0a0b1..b224df8cb8daee7e3be09d4a1552c741f5f5606c 100644 --- a/certgen/asncodec/ToBeSignedHashIdCrl.h +++ b/certgen/asncodec/ToBeSignedHashIdCrl.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2CrlBaseTypes" * found in "asn1/ieee1609.2/Ieee1609Dot2CrlBaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/ToBeSignedLinkCertificate.c b/certgen/asncodec/ToBeSignedLinkCertificate.c index b12c36c56d7a9c33a43bf732ced7d266a3dcf67e..2fd5377b28d297346a60822d50ce026d7a803285 100644 --- a/certgen/asncodec/ToBeSignedLinkCertificate.c +++ b/certgen/asncodec/ToBeSignedLinkCertificate.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TypesLinkCertificate" * found in "asn1/pki_ts102941/EtsiTs102941TypesLinkCertificate.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "ToBeSignedLinkCertificate.h" diff --git a/certgen/asncodec/ToBeSignedLinkCertificate.h b/certgen/asncodec/ToBeSignedLinkCertificate.h index 7c38859f0fb7a625e7ab5d701a38ee6ab700b09c..1919239d0192d13bf4c6d47a30d9a63a84f5681a 100644 --- a/certgen/asncodec/ToBeSignedLinkCertificate.h +++ b/certgen/asncodec/ToBeSignedLinkCertificate.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TypesLinkCertificate" * found in "asn1/pki_ts102941/EtsiTs102941TypesLinkCertificate.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/ToBeSignedLinkCertificateRca.c b/certgen/asncodec/ToBeSignedLinkCertificateRca.c index b49c7cc5d60a736ce92e23963a2a15beb9a9cb02..c7bb119c6d9d3585316a020b6a5498f54e58c798 100644 --- a/certgen/asncodec/ToBeSignedLinkCertificateRca.c +++ b/certgen/asncodec/ToBeSignedLinkCertificateRca.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TypesLinkCertificate" * found in "asn1/pki_ts102941/EtsiTs102941TypesLinkCertificate.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "ToBeSignedLinkCertificateRca.h" diff --git a/certgen/asncodec/ToBeSignedLinkCertificateRca.h b/certgen/asncodec/ToBeSignedLinkCertificateRca.h index 3fa36fa72da3f8efafe2e75fb9ba1e5f66623817..bffcabcbe95847c8cbdc43e04813dbb3ef2a8811 100644 --- a/certgen/asncodec/ToBeSignedLinkCertificateRca.h +++ b/certgen/asncodec/ToBeSignedLinkCertificateRca.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TypesLinkCertificate" * found in "asn1/pki_ts102941/EtsiTs102941TypesLinkCertificate.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/ToBeSignedLinkCertificateTlm.c b/certgen/asncodec/ToBeSignedLinkCertificateTlm.c index 5fec078f6b917368a239a3d2e39752648400689c..baa4c21cc8dafb0503d322ddbf9ce7f9139ba996 100644 --- a/certgen/asncodec/ToBeSignedLinkCertificateTlm.c +++ b/certgen/asncodec/ToBeSignedLinkCertificateTlm.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TypesLinkCertificate" * found in "asn1/pki_ts102941/EtsiTs102941TypesLinkCertificate.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "ToBeSignedLinkCertificateTlm.h" diff --git a/certgen/asncodec/ToBeSignedLinkCertificateTlm.h b/certgen/asncodec/ToBeSignedLinkCertificateTlm.h index ebad0955e5a14b6dc1205c453c2759c1c6e50561..d6e1adca3945a5430915c67904a4b00d66357176 100644 --- a/certgen/asncodec/ToBeSignedLinkCertificateTlm.h +++ b/certgen/asncodec/ToBeSignedLinkCertificateTlm.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TypesLinkCertificate" * found in "asn1/pki_ts102941/EtsiTs102941TypesLinkCertificate.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/ToBeSignedLinkageValueCrl.c b/certgen/asncodec/ToBeSignedLinkageValueCrl.c index f588bd91306945778070350254adfd1179c89302..4e53f84c8eaaa8386d4665f46bd353ba2db19433 100644 --- a/certgen/asncodec/ToBeSignedLinkageValueCrl.c +++ b/certgen/asncodec/ToBeSignedLinkageValueCrl.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2CrlBaseTypes" * found in "asn1/ieee1609.2/Ieee1609Dot2CrlBaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "ToBeSignedLinkageValueCrl.h" diff --git a/certgen/asncodec/ToBeSignedLinkageValueCrl.h b/certgen/asncodec/ToBeSignedLinkageValueCrl.h index 1624aa112bc9ce68c6fe3b4a44b06fd91cd3ed32..dc823e59ad45dc3ef97c6166e4193614e5b37358 100644 --- a/certgen/asncodec/ToBeSignedLinkageValueCrl.h +++ b/certgen/asncodec/ToBeSignedLinkageValueCrl.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2CrlBaseTypes" * found in "asn1/ieee1609.2/Ieee1609Dot2CrlBaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/ToBeSignedLinkageValueCrlWithAlgIdentifier.c b/certgen/asncodec/ToBeSignedLinkageValueCrlWithAlgIdentifier.c index c7e44ae0ff1fe0c75d4e87941f1c238603b85f0b..88b586f22514a2c5a8ae9f9323d24c131ee7c831 100644 --- a/certgen/asncodec/ToBeSignedLinkageValueCrlWithAlgIdentifier.c +++ b/certgen/asncodec/ToBeSignedLinkageValueCrlWithAlgIdentifier.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2CrlBaseTypes" * found in "asn1/ieee1609.2/Ieee1609Dot2CrlBaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "ToBeSignedLinkageValueCrlWithAlgIdentifier.h" diff --git a/certgen/asncodec/ToBeSignedLinkageValueCrlWithAlgIdentifier.h b/certgen/asncodec/ToBeSignedLinkageValueCrlWithAlgIdentifier.h index e5c7d82c58cbbf6c678ec107e16efcfbdc6bb978..7a8db3032a10f2db6af7363bfa21c6530db6a037 100644 --- a/certgen/asncodec/ToBeSignedLinkageValueCrlWithAlgIdentifier.h +++ b/certgen/asncodec/ToBeSignedLinkageValueCrlWithAlgIdentifier.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2CrlBaseTypes" * found in "asn1/ieee1609.2/Ieee1609Dot2CrlBaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/ToBeSignedRcaCtl.c b/certgen/asncodec/ToBeSignedRcaCtl.c index 2a1ff536db2536d6e9710652434a56d991353e6e..e4f0c1082a31045409c6c72f35c57fbcdfd4c325 100644 --- a/certgen/asncodec/ToBeSignedRcaCtl.c +++ b/certgen/asncodec/ToBeSignedRcaCtl.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TrustLists" * found in "asn1/pki_ts102941/EtsiTs102941TrustLists.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "ToBeSignedRcaCtl.h" diff --git a/certgen/asncodec/ToBeSignedRcaCtl.h b/certgen/asncodec/ToBeSignedRcaCtl.h index 6fda6c02265fabd00b7446c47973d3b363b5cb5f..ebbf28236970cfe0aa3cbd5904fa478c16b6380f 100644 --- a/certgen/asncodec/ToBeSignedRcaCtl.h +++ b/certgen/asncodec/ToBeSignedRcaCtl.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TrustLists" * found in "asn1/pki_ts102941/EtsiTs102941TrustLists.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/ToBeSignedTlmCtl.c b/certgen/asncodec/ToBeSignedTlmCtl.c index 02c6a4566724e0f5c6825b32be5e342c17233090..606b34f49c89dc333f1c0b99bbc1947c6ef33c43 100644 --- a/certgen/asncodec/ToBeSignedTlmCtl.c +++ b/certgen/asncodec/ToBeSignedTlmCtl.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TrustLists" * found in "asn1/pki_ts102941/EtsiTs102941TrustLists.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "ToBeSignedTlmCtl.h" diff --git a/certgen/asncodec/ToBeSignedTlmCtl.h b/certgen/asncodec/ToBeSignedTlmCtl.h index 599cfa4e56461534e24d8c16c793416b3ab6d830..fd7bf9dd3f1f91737c5911e29cd6863fd23aac97 100644 --- a/certgen/asncodec/ToBeSignedTlmCtl.h +++ b/certgen/asncodec/ToBeSignedTlmCtl.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TrustLists" * found in "asn1/pki_ts102941/EtsiTs102941TrustLists.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/TwoDLocation.c b/certgen/asncodec/TwoDLocation.c index 0169fa39dd3ac2bda4f46d3da08904bd5a705cc5..275c2528283c9de5e259f08568fbf7e1747d9bd6 100644 --- a/certgen/asncodec/TwoDLocation.c +++ b/certgen/asncodec/TwoDLocation.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "TwoDLocation.h" diff --git a/certgen/asncodec/TwoDLocation.h b/certgen/asncodec/TwoDLocation.h index ab29b952b599f4f78e4aa3ce15f737e42ceac3de..e02462b72fa135e69b067cea0fb66fbd4714ddbf 100644 --- a/certgen/asncodec/TwoDLocation.h +++ b/certgen/asncodec/TwoDLocation.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/TypeSpecificCrlContents.c b/certgen/asncodec/TypeSpecificCrlContents.c index ee72c6e7ffc0be23a92d2511907a74a80d5a24f5..55b33b2e24fe96c973e27cfc9117c17d70f97348 100644 --- a/certgen/asncodec/TypeSpecificCrlContents.c +++ b/certgen/asncodec/TypeSpecificCrlContents.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2CrlBaseTypes" * found in "asn1/ieee1609.2/Ieee1609Dot2CrlBaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "TypeSpecificCrlContents.h" diff --git a/certgen/asncodec/TypeSpecificCrlContents.h b/certgen/asncodec/TypeSpecificCrlContents.h index 2d6931140830b797f7360bd6df6e611542a96f16..21cd88f9f659c5e9292051f4ce5aa2a0329d9c2a 100644 --- a/certgen/asncodec/TypeSpecificCrlContents.h +++ b/certgen/asncodec/TypeSpecificCrlContents.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2CrlBaseTypes" * found in "asn1/ieee1609.2/Ieee1609Dot2CrlBaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/UTF8String.c b/certgen/asncodec/UTF8String.c index 51923b7610ef30c834daac200326fe3317480141..59be3fde903d126649b43979e717e84597d73863 100644 --- a/certgen/asncodec/UTF8String.c +++ b/certgen/asncodec/UTF8String.c @@ -1,224 +1,224 @@ -/*- - * Copyright (c) 2003, 2004, 2006 Lev Walkin . - * All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include - -/* - * UTF8String basic type description. - */ -static const ber_tlv_tag_t asn_DEF_UTF8String_tags[] = { - (ASN_TAG_CLASS_UNIVERSAL | (12 << 2)), /* [UNIVERSAL 12] IMPLICIT ...*/ - (ASN_TAG_CLASS_UNIVERSAL | (4 << 2)), /* ... OCTET STRING */ -}; -asn_TYPE_operation_t asn_OP_UTF8String = { - OCTET_STRING_free, -#if !defined(ASN_DISABLE_PRINT_SUPPORT) - UTF8String_print, -#else - 0, -#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ - OCTET_STRING_compare, -#if !defined(ASN_DISABLE_BER_SUPPORT) - OCTET_STRING_decode_ber, /* Implemented in terms of OCTET STRING */ - OCTET_STRING_encode_der, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ -#if !defined(ASN_DISABLE_XER_SUPPORT) - OCTET_STRING_decode_xer_utf8, - OCTET_STRING_encode_xer_utf8, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ -#if !defined(ASN_DISABLE_JER_SUPPORT) - OCTET_STRING_encode_jer_utf8, -#else - 0, -#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ -#if !defined(ASN_DISABLE_OER_SUPPORT) - OCTET_STRING_decode_oer, - OCTET_STRING_encode_oer, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ -#if !defined(ASN_DISABLE_UPER_SUPPORT) - OCTET_STRING_decode_uper, - OCTET_STRING_encode_uper, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ -#if !defined(ASN_DISABLE_APER_SUPPORT) - OCTET_STRING_decode_aper, - OCTET_STRING_encode_aper, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ -#if !defined(ASN_DISABLE_RFILL_SUPPORT) - UTF8String_random_fill, -#else - 0, -#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ - 0 /* Use generic outmost tag fetcher */ -}; -asn_TYPE_descriptor_t asn_DEF_UTF8String = { - "UTF8String", - "UTF8String", - &asn_OP_UTF8String, - asn_DEF_UTF8String_tags, - sizeof(asn_DEF_UTF8String_tags) - / sizeof(asn_DEF_UTF8String_tags[0]) - 1, - asn_DEF_UTF8String_tags, - sizeof(asn_DEF_UTF8String_tags) - / sizeof(asn_DEF_UTF8String_tags[0]), - { -#if !defined(ASN_DISABLE_OER_SUPPORT) - 0, -#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ -#if !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) - 0, -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) */ - UTF8String_constraint - }, - 0, 0, /* No members */ - 0 /* No specifics */ -}; - -/* - * This is the table of length expectations. - * The second half of this table is only applicable to the long sequences. - */ -static const int UTF8String_ht[2][16] = { - { /* 0x0 ... 0x7 */ - /* 0000..0111 */ - 1, 1, 1, 1, 1, 1, 1, 1, - /* 1000..1011(0), 1100..1101(2), 1110(3), 1111(-1) */ - 0, 0, 0, 0, 2, 2, 3, -1 }, - { /* 0xF0 .. 0xF7 */ - /* 11110000..11110111 */ - 4, 4, 4, 4, 4, 4, 4, 4, - 5, 5, 5, 5, 6, 6, -1, -1 } -}; -static const int32_t UTF8String_mv[7] = { 0, 0, - 0x00000080, - 0x00000800, - 0x00010000, - 0x00200000, - 0x04000000 -}; - -/* Internal aliases for return codes */ -#define U8E_TRUNC -1 /* UTF-8 sequence truncated */ -#define U8E_ILLSTART -2 /* Illegal UTF-8 sequence start */ -#define U8E_NOTCONT -3 /* Continuation expectation failed */ -#define U8E_NOTMIN -4 /* Not minimal length encoding */ -#define U8E_EINVAL -5 /* Invalid arguments */ - -int -UTF8String_constraint(const asn_TYPE_descriptor_t *td, const void *sptr, - asn_app_constraint_failed_f *ctfailcb, void *app_key) { - ssize_t len = UTF8String_length((const UTF8String_t *)sptr); - switch(len) { - case U8E_EINVAL: - ASN__CTFAIL(app_key, td, sptr, - "%s: value not given", td->name); - break; - case U8E_TRUNC: - ASN__CTFAIL(app_key, td, sptr, - "%s: truncated UTF-8 sequence (%s:%d)", - td->name, __FILE__, __LINE__); - break; - case U8E_ILLSTART: - ASN__CTFAIL(app_key, td, sptr, - "%s: UTF-8 illegal start of encoding (%s:%d)", - td->name, __FILE__, __LINE__); - break; - case U8E_NOTCONT: - ASN__CTFAIL(app_key, td, sptr, - "%s: UTF-8 not continuation (%s:%d)", - td->name, __FILE__, __LINE__); - break; - case U8E_NOTMIN: - ASN__CTFAIL(app_key, td, sptr, - "%s: UTF-8 not minimal sequence (%s:%d)", - td->name, __FILE__, __LINE__); - break; - } - return (len < 0) ? -1 : 0; -} - -static ssize_t -UTF8String__process(const UTF8String_t *st, uint32_t *dst, size_t dstlen) { - size_t length = 0; - uint8_t *buf = (st == NULL)? NULL : st->buf; - uint8_t *end = (buf == NULL)? NULL : buf + st->size; - uint32_t *dstend = (dst == NULL)? NULL : dst + dstlen; - - for(length = 0; buf < end; length++) { - int ch = *buf; - uint8_t *cend; - int32_t value; - int want; - - /* Compute the sequence length */ - want = UTF8String_ht[0][ch >> 4]; - switch(want) { - case -1: - /* Second half of the table, long sequence */ - want = UTF8String_ht[1][ch & 0x0F]; - if(want != -1) break; - /* Fall through */ - case 0: - return U8E_ILLSTART; - } - - /* assert(want >= 1 && want <= 6) */ - - /* Check character sequence length */ - if(buf + want > end) return U8E_TRUNC; - - value = ch & (0xff >> want); - cend = buf + want; - for(buf++; buf < cend; buf++) { - ch = *buf; - if(ch < 0x80 || ch > 0xbf) return U8E_NOTCONT; - value = (value << 6) | (ch & 0x3F); - } - if(value < UTF8String_mv[want]) - return U8E_NOTMIN; - if(dst < dstend) - *dst++ = value; /* Record value */ - } - - if(dst < dstend) *dst = 0; /* zero-terminate */ - - return length; -} - - -ssize_t -UTF8String_length(const UTF8String_t *st) { - if(st && st->buf) { - return UTF8String__process(st, 0, 0); - } else { - return U8E_EINVAL; - } -} - -size_t -UTF8String_to_wcs(const UTF8String_t *st, uint32_t *dst, size_t dstlen) { - if(st && st->buf) { - ssize_t ret = UTF8String__process(st, dst, dstlen); - return (ret < 0) ? 0 : ret; - } else { - return 0; - } -} - +/*- + * Copyright (c) 2003, 2004, 2006 Lev Walkin . + * All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include + +/* + * UTF8String basic type description. + */ +static const ber_tlv_tag_t asn_DEF_UTF8String_tags[] = { + (ASN_TAG_CLASS_UNIVERSAL | (12 << 2)), /* [UNIVERSAL 12] IMPLICIT ...*/ + (ASN_TAG_CLASS_UNIVERSAL | (4 << 2)), /* ... OCTET STRING */ +}; +asn_TYPE_operation_t asn_OP_UTF8String = { + OCTET_STRING_free, +#if !defined(ASN_DISABLE_PRINT_SUPPORT) + UTF8String_print, +#else + 0, +#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ + OCTET_STRING_compare, +#if !defined(ASN_DISABLE_BER_SUPPORT) + OCTET_STRING_decode_ber, /* Implemented in terms of OCTET STRING */ + OCTET_STRING_encode_der, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ +#if !defined(ASN_DISABLE_XER_SUPPORT) + OCTET_STRING_decode_xer_utf8, + OCTET_STRING_encode_xer_utf8, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ +#if !defined(ASN_DISABLE_JER_SUPPORT) + OCTET_STRING_encode_jer_utf8, +#else + 0, +#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ +#if !defined(ASN_DISABLE_OER_SUPPORT) + OCTET_STRING_decode_oer, + OCTET_STRING_encode_oer, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ +#if !defined(ASN_DISABLE_UPER_SUPPORT) + OCTET_STRING_decode_uper, + OCTET_STRING_encode_uper, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ +#if !defined(ASN_DISABLE_APER_SUPPORT) + OCTET_STRING_decode_aper, + OCTET_STRING_encode_aper, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ +#if !defined(ASN_DISABLE_RFILL_SUPPORT) + UTF8String_random_fill, +#else + 0, +#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ + 0 /* Use generic outmost tag fetcher */ +}; +asn_TYPE_descriptor_t asn_DEF_UTF8String = { + "UTF8String", + "UTF8String", + &asn_OP_UTF8String, + asn_DEF_UTF8String_tags, + sizeof(asn_DEF_UTF8String_tags) + / sizeof(asn_DEF_UTF8String_tags[0]) - 1, + asn_DEF_UTF8String_tags, + sizeof(asn_DEF_UTF8String_tags) + / sizeof(asn_DEF_UTF8String_tags[0]), + { +#if !defined(ASN_DISABLE_OER_SUPPORT) + 0, +#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ +#if !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) + 0, +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) */ + UTF8String_constraint + }, + 0, 0, /* No members */ + 0 /* No specifics */ +}; + +/* + * This is the table of length expectations. + * The second half of this table is only applicable to the long sequences. + */ +static const int UTF8String_ht[2][16] = { + { /* 0x0 ... 0x7 */ + /* 0000..0111 */ + 1, 1, 1, 1, 1, 1, 1, 1, + /* 1000..1011(0), 1100..1101(2), 1110(3), 1111(-1) */ + 0, 0, 0, 0, 2, 2, 3, -1 }, + { /* 0xF0 .. 0xF7 */ + /* 11110000..11110111 */ + 4, 4, 4, 4, 4, 4, 4, 4, + 5, 5, 5, 5, 6, 6, -1, -1 } +}; +static const int32_t UTF8String_mv[7] = { 0, 0, + 0x00000080, + 0x00000800, + 0x00010000, + 0x00200000, + 0x04000000 +}; + +/* Internal aliases for return codes */ +#define U8E_TRUNC -1 /* UTF-8 sequence truncated */ +#define U8E_ILLSTART -2 /* Illegal UTF-8 sequence start */ +#define U8E_NOTCONT -3 /* Continuation expectation failed */ +#define U8E_NOTMIN -4 /* Not minimal length encoding */ +#define U8E_EINVAL -5 /* Invalid arguments */ + +int +UTF8String_constraint(const asn_TYPE_descriptor_t *td, const void *sptr, + asn_app_constraint_failed_f *ctfailcb, void *app_key) { + ssize_t len = UTF8String_length((const UTF8String_t *)sptr); + switch(len) { + case U8E_EINVAL: + ASN__CTFAIL(app_key, td, sptr, + "%s: value not given", td->name); + break; + case U8E_TRUNC: + ASN__CTFAIL(app_key, td, sptr, + "%s: truncated UTF-8 sequence (%s:%d)", + td->name, __FILE__, __LINE__); + break; + case U8E_ILLSTART: + ASN__CTFAIL(app_key, td, sptr, + "%s: UTF-8 illegal start of encoding (%s:%d)", + td->name, __FILE__, __LINE__); + break; + case U8E_NOTCONT: + ASN__CTFAIL(app_key, td, sptr, + "%s: UTF-8 not continuation (%s:%d)", + td->name, __FILE__, __LINE__); + break; + case U8E_NOTMIN: + ASN__CTFAIL(app_key, td, sptr, + "%s: UTF-8 not minimal sequence (%s:%d)", + td->name, __FILE__, __LINE__); + break; + } + return (len < 0) ? -1 : 0; +} + +static ssize_t +UTF8String__process(const UTF8String_t *st, uint32_t *dst, size_t dstlen) { + size_t length = 0; + uint8_t *buf = (st == NULL)? NULL : st->buf; + uint8_t *end = (buf == NULL)? NULL : buf + st->size; + uint32_t *dstend = (dst == NULL)? NULL : dst + dstlen; + + for(length = 0; buf < end; length++) { + int ch = *buf; + uint8_t *cend; + int32_t value; + int want; + + /* Compute the sequence length */ + want = UTF8String_ht[0][ch >> 4]; + switch(want) { + case -1: + /* Second half of the table, long sequence */ + want = UTF8String_ht[1][ch & 0x0F]; + if(want != -1) break; + /* Fall through */ + case 0: + return U8E_ILLSTART; + } + + /* assert(want >= 1 && want <= 6) */ + + /* Check character sequence length */ + if(buf + want > end) return U8E_TRUNC; + + value = ch & (0xff >> want); + cend = buf + want; + for(buf++; buf < cend; buf++) { + ch = *buf; + if(ch < 0x80 || ch > 0xbf) return U8E_NOTCONT; + value = (value << 6) | (ch & 0x3F); + } + if(value < UTF8String_mv[want]) + return U8E_NOTMIN; + if(dst < dstend) + *dst++ = value; /* Record value */ + } + + if(dst < dstend) *dst = 0; /* zero-terminate */ + + return length; +} + + +ssize_t +UTF8String_length(const UTF8String_t *st) { + if(st && st->buf) { + return UTF8String__process(st, 0, 0); + } else { + return U8E_EINVAL; + } +} + +size_t +UTF8String_to_wcs(const UTF8String_t *st, uint32_t *dst, size_t dstlen) { + if(st && st->buf) { + ssize_t ret = UTF8String__process(st, dst, dstlen); + return (ret < 0) ? 0 : ret; + } else { + return 0; + } +} + diff --git a/certgen/asncodec/UTF8String.h b/certgen/asncodec/UTF8String.h index 3a31def8222c0a937ff8fc82d4f332c11335ee76..cd72a239f67024df494d0bb2c240b685c84f0f7e 100644 --- a/certgen/asncodec/UTF8String.h +++ b/certgen/asncodec/UTF8String.h @@ -1,84 +1,84 @@ -/*- - * Copyright (c) 2003-2017 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#ifndef _UTF8String_H_ -#define _UTF8String_H_ - -#include - -#ifdef __cplusplus -extern "C" { -#endif - -typedef OCTET_STRING_t UTF8String_t; /* Implemented via OCTET STRING */ - -extern asn_TYPE_descriptor_t asn_DEF_UTF8String; -extern asn_TYPE_operation_t asn_OP_UTF8String; - -#define UTF8String_free OCTET_STRING_free - -#if !defined(ASN_DISABLE_PRINT_SUPPORT) -asn_struct_print_f UTF8String_print; -#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ - -#define UTF8String_compare OCTET_STRING_compare - -asn_constr_check_f UTF8String_constraint; - -#if !defined(ASN_DISABLE_BER_SUPPORT) -#define UTF8String_decode_ber OCTET_STRING_decode_ber -#define UTF8String_encode_der OCTET_STRING_encode_der -#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ - -#if !defined(ASN_DISABLE_XER_SUPPORT) -#define UTF8String_decode_xer OCTET_STRING_decode_xer_utf8 -#define UTF8String_encode_xer OCTET_STRING_encode_xer_utf8 -#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ - -#if !defined(ASN_DISABLE_JER_SUPPORT) -#define UTF8String_encode_jer OCTET_STRING_encode_jer_utf8 -#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ - -#if !defined(ASN_DISABLE_UPER_SUPPORT) -#define UTF8String_decode_uper OCTET_STRING_decode_uper -#define UTF8String_encode_uper OCTET_STRING_encode_uper -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ -#if !defined(ASN_DISABLE_APER_SUPPORT) -#define UTF8String_decode_aper OCTET_STRING_decode_aper -#define UTF8String_encode_aper OCTET_STRING_encode_aper -#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ - -#if !defined(ASN_DISABLE_RFILL_SUPPORT) -asn_random_fill_f UTF8String_random_fill; -#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ - -/* - * Returns length of the given UTF-8 string in characters, - * or a negative error code: - * -1: UTF-8 sequence truncated - * -2: Illegal UTF-8 sequence start - * -3: Continuation expectation failed - * -4: Not minimal length encoding - * -5: Invalid arguments - */ -ssize_t UTF8String_length(const UTF8String_t *st); - -/* - * Convert the UTF-8 string into a sequence of wide characters. - * Returns the number of characters necessary. - * Returned value might be greater than dstlen. - * In case of conversion error, 0 is returned. - * - * If st points to a valid UTF-8 string, calling - * UTF8String_to_wcs(st, 0, 0); - * is equivalent to - * UTF8String_length(const UTF8String_t *st); - */ -size_t UTF8String_to_wcs(const UTF8String_t *st, uint32_t *dst, size_t dstlen); - -#ifdef __cplusplus -} -#endif - -#endif /* _UTF8String_H_ */ +/*- + * Copyright (c) 2003-2017 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#ifndef _UTF8String_H_ +#define _UTF8String_H_ + +#include + +#ifdef __cplusplus +extern "C" { +#endif + +typedef OCTET_STRING_t UTF8String_t; /* Implemented via OCTET STRING */ + +extern asn_TYPE_descriptor_t asn_DEF_UTF8String; +extern asn_TYPE_operation_t asn_OP_UTF8String; + +#define UTF8String_free OCTET_STRING_free + +#if !defined(ASN_DISABLE_PRINT_SUPPORT) +asn_struct_print_f UTF8String_print; +#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ + +#define UTF8String_compare OCTET_STRING_compare + +asn_constr_check_f UTF8String_constraint; + +#if !defined(ASN_DISABLE_BER_SUPPORT) +#define UTF8String_decode_ber OCTET_STRING_decode_ber +#define UTF8String_encode_der OCTET_STRING_encode_der +#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ + +#if !defined(ASN_DISABLE_XER_SUPPORT) +#define UTF8String_decode_xer OCTET_STRING_decode_xer_utf8 +#define UTF8String_encode_xer OCTET_STRING_encode_xer_utf8 +#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ + +#if !defined(ASN_DISABLE_JER_SUPPORT) +#define UTF8String_encode_jer OCTET_STRING_encode_jer_utf8 +#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ + +#if !defined(ASN_DISABLE_UPER_SUPPORT) +#define UTF8String_decode_uper OCTET_STRING_decode_uper +#define UTF8String_encode_uper OCTET_STRING_encode_uper +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ +#if !defined(ASN_DISABLE_APER_SUPPORT) +#define UTF8String_decode_aper OCTET_STRING_decode_aper +#define UTF8String_encode_aper OCTET_STRING_encode_aper +#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ + +#if !defined(ASN_DISABLE_RFILL_SUPPORT) +asn_random_fill_f UTF8String_random_fill; +#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ + +/* + * Returns length of the given UTF-8 string in characters, + * or a negative error code: + * -1: UTF-8 sequence truncated + * -2: Illegal UTF-8 sequence start + * -3: Continuation expectation failed + * -4: Not minimal length encoding + * -5: Invalid arguments + */ +ssize_t UTF8String_length(const UTF8String_t *st); + +/* + * Convert the UTF-8 string into a sequence of wide characters. + * Returns the number of characters necessary. + * Returned value might be greater than dstlen. + * In case of conversion error, 0 is returned. + * + * If st points to a valid UTF-8 string, calling + * UTF8String_to_wcs(st, 0, 0); + * is equivalent to + * UTF8String_length(const UTF8String_t *st); + */ +size_t UTF8String_to_wcs(const UTF8String_t *st, uint32_t *dst, size_t dstlen); + +#ifdef __cplusplus +} +#endif + +#endif /* _UTF8String_H_ */ diff --git a/certgen/asncodec/UTF8String_print.c b/certgen/asncodec/UTF8String_print.c index fdf7925dcf4918e2356a061da811ef115343446d..9b789b47936ada09957bd2a0c5519d0a45e72d5b 100644 --- a/certgen/asncodec/UTF8String_print.c +++ b/certgen/asncodec/UTF8String_print.c @@ -1,22 +1,22 @@ -/* - * Copyright (c) 2017 Lev Walkin . - * All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include - -int -UTF8String_print(const asn_TYPE_descriptor_t *td, const void *sptr, int ilevel, - asn_app_consume_bytes_f *cb, void *app_key) { - const UTF8String_t *st = (const UTF8String_t *)sptr; - - (void)td; /* Unused argument */ - (void)ilevel; /* Unused argument */ - - if(st && st->buf) { - return (cb(st->buf, st->size, app_key) < 0) ? -1 : 0; - } else { - return (cb("", 8, app_key) < 0) ? -1 : 0; - } -} +/* + * Copyright (c) 2017 Lev Walkin . + * All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include + +int +UTF8String_print(const asn_TYPE_descriptor_t *td, const void *sptr, int ilevel, + asn_app_consume_bytes_f *cb, void *app_key) { + const UTF8String_t *st = (const UTF8String_t *)sptr; + + (void)td; /* Unused argument */ + (void)ilevel; /* Unused argument */ + + if(st && st->buf) { + return (cb(st->buf, st->size, app_key) < 0) ? -1 : 0; + } else { + return (cb("", 8, app_key) < 0) ? -1 : 0; + } +} diff --git a/certgen/asncodec/Uint16.c b/certgen/asncodec/Uint16.c index 8ea210376aa1dc5ea098c5c75717a96e8a8e6876..1e968adcb396b86256d531a41626fd562f1b1433 100644 --- a/certgen/asncodec/Uint16.c +++ b/certgen/asncodec/Uint16.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "Uint16.h" diff --git a/certgen/asncodec/Uint16.h b/certgen/asncodec/Uint16.h index efcb5aa653a3866e015fdca30e57f2aa6c9419e0..32f91b2f6d1f8a55b0c8ea5f69ffa66c5b18f25b 100644 --- a/certgen/asncodec/Uint16.h +++ b/certgen/asncodec/Uint16.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/Uint3.c b/certgen/asncodec/Uint3.c index 83f65c83380dafb75e6eefd3794c817b6ae74621..22c679b71bbf91e09e082d053554512b40d2c3da 100644 --- a/certgen/asncodec/Uint3.c +++ b/certgen/asncodec/Uint3.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "Uint3.h" diff --git a/certgen/asncodec/Uint3.h b/certgen/asncodec/Uint3.h index 95608777a0a8fc6ea2e81cbff7d0a291b6e2e00f..1c04f3dea4856a0d8110c6998c401f726bdf0906 100644 --- a/certgen/asncodec/Uint3.h +++ b/certgen/asncodec/Uint3.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/Uint32.c b/certgen/asncodec/Uint32.c index 85b4bbf018a93dc311b612e88198c083905f1494..082822607440480d952486af9f174b01b30f240e 100644 --- a/certgen/asncodec/Uint32.c +++ b/certgen/asncodec/Uint32.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "Uint32.h" diff --git a/certgen/asncodec/Uint32.h b/certgen/asncodec/Uint32.h index 613c9da2a714ba5e8e80e729d56a54c012f7044e..0c7875248bc9db277ed11154385b178d87677f7f 100644 --- a/certgen/asncodec/Uint32.h +++ b/certgen/asncodec/Uint32.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/Uint64.c b/certgen/asncodec/Uint64.c index 9320fa7a93927eafa12d60e4cafdc6882c2ad950..e6156702e362c7959da7431abccb536ab4e54405 100644 --- a/certgen/asncodec/Uint64.c +++ b/certgen/asncodec/Uint64.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "Uint64.h" diff --git a/certgen/asncodec/Uint64.h b/certgen/asncodec/Uint64.h index 82cee41c2e0f5eedbe447aacfa3628dc324d4553..da66d97ac36b3f051e4b22a63f97e8e963ef2898 100644 --- a/certgen/asncodec/Uint64.h +++ b/certgen/asncodec/Uint64.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/Uint8.c b/certgen/asncodec/Uint8.c index ee841f0e6cdcc37592350eda09c26318297e3e01..8266e1de756b106d0dfa2f180f0924a6265904e3 100644 --- a/certgen/asncodec/Uint8.c +++ b/certgen/asncodec/Uint8.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "Uint8.h" diff --git a/certgen/asncodec/Uint8.h b/certgen/asncodec/Uint8.h index 508f476015779fb86a7f9f310c30280c95139314..7e9146834563fe52993a6dd2f25bdaee42a8c1f1 100644 --- a/certgen/asncodec/Uint8.h +++ b/certgen/asncodec/Uint8.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/UnCountryId.c b/certgen/asncodec/UnCountryId.c index 439c2b9aa9729f1333f15cadc61aaacec5103cec..e15bbf14cd08baf03cc057cccbd2905b173aca98 100644 --- a/certgen/asncodec/UnCountryId.c +++ b/certgen/asncodec/UnCountryId.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "UnCountryId.h" diff --git a/certgen/asncodec/UnCountryId.h b/certgen/asncodec/UnCountryId.h index e7de1bbac982dc062c1fa3e5494f32651b8a9ac7..5e4c44b3307f60d0c6b1c8b3cc5fd410986ec64c 100644 --- a/certgen/asncodec/UnCountryId.h +++ b/certgen/asncodec/UnCountryId.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/UnknownLatitude.c b/certgen/asncodec/UnknownLatitude.c index 2dfe841a49b7e82c74ccb26cc3a08102173a1ae9..63e4837f3aaf063e93be65b1a440821124f04c9c 100644 --- a/certgen/asncodec/UnknownLatitude.c +++ b/certgen/asncodec/UnknownLatitude.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "UnknownLatitude.h" diff --git a/certgen/asncodec/UnknownLatitude.h b/certgen/asncodec/UnknownLatitude.h index 1312cdb98fa785b5d23c6b44637899af4f2847f8..3832a0d8e270e49389ae271c0948419deeb76ce4 100644 --- a/certgen/asncodec/UnknownLatitude.h +++ b/certgen/asncodec/UnknownLatitude.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/UnknownLongitude.c b/certgen/asncodec/UnknownLongitude.c index 7b1dd607ba4d27ef3e4b5d3104094a42cd7f38ba..9a27dc0e70a3379e35aa6808ace048fc9015aa61 100644 --- a/certgen/asncodec/UnknownLongitude.c +++ b/certgen/asncodec/UnknownLongitude.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "UnknownLongitude.h" diff --git a/certgen/asncodec/UnknownLongitude.h b/certgen/asncodec/UnknownLongitude.h index e1fe92191150e1008b9678eb7a13e34f57dd82fb..e09cbd25a42441f17451e33c928e10bf3ba5dcd9 100644 --- a/certgen/asncodec/UnknownLongitude.h +++ b/certgen/asncodec/UnknownLongitude.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/UnsecuredAprvBinaryTree.c b/certgen/asncodec/UnsecuredAprvBinaryTree.c index 0bf0c5e8e5ec456e4d632691c13c03916678f4de..a0281d3868e46c3ff2ae16b47509cd3a67f4af87 100644 --- a/certgen/asncodec/UnsecuredAprvBinaryTree.c +++ b/certgen/asncodec/UnsecuredAprvBinaryTree.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Acpc" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Acpc.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "UnsecuredAprvBinaryTree.h" diff --git a/certgen/asncodec/UnsecuredAprvBinaryTree.h b/certgen/asncodec/UnsecuredAprvBinaryTree.h index aab1e67376c119b29cc40794b6bf33c1a6815aa9..704bdfe1e604a6474cfbad3c089ddebdcea5cda7 100644 --- a/certgen/asncodec/UnsecuredAprvBinaryTree.h +++ b/certgen/asncodec/UnsecuredAprvBinaryTree.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Acpc" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Acpc.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/Url.c b/certgen/asncodec/Url.c index 56e6b12a88fd2ef3f508ba8d0d3b928ac39ecb54..584833d2a46c513de8be0483af1248cbe2cdf60c 100644 --- a/certgen/asncodec/Url.c +++ b/certgen/asncodec/Url.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TrustLists" * found in "asn1/pki_ts102941/EtsiTs102941TrustLists.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "Url.h" diff --git a/certgen/asncodec/Url.h b/certgen/asncodec/Url.h index eb2c9bbdff6fd8219d0792982829af6cb4740857..58444181695144b5f5249d1510dcbeab6403cbe6 100644 --- a/certgen/asncodec/Url.h +++ b/certgen/asncodec/Url.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941TrustLists" * found in "asn1/pki_ts102941/EtsiTs102941TrustLists.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/ValidityPeriod.c b/certgen/asncodec/ValidityPeriod.c index 0264832a7e758d45b13f938c7cfb5fdf8d3c344c..91c18417b27cbd56a348425f13b738057a921824 100644 --- a/certgen/asncodec/ValidityPeriod.c +++ b/certgen/asncodec/ValidityPeriod.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "ValidityPeriod.h" diff --git a/certgen/asncodec/ValidityPeriod.h b/certgen/asncodec/ValidityPeriod.h index fec69b1eb939b181bc609926c1cf071f4269563a..f11a945e15f3aed63443fff8ddd4f4ef1d2b8c29 100644 --- a/certgen/asncodec/ValidityPeriod.h +++ b/certgen/asncodec/ValidityPeriod.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2BaseTypes" - * found in "asn1/ieee1609.2/IEEE1609dot2BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/VerificationKeyIndicator.c b/certgen/asncodec/VerificationKeyIndicator.c index 00af797d7956be19e790ee87785bffe3d22a8485..b86fbdd879a313e8c3a31e482ae40497e4b4cdd2 100644 --- a/certgen/asncodec/VerificationKeyIndicator.c +++ b/certgen/asncodec/VerificationKeyIndicator.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "VerificationKeyIndicator.h" diff --git a/certgen/asncodec/VerificationKeyIndicator.h b/certgen/asncodec/VerificationKeyIndicator.h index ee6dfc1a1c86713b27da4283a17bcf8150e75d05..566463f0d15ab031a74ac03eb00d4fc0d31d42a1 100644 --- a/certgen/asncodec/VerificationKeyIndicator.h +++ b/certgen/asncodec/VerificationKeyIndicator.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2" - * found in "asn1/ieee1609.2/IEEE1609dot2.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/ieee1609.2/Ieee1609Dot2.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/Version.c b/certgen/asncodec/Version.c index fdd12ac9ee282e1f0e10bddd9878d2ec95d978c4..8901eac0f1f0191a7b340fad8c84720b01764148 100644 --- a/certgen/asncodec/Version.c +++ b/certgen/asncodec/Version.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941BaseTypes" * found in "asn1/pki_ts102941/EtsiTs102941BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "Version.h" diff --git a/certgen/asncodec/Version.h b/certgen/asncodec/Version.h index ac0857a5f4ba740a8e200f1584221f1f3dc9293a..33891a9c4cae3b1613cbc8e0b3e3fca1c74610a9 100644 --- a/certgen/asncodec/Version.h +++ b/certgen/asncodec/Version.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941BaseTypes" * found in "asn1/pki_ts102941/EtsiTs102941BaseTypes.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/X509Certificate.c b/certgen/asncodec/X509Certificate.c index ca5847fc238eed665fbcca8a409a7529eb222007..23a18a439c707cea9e5f3d7614ca6537596eaa3d 100644 --- a/certgen/asncodec/X509Certificate.c +++ b/certgen/asncodec/X509Certificate.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "X509Certificate.h" diff --git a/certgen/asncodec/X509Certificate.h b/certgen/asncodec/X509Certificate.h index df34d443950321eeda3503d63b695e997c4b578b..f88ff1ea37cda71306d3391935fa5d17c88b75a9 100644 --- a/certgen/asncodec/X509Certificate.h +++ b/certgen/asncodec/X509Certificate.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/X509SignedButterflyAuthorizationRequestMessage.c b/certgen/asncodec/X509SignedButterflyAuthorizationRequestMessage.c index afd35e69fa5aeb3dfecaf033744348447767d278..eca2573b0817074f310e08d8cee2c217e47ddaa3 100644 --- a/certgen/asncodec/X509SignedButterflyAuthorizationRequestMessage.c +++ b/certgen/asncodec/X509SignedButterflyAuthorizationRequestMessage.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941MessagesCa" - * found in "asn1/pki_ts102941/EtsiTs102941MessagesCA.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/pki_ts102941/EtsiTs102941MessagesCa.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "X509SignedButterflyAuthorizationRequestMessage.h" diff --git a/certgen/asncodec/X509SignedButterflyAuthorizationRequestMessage.h b/certgen/asncodec/X509SignedButterflyAuthorizationRequestMessage.h index 059cb60b94d5c027c9c635c096aa1a863bbd7a47..dbf623a791b77b34ae07d45acd2f0188931b8065 100644 --- a/certgen/asncodec/X509SignedButterflyAuthorizationRequestMessage.h +++ b/certgen/asncodec/X509SignedButterflyAuthorizationRequestMessage.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "EtsiTs102941MessagesCa" - * found in "asn1/pki_ts102941/EtsiTs102941MessagesCA.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "asn1/pki_ts102941/EtsiTs102941MessagesCa.asn" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/X509SignerIdentifier.c b/certgen/asncodec/X509SignerIdentifier.c index cd7a207b41405a230a62509db65198fcf6234c86..c1e664e3a16f0f4b10b2e8de7c1eb8ccb38375ca 100644 --- a/certgen/asncodec/X509SignerIdentifier.c +++ b/certgen/asncodec/X509SignerIdentifier.c @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "X509SignerIdentifier.h" diff --git a/certgen/asncodec/X509SignerIdentifier.h b/certgen/asncodec/X509SignerIdentifier.h index 65e4c875194d09a90bcc9dd6e9ef700da3d30f57..f4e09324b10e9086432e4889e5e4f4890b5f4886 100644 --- a/certgen/asncodec/X509SignerIdentifier.h +++ b/certgen/asncodec/X509SignerIdentifier.h @@ -2,7 +2,7 @@ * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "Ieee1609Dot2Dot1Protocol" * found in "asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/YEAR-ENCODING.c b/certgen/asncodec/YEAR-ENCODING.c index 3007fcd09c2aa8bfbf5a9b5d568c126f11b9f3a1..52342768bcc551daaef713240ec2ebd3cfdd4bdc 100644 --- a/certgen/asncodec/YEAR-ENCODING.c +++ b/certgen/asncodec/YEAR-ENCODING.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "ASN1C-DATE" - * found in "../../../../asn1c-fillabs2/skeletons/standard-modules/date.asn1" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "../../../../asn1c-fillabs/skeletons/standard-modules/date.asn1" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "YEAR-ENCODING.h" diff --git a/certgen/asncodec/YEAR-ENCODING.h b/certgen/asncodec/YEAR-ENCODING.h index 8ef6afc524bd72ed62fc26449dec4907cc2063ee..c3630a914f68793055e030591e7ef03ebccb1ef2 100644 --- a/certgen/asncodec/YEAR-ENCODING.h +++ b/certgen/asncodec/YEAR-ENCODING.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "ASN1C-DATE" - * found in "../../../../asn1c-fillabs2/skeletons/standard-modules/date.asn1" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "../../../../asn1c-fillabs/skeletons/standard-modules/date.asn1" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/YEAR-MONTH-ENCODING.c b/certgen/asncodec/YEAR-MONTH-ENCODING.c index 3c517988daf142f34e0f3ce0bfad0ad2d9262278..62bdac943202ea11bf87258b53a2a8086634b76c 100644 --- a/certgen/asncodec/YEAR-MONTH-ENCODING.c +++ b/certgen/asncodec/YEAR-MONTH-ENCODING.c @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "ASN1C-DATE" - * found in "../../../../asn1c-fillabs2/skeletons/standard-modules/date.asn1" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "../../../../asn1c-fillabs/skeletons/standard-modules/date.asn1" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ #include "YEAR-MONTH-ENCODING.h" diff --git a/certgen/asncodec/YEAR-MONTH-ENCODING.h b/certgen/asncodec/YEAR-MONTH-ENCODING.h index 232ce47b484f55edd79b0e27bfdeedc8580147ca..e8f25578a9cfadf32350333bc0c7b8952877ba57 100644 --- a/certgen/asncodec/YEAR-MONTH-ENCODING.h +++ b/certgen/asncodec/YEAR-MONTH-ENCODING.h @@ -1,8 +1,8 @@ /* * Generated by asn1c-0.9.29-DF (http://lionet.info/asn1c) * From ASN.1 module "ASN1C-DATE" - * found in "../../../../asn1c-fillabs2/skeletons/standard-modules/date.asn1" - * `asn1c -S ../../../../asn1c-fillabs2/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` + * found in "../../../../asn1c-fillabs/skeletons/standard-modules/date.asn1" + * `asn1c -S ../../../../asn1c-fillabs/skeletons -fcompound-names -no-gen-BER -no-gen-JER -no-gen-UPER -no-gen-APER -no-gen-random-fill -no-gen-example -pdu=EtsiTs103097Data -pdu=EnrolmentRequestMessage -pdu=EnrolmentResponseMessage -pdu=AuthorizationRequestMessage -pdu=AuthorizationRequestMessageWithPop -pdu=AuthorizationResponseMessage -pdu=CertificateRevocationListMessage -pdu=TlmCertificateTrustListMessage -pdu=RcaCertificateTrustListMessage -pdu=AuthorizationValidationRequestMessage -pdu=AuthorizationValidationResponseMessage -pdu=CaCertificateRequestMessage -pdu=EtsiTs103097Certificate` */ diff --git a/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1AcaEeInterface.asn b/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1AcaEeInterface.asn index c83e0e3cb9de96163e44a9fb90d0540941b88e30..3a5eed53cbec64a1fa6828e5c3b859564982e198 100644 --- a/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1AcaEeInterface.asn +++ b/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1AcaEeInterface.asn @@ -1,92 +1,92 @@ ---***************************************************************************-- --- IEEE Std 1609.2.1: ACA - EE Interface -- ---***************************************************************************-- - -/** - * @note Section references in this file are to clauses in IEEE Std - * 1609.2.1 unless indicated otherwise. Full forms of acronyms and - * abbreviations used in this file are specified in 3.2. - */ - -Ieee1609Dot2Dot1AcaEeInterface {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) - extension-standards(255) dot1(1) interfaces(1) aca-ee(1) major-version-2(2) - minor-version-3(3)} - -DEFINITIONS AUTOMATIC TAGS ::= BEGIN - -EXPORTS ALL; - -IMPORTS - Certificate -FROM Ieee1609Dot2 {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) - dot2(2) base(1) schema(1) major-version-2(2) minor-version-5(5)} -WITH SUCCESSORS - - Time32, - Uint8 -FROM Ieee1609Dot2BaseTypes {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) - base(1) base-types(2) major-version-2(2) minor-version-3(3)} -WITH SUCCESSORS -; - -/** - * @brief This is the parent structure for all structures exchanged between - * the ACA and the EE. The ACA - EE interface is a logical interface rather - * than a direct communications interface in that there is no direct message - * flow between the ACA and the EE: Messages from the ACA are stored - * by the RA and subsequently forwarded to the EE. The PDUs are identified as - * ACA-EE PDUs even though the RA acts as a forwarder for them because those - * PDUs are created by the ACA and encrypted for the EE, and not modified and - * frequently not read by the RA. An overview of this structure is as follows: - * - * @param acaEeCertResponse: contains the ACA's response to - * RaAcaCertRequestSPDU, which is meant for the EE and sent via the RA. - */ -AcaEeInterfacePdu ::= CHOICE { - acaEeCertResponse AcaEeCertResponse, - ... -} - -/** - * @brief This structure contains a certificate and associated data as - * generated by the ACA for the EE that will be the holder of that - * certificate. An overview of this structure is as follows: - * - * @note In the case where the butterfly expansion function is used - * to set certEncKey in RaAcaCertRequest, the value j is not communicated to - * the ACA. However, the EE that receives the certificate response can only - * decrypt the response if it knows j. The RA is therefore anticipated to - * store j so that it can be associated with the appropriate certificate - * response. The RA encodes j in the filename. - * - * @param version: contains the current version of the structure. - * - * @param generationTime: contains the generation time of AcaEeCertResponse. - * - * @param certificate: contains an authorization certificate generated by the - * ACA. It is of the type indicated by the type field in the corresponding - * request (if the requester requested an incorrect type, the response would - * be an error not an instance of this structure). - * - * @param privateKeyInfo: shall be: - * - Present and contain the private key randomization value, if the field - * certificate.type is explicit and the butterfly key mechanism was used to - * generate the certificate. This is used by the EE in deriving the butterfly - * private key for explicit certificates as specified in 9.3. - * - Present and contain the private key reconstruction value, if the field - * certificate.type is implicit. This is used by the EE as specified in 5.3.2 - * of IEEE Std 1609.2a-2017 (also 9.3 if the butterfly key mechanism is used). - * - Absent otherwise. - */ -AcaEeCertResponse ::= SEQUENCE { - version Uint8 (2), - generationTime Time32, - certificate Certificate, - privateKeyInfo OCTET STRING (SIZE (32)) OPTIONAL, - ... -} - -END +--***************************************************************************-- +-- IEEE Std 1609.2.1: ACA - EE Interface -- +--***************************************************************************-- + +/** + * @note Section references in this file are to clauses in IEEE Std + * 1609.2.1 unless indicated otherwise. Full forms of acronyms and + * abbreviations used in this file are specified in 3.2. + */ + +Ieee1609Dot2Dot1AcaEeInterface {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) + extension-standards(255) dot1(1) interfaces(1) aca-ee(1) major-version-2(2) + minor-version-3(3)} + +DEFINITIONS AUTOMATIC TAGS ::= BEGIN + +EXPORTS ALL; + +IMPORTS + Certificate +FROM Ieee1609Dot2 {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) + dot2(2) base(1) schema(1) major-version-2(2) minor-version-5(5)} +WITH SUCCESSORS + + Time32, + Uint8 +FROM Ieee1609Dot2BaseTypes {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) + base(1) base-types(2) major-version-2(2) minor-version-3(3)} +WITH SUCCESSORS +; + +/** + * @brief This is the parent structure for all structures exchanged between + * the ACA and the EE. The ACA - EE interface is a logical interface rather + * than a direct communications interface in that there is no direct message + * flow between the ACA and the EE: Messages from the ACA are stored + * by the RA and subsequently forwarded to the EE. The PDUs are identified as + * ACA-EE PDUs even though the RA acts as a forwarder for them because those + * PDUs are created by the ACA and encrypted for the EE, and not modified and + * frequently not read by the RA. An overview of this structure is as follows: + * + * @param acaEeCertResponse: contains the ACA's response to + * RaAcaCertRequestSPDU, which is meant for the EE and sent via the RA. + */ +AcaEeInterfacePdu ::= CHOICE { + acaEeCertResponse AcaEeCertResponse, + ... +} + +/** + * @brief This structure contains a certificate and associated data as + * generated by the ACA for the EE that will be the holder of that + * certificate. An overview of this structure is as follows: + * + * @note In the case where the butterfly expansion function is used + * to set certEncKey in RaAcaCertRequest, the value j is not communicated to + * the ACA. However, the EE that receives the certificate response can only + * decrypt the response if it knows j. The RA is therefore anticipated to + * store j so that it can be associated with the appropriate certificate + * response. The RA encodes j in the filename. + * + * @param version: contains the current version of the structure. + * + * @param generationTime: contains the generation time of AcaEeCertResponse. + * + * @param certificate: contains an authorization certificate generated by the + * ACA. It is of the type indicated by the type field in the corresponding + * request (if the requester requested an incorrect type, the response would + * be an error not an instance of this structure). + * + * @param privateKeyInfo: shall be: + * - Present and contain the private key randomization value, if the field + * certificate.type is explicit and the butterfly key mechanism was used to + * generate the certificate. This is used by the EE in deriving the butterfly + * private key for explicit certificates as specified in 9.3. + * - Present and contain the private key reconstruction value, if the field + * certificate.type is implicit. This is used by the EE as specified in 5.3.2 + * of IEEE Std 1609.2a-2017 (also 9.3 if the butterfly key mechanism is used). + * - Absent otherwise. + */ +AcaEeCertResponse ::= SEQUENCE { + version Uint8 (2), + generationTime Time32, + certificate Certificate, + privateKeyInfo OCTET STRING (SIZE (32)) OPTIONAL, + ... +} + +END diff --git a/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1AcaLaInterface.asn b/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1AcaLaInterface.asn index 26dee6134d5a4545d2e6e0e61cfad02859592c8c..cf7923fd1d2895997cb3a838e09d7520c991dc55 100644 --- a/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1AcaLaInterface.asn +++ b/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1AcaLaInterface.asn @@ -1,26 +1,26 @@ ---***************************************************************************-- --- IEEE Std 1609.2.1: ACA - LA Interface -- ---***************************************************************************-- - -/** - * @note Section references in this file are to clauses in IEEE Std - * 1609.2.1 unless indicated otherwise. Full forms of acronyms and - * abbreviations used in this file are specified in 3.2. - */ - -Ieee1609Dot2Dot1AcaLaInterface {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) - extension-standards(255) dot1(1) interfaces(1) aca-la(2) major-version-2(2) - minor-version-1(1)} - -DEFINITIONS AUTOMATIC TAGS ::= BEGIN - -EXPORTS ALL; - -/** - * @brief This structure is not used by EEs, so it is defined as NULL for - * purposes of this document. - */ -AcaLaInterfacePdu ::= NULL - -END +--***************************************************************************-- +-- IEEE Std 1609.2.1: ACA - LA Interface -- +--***************************************************************************-- + +/** + * @note Section references in this file are to clauses in IEEE Std + * 1609.2.1 unless indicated otherwise. Full forms of acronyms and + * abbreviations used in this file are specified in 3.2. + */ + +Ieee1609Dot2Dot1AcaLaInterface {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) + extension-standards(255) dot1(1) interfaces(1) aca-la(2) major-version-2(2) + minor-version-1(1)} + +DEFINITIONS AUTOMATIC TAGS ::= BEGIN + +EXPORTS ALL; + +/** + * @brief This structure is not used by EEs, so it is defined as NULL for + * purposes of this document. + */ +AcaLaInterfacePdu ::= NULL + +END diff --git a/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1AcaMaInterface.asn b/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1AcaMaInterface.asn index 5a1c9fe45e6196da4bb307bd4089597fcb8368c1..ff6e11440f5bdf2d5e2767c70e6ac9023d4cb936 100644 --- a/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1AcaMaInterface.asn +++ b/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1AcaMaInterface.asn @@ -1,26 +1,26 @@ ---***************************************************************************-- --- IEEE Std 1609.2.1: ACA - MA Interface -- ---***************************************************************************-- - -/** - * @note Section references in this file are to clauses in IEEE Std - * 1609.2.1 unless indicated otherwise. Full forms of acronyms and - * abbreviations used in this file are specified in 3.2. - */ - -Ieee1609Dot2Dot1AcaMaInterface {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) - extension-standards(255) dot1(1) interfaces(1) aca-ma(3) major-version-2(2) - minor-version-1(1)} - -DEFINITIONS AUTOMATIC TAGS ::= BEGIN - -EXPORTS ALL; - -/** - * @brief This structure is not used by EEs, so it is defined as NULL for - * purposes of this document. - */ -AcaMaInterfacePdu ::= NULL - -END +--***************************************************************************-- +-- IEEE Std 1609.2.1: ACA - MA Interface -- +--***************************************************************************-- + +/** + * @note Section references in this file are to clauses in IEEE Std + * 1609.2.1 unless indicated otherwise. Full forms of acronyms and + * abbreviations used in this file are specified in 3.2. + */ + +Ieee1609Dot2Dot1AcaMaInterface {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) + extension-standards(255) dot1(1) interfaces(1) aca-ma(3) major-version-2(2) + minor-version-1(1)} + +DEFINITIONS AUTOMATIC TAGS ::= BEGIN + +EXPORTS ALL; + +/** + * @brief This structure is not used by EEs, so it is defined as NULL for + * purposes of this document. + */ +AcaMaInterfacePdu ::= NULL + +END diff --git a/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1AcaRaInterface.asn b/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1AcaRaInterface.asn index 1235651a5a66c51472c0e7080154d6cea223449d..e4d8067b96ab8fc857b88085a4ae61fac1e25b11 100644 --- a/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1AcaRaInterface.asn +++ b/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1AcaRaInterface.asn @@ -1,261 +1,261 @@ ---***************************************************************************-- --- IEEE Std 1609.2.1: ACA - RA Interface -- ---***************************************************************************-- - -/** - * @note Section references in this file are to clauses in IEEE Std - * 1609.2.1 unless indicated otherwise. Full forms of acronyms and - * abbreviations used in this file are specified in 3.2. - */ - -Ieee1609Dot2Dot1AcaRaInterface {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) - extension-standards(255) dot1(1) interfaces(1) aca-ra(4) major-version-3(3) - minor-version-1(1)} - -DEFINITIONS AUTOMATIC TAGS ::= BEGIN - -EXPORTS ALL; - -IMPORTS - CertificateType, - ToBeSignedCertificate -FROM Ieee1609Dot2 {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) - dot2(2) base(1) schema(1) major-version-2(2) minor-version-5(5)} -WITH SUCCESSORS - - HashAlgorithm, - HashedId8, - LaId, - PublicEncryptionKey, - Time32, - Uint8 -FROM Ieee1609Dot2BaseTypes {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) - base(1) base-types(2) major-version-2(2) minor-version-3(3)} -WITH SUCCESSORS - - AcaEeCertResponsePlainSpdu, - AcaEeCertResponsePrivateSpdu, - AcaEeCertResponseCubkSpdu, - Ieee1609Dot2Data-SymmEncryptedSingleRecipient -FROM Ieee1609Dot2Dot1Protocol {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) - extension-standards(255) dot1(1) interfaces(1) protocol(17) - major-version-3(3) minor-version-1(1)} -WITH SUCCESSORS -; - -/** - * @brief This is the parent structure for all structures exchanged between - * the ACA and the RA. An overview of this structure is as follows: - * - * @param raAcaCertRequest: contains the request for an authorization - * certificate from the RA to the ACA on behalf of the EE. - * - * @param acaRaCertResponse: contains the ACA's response to RaAcaCertRequest. - */ -AcaRaInterfacePdu ::= CHOICE { - raAcaCertRequest RaAcaCertRequest, - acaRaCertResponse AcaRaCertResponse, - ... -} - -/** - * @brief This structure contains parameters needed to request an individual - * authorization certificate. An overview of this structure is as follows: - * - * @note: - * - In the case where the butterfly key mechanism is used to set - * certEncKey, the value of j is not communicated to the ACA. However, the EE - * that receives the certificate response can only decrypt the response if it - * knows j. The RA is therefore anticipated to store j so that it can be - * associated with the appropriate certificate response. - * - * - The cracaId and crlSeries are set to the indicated values - * in the request. The ACA replaces these values with the appropriate values - * in the response. - * - * - The ACA is not bound by the contents of the request and can - * issue certificates that are different from those requested, if so directed - * by policy. - * - * @param version: contains the current version of the structure. - * - * @param generationTime: contains the generation time of RaAcaCertRequest. - * - * @param type: indicates whether the request is for an explicit or implicit - * certificate (see 4.1.1, 4.1.3.3.1). - * - * @param flags: contains the flags related to the use of the butterfly key - * mechanism, and provides the following instructions to the ACA as to how - * to generate the response: - * - If the flag butterflyExplicit is set, the request is valid only if - * the type field is set to explicit. In this case, the ACA uses the - * butterfly key derivation for explicit certificates as specified in 9.3. - * The field tbsCert.verifyKeyIndicator.verificationKey is used by the ACA as - * the cocoon public key for signing. The field privateKeyInfo in the - * corresponding AcaEeCertResponse is used by the EE as the random integer to - * recover the butterfly private key for signing. - * - If the flag cubk is set, the request is valid only if the certEncKey - * field is absent. In this case, the ACA uses the compact unified variation - * of the butterfly key mechanism as specified in 9.3. This means that the - * ACA generates an AcaEeCertResponseCubkSpdu instead of an - * AcaEeCertResponsePrivateSpdu, and the response is valid only if the ACA - * certificate has the flag cubk set. - * - * @param linkageInfo: contains the encrypted prelinkage values needed to - * generate the linkage value for the certificate. If linkageInfo is present, - * the field tbsCert.id is of type LinkageData, where the iCert field is set - * to the actual i-period value and the linkage-value field is set to a dummy - * value to be replaced by the ACA with the actual linkage value. The - * encrypted prelinkage values are encrypted for the ACA by the LAs. - * - * @param certEncKey: is used in combination with flags.cubk to indicate - * the type of response that is expected from the ACA. It is as follows: - * - Absent and flags.cubk is not set if the ACA's response doesn't need - * to be encrypted. In this case, the ACA responds with - * AcaEeCertResponsePlainSpdu. - * - Absent and flags.cubk is set if the ACA's response is to be encrypted - * with the verification key from the request and not signed. In this case, - * the ACA responds with AcaEeCertResponseCubkSpdu. - * - Present and flags.cubk is not set if the ACA's response is to be - * encrypted with certEncKey and then signed by the ACA. In this case, the - * ACA responds with AcaEeCertResponsePrivateSpdu. - * - * @param tbsCert: contains parameters of the requested certificate. The - * certificate type depends on the field type, as follows: - * - If type is explicit, the request is valid only if - * tbsCert.verifyKeyIndicator is a verificationKey. - * - If type is implicit, the request is valid only if - * tbsCert.verifyKeyIndicator is a reconstructionValue. - */ -RaAcaCertRequest ::= SEQUENCE { - version Uint8 (2), - generationTime Time32, - type CertificateType, - flags RaAcaCertRequestFlags, - linkageInfo LinkageInfo OPTIONAL, - certEncKey PublicEncryptionKey OPTIONAL, - tbsCert ToBeSignedCertificate (WITH COMPONENTS { - ..., - cracaId ('000000'H), - crlSeries (0), - appPermissions PRESENT, - certIssuePermissions ABSENT, - certRequestPermissions ABSENT - }), - ... -} - -/** - * @brief This structure is used to convey information from the RA to the ACA - * about operations to be carried out when generating the certificate. For - * more details see the specification of RaAcaCertRequest. An overview of - * this structure is as follows: - */ -RaAcaCertRequestFlags ::= - BIT STRING {butterflyExplicit (0), cubk (1)} (SIZE (8)) - -/** - * @brief This structure contains parameters needed to generate a linkage - * value for a given (EE, i, j). An overview of this structure is as follows: - * - * @note See Annex D for further discussion of LAs. - * - * @param encPlv1: contains the EncryptedIndividualPLV from one of the LAs. - * - * @param encPlv2: contains the EncryptedIndividualPLV from the other LA. - */ -LinkageInfo ::= SEQUENCE { - encPlv1 EncryptedIndividualPLV, - encPlv2 EncryptedIndividualPLV, - ... -} - -/** - * @brief This structure contains an individual prelinkage value encrypted by - * the LA for the ACA using the shared secret key. An overview of this - * structure is as follows: - * - * @note How the ACA obtains the shared symmetric key and how the RA - * associates the encPlv1 and encPlv2 with the correct certificate request are - * outside the scope of this document. - * - * @param version: contains the current version of the structure. - * - * @param laId: contains the ID of the LA that created the prelinkage value. - * See Annex D for further discussion of LA IDs. - * - * @param encPlv: contains the encrypted individual prelinkage value, that is, - * the ciphertext field decrypts to a PreLinkageValue. It contains a pointer - * (hash of the shared symmetric key) to the used shared secret encryption key. - */ -EncryptedIndividualPLV ::= SEQUENCE { - version Uint8 (2), - laId LaId, - encPlv Ieee1609Dot2Data-SymmEncryptedSingleRecipient { - PreLinkageValue - } -} - -/** - * @brief This structure contains an individual prelinkage value. It is an - * octet string of length 9 octets. - */ -PreLinkageValue ::= OCTET STRING (SIZE(9)) - -/** - * @brief This structure contains a certificate response by the ACA, - * encapsulated for consumption by the EE, as well as associated data for - * consumption by the RA. The response is of form AcaEeCertResponsePlainSpdu, - * AcaEeCertResponsePrivateSpdu, or AcaEeCertResponseCubkSpdu, and is - * generated in response to a successful RaAcaCertRequestSpdu. In this - * structure: - * - * @param version: contains the current version of the structure. - * - * @param generationTime: contains the generation time of AcaRaCertResponse. - * - * @param requestHash: contains the hash of the corresponding - * RaAcaCertRequestSPDU. - * - * @param acaResponse: contains the certificate for the EE in a suitable form - * as determined from the corresponding RaAcaCertRequestSPDU. - */ -AcaRaCertResponse ::= SEQUENCE { - version Uint8 (2), - generationTime Time32, - requestHash HashedId8, - acaResponse AcaResponse, - ... -} - -/** - * @brief This structure contains the certificate for the EE in a suitable - * form as determined from the corresponding RaAcaCertRequestSPDU. In this - * structure: - * - * @param plain: contains the certificate for the EE in plain, that is, without - * encryption or signature. This choice is used only when the field - * certEncKey is absent and flags.cubk is not set in the corresponding - * RaAcaCertRequest. - * - * @param private: contains the certificate for the EE in an encrypted then - * signed form to protect the EE's privacy from the RA. This choice is used - * only when the field certEncKey is present and flags.cubk is not set in the - * corresponding RaAcaCertRequest. - * - * @param cubk: contains the certificate for the EE in an encrypted form. This - * choice is used only when the field certEncKey is absent and flags.cubk is - * set in the corresponding RaAcaCertRequest. - */ -AcaResponse ::= CHOICE { - plain AcaEeCertResponsePlainSpdu, - private AcaEeCertResponsePrivateSpdu, - cubk AcaEeCertResponseCubkSpdu, - ... -} - -END +--***************************************************************************-- +-- IEEE Std 1609.2.1: ACA - RA Interface -- +--***************************************************************************-- + +/** + * @note Section references in this file are to clauses in IEEE Std + * 1609.2.1 unless indicated otherwise. Full forms of acronyms and + * abbreviations used in this file are specified in 3.2. + */ + +Ieee1609Dot2Dot1AcaRaInterface {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) + extension-standards(255) dot1(1) interfaces(1) aca-ra(4) major-version-3(3) + minor-version-1(1)} + +DEFINITIONS AUTOMATIC TAGS ::= BEGIN + +EXPORTS ALL; + +IMPORTS + CertificateType, + ToBeSignedCertificate +FROM Ieee1609Dot2 {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) + dot2(2) base(1) schema(1) major-version-2(2) minor-version-5(5)} +WITH SUCCESSORS + + HashAlgorithm, + HashedId8, + LaId, + PublicEncryptionKey, + Time32, + Uint8 +FROM Ieee1609Dot2BaseTypes {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) + base(1) base-types(2) major-version-2(2) minor-version-3(3)} +WITH SUCCESSORS + + AcaEeCertResponsePlainSpdu, + AcaEeCertResponsePrivateSpdu, + AcaEeCertResponseCubkSpdu, + Ieee1609Dot2Data-SymmEncryptedSingleRecipient +FROM Ieee1609Dot2Dot1Protocol {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) + extension-standards(255) dot1(1) interfaces(1) protocol(17) + major-version-3(3) minor-version-1(1)} +WITH SUCCESSORS +; + +/** + * @brief This is the parent structure for all structures exchanged between + * the ACA and the RA. An overview of this structure is as follows: + * + * @param raAcaCertRequest: contains the request for an authorization + * certificate from the RA to the ACA on behalf of the EE. + * + * @param acaRaCertResponse: contains the ACA's response to RaAcaCertRequest. + */ +AcaRaInterfacePdu ::= CHOICE { + raAcaCertRequest RaAcaCertRequest, + acaRaCertResponse AcaRaCertResponse, + ... +} + +/** + * @brief This structure contains parameters needed to request an individual + * authorization certificate. An overview of this structure is as follows: + * + * @note: + * - In the case where the butterfly key mechanism is used to set + * certEncKey, the value of j is not communicated to the ACA. However, the EE + * that receives the certificate response can only decrypt the response if it + * knows j. The RA is therefore anticipated to store j so that it can be + * associated with the appropriate certificate response. + * + * - The cracaId and crlSeries are set to the indicated values + * in the request. The ACA replaces these values with the appropriate values + * in the response. + * + * - The ACA is not bound by the contents of the request and can + * issue certificates that are different from those requested, if so directed + * by policy. + * + * @param version: contains the current version of the structure. + * + * @param generationTime: contains the generation time of RaAcaCertRequest. + * + * @param type: indicates whether the request is for an explicit or implicit + * certificate (see 4.1.1, 4.1.3.3.1). + * + * @param flags: contains the flags related to the use of the butterfly key + * mechanism, and provides the following instructions to the ACA as to how + * to generate the response: + * - If the flag butterflyExplicit is set, the request is valid only if + * the type field is set to explicit. In this case, the ACA uses the + * butterfly key derivation for explicit certificates as specified in 9.3. + * The field tbsCert.verifyKeyIndicator.verificationKey is used by the ACA as + * the cocoon public key for signing. The field privateKeyInfo in the + * corresponding AcaEeCertResponse is used by the EE as the random integer to + * recover the butterfly private key for signing. + * - If the flag cubk is set, the request is valid only if the certEncKey + * field is absent. In this case, the ACA uses the compact unified variation + * of the butterfly key mechanism as specified in 9.3. This means that the + * ACA generates an AcaEeCertResponseCubkSpdu instead of an + * AcaEeCertResponsePrivateSpdu, and the response is valid only if the ACA + * certificate has the flag cubk set. + * + * @param linkageInfo: contains the encrypted prelinkage values needed to + * generate the linkage value for the certificate. If linkageInfo is present, + * the field tbsCert.id is of type LinkageData, where the iCert field is set + * to the actual i-period value and the linkage-value field is set to a dummy + * value to be replaced by the ACA with the actual linkage value. The + * encrypted prelinkage values are encrypted for the ACA by the LAs. + * + * @param certEncKey: is used in combination with flags.cubk to indicate + * the type of response that is expected from the ACA. It is as follows: + * - Absent and flags.cubk is not set if the ACA's response doesn't need + * to be encrypted. In this case, the ACA responds with + * AcaEeCertResponsePlainSpdu. + * - Absent and flags.cubk is set if the ACA's response is to be encrypted + * with the verification key from the request and not signed. In this case, + * the ACA responds with AcaEeCertResponseCubkSpdu. + * - Present and flags.cubk is not set if the ACA's response is to be + * encrypted with certEncKey and then signed by the ACA. In this case, the + * ACA responds with AcaEeCertResponsePrivateSpdu. + * + * @param tbsCert: contains parameters of the requested certificate. The + * certificate type depends on the field type, as follows: + * - If type is explicit, the request is valid only if + * tbsCert.verifyKeyIndicator is a verificationKey. + * - If type is implicit, the request is valid only if + * tbsCert.verifyKeyIndicator is a reconstructionValue. + */ +RaAcaCertRequest ::= SEQUENCE { + version Uint8 (2), + generationTime Time32, + type CertificateType, + flags RaAcaCertRequestFlags, + linkageInfo LinkageInfo OPTIONAL, + certEncKey PublicEncryptionKey OPTIONAL, + tbsCert ToBeSignedCertificate (WITH COMPONENTS { + ..., + cracaId ('000000'H), + crlSeries (0), + appPermissions PRESENT, + certIssuePermissions ABSENT, + certRequestPermissions ABSENT + }), + ... +} + +/** + * @brief This structure is used to convey information from the RA to the ACA + * about operations to be carried out when generating the certificate. For + * more details see the specification of RaAcaCertRequest. An overview of + * this structure is as follows: + */ +RaAcaCertRequestFlags ::= + BIT STRING {butterflyExplicit (0), cubk (1)} (SIZE (8)) + +/** + * @brief This structure contains parameters needed to generate a linkage + * value for a given (EE, i, j). An overview of this structure is as follows: + * + * @note See Annex D for further discussion of LAs. + * + * @param encPlv1: contains the EncryptedIndividualPLV from one of the LAs. + * + * @param encPlv2: contains the EncryptedIndividualPLV from the other LA. + */ +LinkageInfo ::= SEQUENCE { + encPlv1 EncryptedIndividualPLV, + encPlv2 EncryptedIndividualPLV, + ... +} + +/** + * @brief This structure contains an individual prelinkage value encrypted by + * the LA for the ACA using the shared secret key. An overview of this + * structure is as follows: + * + * @note How the ACA obtains the shared symmetric key and how the RA + * associates the encPlv1 and encPlv2 with the correct certificate request are + * outside the scope of this document. + * + * @param version: contains the current version of the structure. + * + * @param laId: contains the ID of the LA that created the prelinkage value. + * See Annex D for further discussion of LA IDs. + * + * @param encPlv: contains the encrypted individual prelinkage value, that is, + * the ciphertext field decrypts to a PreLinkageValue. It contains a pointer + * (hash of the shared symmetric key) to the used shared secret encryption key. + */ +EncryptedIndividualPLV ::= SEQUENCE { + version Uint8 (2), + laId LaId, + encPlv Ieee1609Dot2Data-SymmEncryptedSingleRecipient { + PreLinkageValue + } +} + +/** + * @brief This structure contains an individual prelinkage value. It is an + * octet string of length 9 octets. + */ +PreLinkageValue ::= OCTET STRING (SIZE(9)) + +/** + * @brief This structure contains a certificate response by the ACA, + * encapsulated for consumption by the EE, as well as associated data for + * consumption by the RA. The response is of form AcaEeCertResponsePlainSpdu, + * AcaEeCertResponsePrivateSpdu, or AcaEeCertResponseCubkSpdu, and is + * generated in response to a successful RaAcaCertRequestSpdu. In this + * structure: + * + * @param version: contains the current version of the structure. + * + * @param generationTime: contains the generation time of AcaRaCertResponse. + * + * @param requestHash: contains the hash of the corresponding + * RaAcaCertRequestSPDU. + * + * @param acaResponse: contains the certificate for the EE in a suitable form + * as determined from the corresponding RaAcaCertRequestSPDU. + */ +AcaRaCertResponse ::= SEQUENCE { + version Uint8 (2), + generationTime Time32, + requestHash HashedId8, + acaResponse AcaResponse, + ... +} + +/** + * @brief This structure contains the certificate for the EE in a suitable + * form as determined from the corresponding RaAcaCertRequestSPDU. In this + * structure: + * + * @param plain: contains the certificate for the EE in plain, that is, without + * encryption or signature. This choice is used only when the field + * certEncKey is absent and flags.cubk is not set in the corresponding + * RaAcaCertRequest. + * + * @param private: contains the certificate for the EE in an encrypted then + * signed form to protect the EE's privacy from the RA. This choice is used + * only when the field certEncKey is present and flags.cubk is not set in the + * corresponding RaAcaCertRequest. + * + * @param cubk: contains the certificate for the EE in an encrypted form. This + * choice is used only when the field certEncKey is absent and flags.cubk is + * set in the corresponding RaAcaCertRequest. + */ +AcaResponse ::= CHOICE { + plain AcaEeCertResponsePlainSpdu, + private AcaEeCertResponsePrivateSpdu, + cubk AcaEeCertResponseCubkSpdu, + ... +} + +END diff --git a/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1Acpc.asn b/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1Acpc.asn index a658f225d2cfdb107cd696a813bf2feca107498f..ac7d5588c42d9f5eb42a850dbf1e9d73a8917fb3 100644 --- a/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1Acpc.asn +++ b/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1Acpc.asn @@ -1,205 +1,205 @@ ---***************************************************************************-- --- IEEE Std 1609.2.1: ACPC -- ---***************************************************************************-- - -/** - * @note Section references in this file are to clauses in IEEE Std - * 1609.2.1 unless indicated otherwise. Full forms of acronyms and - * abbreviations used in this file are specified in 3.2. - */ - -Ieee1609Dot2Dot1Acpc {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) - extension-standards(255) dot1(1) interfaces(1) acpc(18) major-version-3(3) - minor-version-1(1)} - -DEFINITIONS AUTOMATIC TAGS ::= BEGIN - -EXPORTS ALL; - -IMPORTS - HashAlgorithm, - IValue, - Psid, - Time32, - Uint8 -FROM Ieee1609Dot2BaseTypes {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) - base(1) base-types(2) major-version-2(2) minor-version-3(3)} -WITH SUCCESSORS - - Ieee1609Dot2Data-Unsecured, - Ieee1609Dot2Data-Signed -FROM Ieee1609Dot2Dot1Protocol {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) - extension-standards(255) dot1(1) interfaces(1) protocol(17) - major-version-3(3) minor-version-1(1)} -WITH SUCCESSORS -; - -/** - * @brief This structure contains an APrV structure produced by the CAM. An - * overview of this structure is as follows: - * - * @param tree: contains an AprvBinaryTree. - * - * @param aprv: contains a single IndividualAprv. - */ -AcpcPdu ::= CHOICE { - tree AprvBinaryTree, - aprv IndividualAprv, - ... -} - -/** - * @brief This structure encodes a binary tree. An overview of this structure - * is as follows: - * - * @param version: contains the current version of the structure. - * - * @param generationTime: contains the generation time of AprvBinaryTree. - * - * @param currentI: contains the i-value associated with the batch of - * certificates. - * - * @param acpcTreeId: contains an identifier for the CAM creating this binary - * tree. - * - * @param hashAlgorithmId: contains the identifier of the hash algorithm used - * inside the binary tree. - * - * @param tree: contains a bit string indicating which nodes of the tree are - * present. It is calculated as specified in 9.5.4.2, and can be used by the - * EE to determine which entry in nodeValueList to use to derive that EE's - * APrV as specified in 9.5.2. - * - * @param nodeValueList: contains the values of the nodes that are present in - * the order indicated by tree. - */ -AprvBinaryTree ::= SEQUENCE { - version Uint8 (2), - generationTime Time32, - currentI IValue, - acpcTreeId AcpcTreeId, - hashAlgorithmId HashAlgorithm, - tree BIT STRING, - nodeValueList SEQUENCE (SIZE (1..MAX)) OF AcpcNodeValue, - ... -} - -/** - * @brief This is the PSID used to indicate activities in ACPC as specified in - * this document. - */ -AcpcPsid ::= Psid(2113696) - -/** - * @brief This is used to wrap an AprvBinaryTree in an Ieee1609Dot2Data for - * transmission if the policy is that the AprvBinaryTree need not be signed. - * See 9.5.6 for discussion. - */ -UnsecuredAprvBinaryTree ::= Ieee1609Dot2Data-Unsecured { - AcpcPdu (WITH COMPONENTS { - tree - }) -} - -/** - * @brief This is used to wrap an AprvBinaryTree in an Ieee1609Dot2Data for - * transmission if the policy is that the AprvBinaryTree be signed. See 9.5.6 - * for discussion. - */ -SignedAprvBinaryTree ::= Ieee1609Dot2Data-Signed { - AcpcPdu (WITH COMPONENTS { - tree - }), - AcpcPsid -} - -/** - * @brief This structure contains an individual APrV. An overview of this - * structure is as follows: - * - * @param version: contains the current version of the structure. - * - * @param generationTime: contains the generation time of IndividualAprv. - * - * @param currentI: contains the i-value associated with the batch of - * certificates. - * - * @param acpcTreeId: contains an identifier for the CAM creating this binary - * tree. - * - * @param nodeId: contains the identifier of the node. - * - * @param nodeValue: contains the value of the node. - */ -IndividualAprv ::= SEQUENCE { - version Uint8 (2), - generationTime Time32, - currentI IValue, - acpcTreeId AcpcTreeId, - nodeId BIT STRING, - nodeValue AcpcNodeValue, - ... -} - -/** - * @brief This is used to wrap an IndividualAprv in an Ieee1609Dot2Data for - * transmission if the policy is that the IndividualAprv be signed. See 9.5.6 - * for discussion. - */ -SignedIndividualAprv ::= Ieee1609Dot2Data-Signed { - AcpcPdu (WITH COMPONENTS { - aprv - }), - AcpcPsid -} - -/** - * @brief This is an 8 byte string that identifies an ACPC tree series. It is - * required to be globally unique within the system and is the same for all - * ACPC tree instances within the ACPC tree series. Registration of AcpcTreeId - * values is managed by the IEEE RA; see http://standards.ieee.org/regauth. A - * list of assigned AcpcTreeId values is provided in L.2. - */ -AcpcTreeId ::= OCTET STRING (SIZE(8)) - -/** - * @brief This is a 16 byte string that represents the value of a node in the - * ACPC tree. - */ -AcpcNodeValue ::= OCTET STRING (SIZE(16)) - -/** - * @brief This structure, C-OER encoded, is the input to the hash function to - * calculate child node values from a parent node. By including the ID fields - * it "firewalls" the hash function so that an attacker who inverts the hash - * has only found the hash preimage for a specific node, in a specific tree, - * for a specific time period. An overview of this structure is as follows: - * - * @param version: contains the current version of the structure. - * - * @param acpcTreeId: contains an identifier for this ACPC tree series. - * - * @param acpcPeriod: contains an identifier for the time period for this tree. - * If the certificates for which this set of APrVs are intended have an IValue - * field, acpcPeriod in this structure shall be the IValue field in the - * certificates. How the RA and the CAM synchronize on this value is outside - * the scope of this document. - * - * @param childNodeId: contains a bit string of length l encoding the node - * location within the l'th level. - * - * @param parentNodeValue: contains the value of the parent node. - */ -AprvHashCalculationInput ::= SEQUENCE { - version Uint8 (2), - acpcTreeId AcpcTreeId, - acpcPeriod IValue, - childNodeId BIT STRING, - parentNodeValue OCTET STRING (SIZE(16)), - ... -} - -END +--***************************************************************************-- +-- IEEE Std 1609.2.1: ACPC -- +--***************************************************************************-- + +/** + * @note Section references in this file are to clauses in IEEE Std + * 1609.2.1 unless indicated otherwise. Full forms of acronyms and + * abbreviations used in this file are specified in 3.2. + */ + +Ieee1609Dot2Dot1Acpc {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) + extension-standards(255) dot1(1) interfaces(1) acpc(18) major-version-3(3) + minor-version-1(1)} + +DEFINITIONS AUTOMATIC TAGS ::= BEGIN + +EXPORTS ALL; + +IMPORTS + HashAlgorithm, + IValue, + Psid, + Time32, + Uint8 +FROM Ieee1609Dot2BaseTypes {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) + base(1) base-types(2) major-version-2(2) minor-version-3(3)} +WITH SUCCESSORS + + Ieee1609Dot2Data-Unsecured, + Ieee1609Dot2Data-Signed +FROM Ieee1609Dot2Dot1Protocol {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) + extension-standards(255) dot1(1) interfaces(1) protocol(17) + major-version-3(3) minor-version-1(1)} +WITH SUCCESSORS +; + +/** + * @brief This structure contains an APrV structure produced by the CAM. An + * overview of this structure is as follows: + * + * @param tree: contains an AprvBinaryTree. + * + * @param aprv: contains a single IndividualAprv. + */ +AcpcPdu ::= CHOICE { + tree AprvBinaryTree, + aprv IndividualAprv, + ... +} + +/** + * @brief This structure encodes a binary tree. An overview of this structure + * is as follows: + * + * @param version: contains the current version of the structure. + * + * @param generationTime: contains the generation time of AprvBinaryTree. + * + * @param currentI: contains the i-value associated with the batch of + * certificates. + * + * @param acpcTreeId: contains an identifier for the CAM creating this binary + * tree. + * + * @param hashAlgorithmId: contains the identifier of the hash algorithm used + * inside the binary tree. + * + * @param tree: contains a bit string indicating which nodes of the tree are + * present. It is calculated as specified in 9.5.4.2, and can be used by the + * EE to determine which entry in nodeValueList to use to derive that EE's + * APrV as specified in 9.5.2. + * + * @param nodeValueList: contains the values of the nodes that are present in + * the order indicated by tree. + */ +AprvBinaryTree ::= SEQUENCE { + version Uint8 (2), + generationTime Time32, + currentI IValue, + acpcTreeId AcpcTreeId, + hashAlgorithmId HashAlgorithm, + tree BIT STRING, + nodeValueList SEQUENCE (SIZE (1..MAX)) OF AcpcNodeValue, + ... +} + +/** + * @brief This is the PSID used to indicate activities in ACPC as specified in + * this document. + */ +AcpcPsid ::= Psid(2113696) + +/** + * @brief This is used to wrap an AprvBinaryTree in an Ieee1609Dot2Data for + * transmission if the policy is that the AprvBinaryTree need not be signed. + * See 9.5.6 for discussion. + */ +UnsecuredAprvBinaryTree ::= Ieee1609Dot2Data-Unsecured { + AcpcPdu (WITH COMPONENTS { + tree + }) +} + +/** + * @brief This is used to wrap an AprvBinaryTree in an Ieee1609Dot2Data for + * transmission if the policy is that the AprvBinaryTree be signed. See 9.5.6 + * for discussion. + */ +SignedAprvBinaryTree ::= Ieee1609Dot2Data-Signed { + AcpcPdu (WITH COMPONENTS { + tree + }), + AcpcPsid +} + +/** + * @brief This structure contains an individual APrV. An overview of this + * structure is as follows: + * + * @param version: contains the current version of the structure. + * + * @param generationTime: contains the generation time of IndividualAprv. + * + * @param currentI: contains the i-value associated with the batch of + * certificates. + * + * @param acpcTreeId: contains an identifier for the CAM creating this binary + * tree. + * + * @param nodeId: contains the identifier of the node. + * + * @param nodeValue: contains the value of the node. + */ +IndividualAprv ::= SEQUENCE { + version Uint8 (2), + generationTime Time32, + currentI IValue, + acpcTreeId AcpcTreeId, + nodeId BIT STRING, + nodeValue AcpcNodeValue, + ... +} + +/** + * @brief This is used to wrap an IndividualAprv in an Ieee1609Dot2Data for + * transmission if the policy is that the IndividualAprv be signed. See 9.5.6 + * for discussion. + */ +SignedIndividualAprv ::= Ieee1609Dot2Data-Signed { + AcpcPdu (WITH COMPONENTS { + aprv + }), + AcpcPsid +} + +/** + * @brief This is an 8 byte string that identifies an ACPC tree series. It is + * required to be globally unique within the system and is the same for all + * ACPC tree instances within the ACPC tree series. Registration of AcpcTreeId + * values is managed by the IEEE RA; see http://standards.ieee.org/regauth. A + * list of assigned AcpcTreeId values is provided in L.2. + */ +AcpcTreeId ::= OCTET STRING (SIZE(8)) + +/** + * @brief This is a 16 byte string that represents the value of a node in the + * ACPC tree. + */ +AcpcNodeValue ::= OCTET STRING (SIZE(16)) + +/** + * @brief This structure, C-OER encoded, is the input to the hash function to + * calculate child node values from a parent node. By including the ID fields + * it "firewalls" the hash function so that an attacker who inverts the hash + * has only found the hash preimage for a specific node, in a specific tree, + * for a specific time period. An overview of this structure is as follows: + * + * @param version: contains the current version of the structure. + * + * @param acpcTreeId: contains an identifier for this ACPC tree series. + * + * @param acpcPeriod: contains an identifier for the time period for this tree. + * If the certificates for which this set of APrVs are intended have an IValue + * field, acpcPeriod in this structure shall be the IValue field in the + * certificates. How the RA and the CAM synchronize on this value is outside + * the scope of this document. + * + * @param childNodeId: contains a bit string of length l encoding the node + * location within the l'th level. + * + * @param parentNodeValue: contains the value of the parent node. + */ +AprvHashCalculationInput ::= SEQUENCE { + version Uint8 (2), + acpcTreeId AcpcTreeId, + acpcPeriod IValue, + childNodeId BIT STRING, + parentNodeValue OCTET STRING (SIZE(16)), + ... +} + +END diff --git a/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1CamRaInterface.asn b/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1CamRaInterface.asn index f49c3bc668ecdfecc59eb8a524493cdffe605ac2..076c934d2ecbae04a87053cd17fa705b7332065e 100644 --- a/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1CamRaInterface.asn +++ b/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1CamRaInterface.asn @@ -1,90 +1,90 @@ ---***************************************************************************-- --- IEEE Std 1609.2.1: CAM - RA Interface -- ---***************************************************************************-- - -/** - * @note Section references in this file are to clauses in IEEE Std - * 1609.2.1 unless indicated otherwise. Full forms of acronyms and - * abbreviations used in this file are specified in 3.2. - */ - -Ieee1609Dot2Dot1CamRaInterface {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) - extension-standards(255) dot1(1) interfaces(1) cam-ra(19) major-version-2(2) - minor-version-2(2)} - -DEFINITIONS AUTOMATIC TAGS ::= BEGIN - -EXPORTS ALL; - -IMPORTS - EccP256CurvePoint, - HashedId8, - IValue, - Uint8 -FROM Ieee1609Dot2BaseTypes {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) - base(1) base-types(2) major-version-2(2) minor-version-3(3)} -WITH SUCCESSORS -; - -/** - * @brief This is the parent structure for all structures exchanged between - * the CAM and the RA during ACPC enrollment. An overview of this structure - * is as follows: - * - * @param raCamBatchRequest: contains the ACPC blinded key batch request sent - * by the RA to the CAM. - * - * @param camRaBatchResponse: contains the CAM's response to RaCamBatchRequest. - */ -CamRaInterfacePdu ::= CHOICE { - raCamBatchRequest RaCamBatchRequest, - camRaBatchResponse CamRaBatchResponse, - ... -} - -/** - * @brief This structure contains parameters needed to request a blinded batch - * of keys for the EE during ACPC enrollment. An overview of this structure - * is as follows: - * - * @param version: contains the current version of the structure. - * - * @param eeId: contains the EE's ID generated by the RA for the production of - * ACPC batch keys by the CAM. - * - * @param periodList: contains the list of i-periods covered by the batch. - */ -RaCamBatchRequest ::= SEQUENCE { - version Uint8 (2), - eeId OCTET STRING (SIZE(5)), - periodList SEQUENCE OF IValue, - ... -} - -/** - * @brief This structure contains a blinded batch of keys for the EE during - * ACPC enrollment. An overview of this structure is as follows: - * - * @param version: contains the current version of the structure. - * - * @param requestHash: contains the hash of the corresponding request - * RaCamBatchRequest. - * - * @param batch: contains a sequence of blinded keys, each mapped to one - * IValue from the periodList field of the request. - */ -CamRaBatchResponse ::= SEQUENCE { - version Uint8 (2), - requestHash HashedId8, - batch SEQUENCE OF BlindedKey, - ... -} - -/** - * @brief This is a blinded ACPC encryption key produced by the CAM. - */ -BlindedKey ::= EccP256CurvePoint - -END +--***************************************************************************-- +-- IEEE Std 1609.2.1: CAM - RA Interface -- +--***************************************************************************-- + +/** + * @note Section references in this file are to clauses in IEEE Std + * 1609.2.1 unless indicated otherwise. Full forms of acronyms and + * abbreviations used in this file are specified in 3.2. + */ + +Ieee1609Dot2Dot1CamRaInterface {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) + extension-standards(255) dot1(1) interfaces(1) cam-ra(19) major-version-2(2) + minor-version-2(2)} + +DEFINITIONS AUTOMATIC TAGS ::= BEGIN + +EXPORTS ALL; + +IMPORTS + EccP256CurvePoint, + HashedId8, + IValue, + Uint8 +FROM Ieee1609Dot2BaseTypes {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) + base(1) base-types(2) major-version-2(2) minor-version-3(3)} +WITH SUCCESSORS +; + +/** + * @brief This is the parent structure for all structures exchanged between + * the CAM and the RA during ACPC enrollment. An overview of this structure + * is as follows: + * + * @param raCamBatchRequest: contains the ACPC blinded key batch request sent + * by the RA to the CAM. + * + * @param camRaBatchResponse: contains the CAM's response to RaCamBatchRequest. + */ +CamRaInterfacePdu ::= CHOICE { + raCamBatchRequest RaCamBatchRequest, + camRaBatchResponse CamRaBatchResponse, + ... +} + +/** + * @brief This structure contains parameters needed to request a blinded batch + * of keys for the EE during ACPC enrollment. An overview of this structure + * is as follows: + * + * @param version: contains the current version of the structure. + * + * @param eeId: contains the EE's ID generated by the RA for the production of + * ACPC batch keys by the CAM. + * + * @param periodList: contains the list of i-periods covered by the batch. + */ +RaCamBatchRequest ::= SEQUENCE { + version Uint8 (2), + eeId OCTET STRING (SIZE(5)), + periodList SEQUENCE OF IValue, + ... +} + +/** + * @brief This structure contains a blinded batch of keys for the EE during + * ACPC enrollment. An overview of this structure is as follows: + * + * @param version: contains the current version of the structure. + * + * @param requestHash: contains the hash of the corresponding request + * RaCamBatchRequest. + * + * @param batch: contains a sequence of blinded keys, each mapped to one + * IValue from the periodList field of the request. + */ +CamRaBatchResponse ::= SEQUENCE { + version Uint8 (2), + requestHash HashedId8, + batch SEQUENCE OF BlindedKey, + ... +} + +/** + * @brief This is a blinded ACPC encryption key produced by the CAM. + */ +BlindedKey ::= EccP256CurvePoint + +END diff --git a/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1CertManagement.asn b/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1CertManagement.asn index 5115efebcb7251e024461bb33db57634706f37e2..1bb26ff7f120d265f12bbe22a18e4a411346fca2 100644 --- a/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1CertManagement.asn +++ b/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1CertManagement.asn @@ -1,412 +1,412 @@ ---***************************************************************************-- --- IEEE Std 1609.2.1: Certificate Management -- ---***************************************************************************-- - -/** - * @note Section references in this file are to clauses in IEEE Std - * 1609.2.1 unless indicated otherwise. Full forms of acronyms and - * abbreviations used in this file are specified in 3.2. - */ - -Ieee1609Dot2Dot1CertManagement {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) - extension-standards(255) dot1(1) interfaces(1) cert-management(7) - major-version-3(3) minor-version-1(1)} - -DEFINITIONS AUTOMATIC TAGS ::= BEGIN - -EXPORTS ALL; - -IMPORTS - Certificate, - SequenceOfCertificate -FROM Ieee1609Dot2 {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) - dot2(2) base(1) schema(1) major-version-2(2) minor-version-5(5)} -WITH SUCCESSORS - - HashedId8, - HashedId32, - HashedId48, - Time32, - Uint8 -FROM Ieee1609Dot2BaseTypes {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) - base(1) base-types(2) major-version-2(2) minor-version-3(3)} -WITH SUCCESSORS - - CrlSeries -FROM Ieee1609Dot2CrlBaseTypes {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) - crl(3) base-types(2) major-version-3(3) minor-version-1(1)} -WITH SUCCESSORS - - SecuredCrl -FROM Ieee1609Dot2Crl {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) - crl(3) major-version-3(3) minor-version-1(1)} -WITH SUCCESSORS - - CtlSignatureSpdu, - MultiSignedCtlSpdu, - SequenceOfPsid -FROM Ieee1609Dot2Dot1Protocol {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) - extension-standards(255) dot1(1) interfaces(1) protocol(17) - major-version-3(3) minor-version-1(1)} -WITH SUCCESSORS -; - -/** - * @brief This is the parent structure for all SCMS component certificate - * management structures. An overview of this structure is as follows: - * - * @param compositeCrl: contains zero or more SecuredCrl as defined in IEEE - * Std 1609.2, and the CTL. - * - * @param certificateChain: contains a collection of certificates and the CTL. - * - * @param multiSignedCtl: contains the CTL signed by multiple - * signers, the electors. - * - * @param tbsCtlSignature: contains the CTL-instance-specific information used - * to generate a signature on the CTL. - */ -CertManagementPdu ::= CHOICE { - compositeCrl CompositeCrl, - certificateChain CertificateChain, - multiSignedCtl MultiSignedCtl, - tbsCtlSignature ToBeSignedCtlSignature, - infoStatus CertificateManagementInfoStatus, - ... -} - -/** - * @brief This structure is used to encapsulate CRLs and a CTL. An overview - * of this structure is as follows: - * - * @param crl: contains a list of signed CRLs for different (CRACA ID, CRL - * series) pairs. The CRLs are signed individually, and this document does not - * specify the order in which they should appear. - * - * @param homeCtl: contains a CTL. If the composite CRL was requested via the - * mechanisms given in 6.3.5.8, the CtlSeriesId in this CTL is the same as - * the CtlSeriesId provided in the request. The intent is that this is the - * "home" CTL of the requester, but this field can in practice be used to - * provide any CTL with any CtlSeriesId value. - */ -CompositeCrl ::= SEQUENCE { - crl SEQUENCE SIZE(0..MAX) OF SecuredCrl, - homeCtl MultiSignedCtlSpdu, - ... -} - -/** - * @brief This structure is used to encapsulate certificates and a CTL. An - * overview of this structure is as follows: - * - * @param homeCtl: contains a CTL. If the certificate chain was requested via - * the mechanisms given in 6.3.5.7, the CtlSeriesId in this CTL is the - * same as the CtlSeriesId provided in the request. The intent is that - * this is the "home" CTL of the requester, but this field can in practice be - * used to provide any CTL. - * - * @param others: contains additional valid certificates of the CAs and the - * MAs chosen by means outside the scope of this document. - */ -CertificateChain ::= SEQUENCE { - homeCtl MultiSignedCtlSpdu, - others SEQUENCE SIZE(0..MAX) OF Certificate, - ... -} - -/** - * @brief This structure a certificate trust list (CTL) signed by multiple - * signers, the electors. An overview of this structure is as follows: - * - * @param type: contains the type of the multi-signed CTL. Only one type of - * multi-signed CTL is supported in this version of this document. - * - * @param tbsCtl: contains the CTL contents. - * - * @param unsigned: contains data that are associated with the CTL and that - * are not included directly in tbsCtl. For example, if the type is - * fullIeeeCtlType, the FullIeeeTbsCtl contains the hashes of the - * certificates, and the certificates themselves are contained in unsigned. - * - * @param signatures: contains the signatures. How the signatures are - * calculated is specified in the definition of ToBeSignedCtlSignature. The - * number of signatures shall be no more than the number of electors. Each - * signature shall have been generated by a distinct elector. - */ -MultiSignedCtl ::= SEQUENCE { - type IEEE-1609-2-1-MSCTL.&type({ - Ieee1609dot2dot1Ctls - }), - tbsCtl IEEE-1609-2-1-MSCTL.&TbsCtl({ - Ieee1609dot2dot1Ctls - }{@.type}), - unsigned IEEE-1609-2-1-MSCTL.&UnsignedCtlMaterial({ - Ieee1609dot2dot1Ctls - }{@.type}), - signatures SEQUENCE (SIZE(1..MAX)) OF CtlSignatureSpdu -} - -/** - * @brief This is the ASN.1 Information Object Class used to associate - * multisigned CTL type identifiers, CTL contents, and unsigned material. In - * this structure: - * - * @param type: contains the type, an Ieee1609dot2dot1MsctlType. - * - * @param TbsCtl: contains the CTL contents. - * - * @param UnsignedCtlMaterial: contains unsigned material associated with the - * CTL, as specified in 7.3.11. - */ -IEEE-1609-2-1-MSCTL ::= CLASS { - &type Ieee1609dot2dot1MsctlType, - &TbsCtl, - &UnsignedCtlMaterial -} WITH SYNTAX {&TbsCtl IDENTIFIED BY &type USING &UnsignedCtlMaterial} - -/** - * @brief This is the Information Object Set containing the instances of the - * IEEE-1609-2-1-MSCTL class that are specified for use. Only one instance is - * specified for use in this version of this document. - */ -Ieee1609dot2dot1Ctls IEEE-1609-2-1-MSCTL ::= { - {FullIeeeTbsCtl IDENTIFIED BY - fullIeeeCtl USING SequenceOfCertificate}, - ... -} - -/** - * @brief This is the integer used to identify the type of the CTL. - */ -Ieee1609dot2dot1MsctlType ::= INTEGER (0..255) - -fullIeeeCtl Ieee1609dot2dot1MsctlType ::= 1 - -/** - * @brief This structure specifies a CTL that contains information about the - * complete set of certificates trusted by the electors that sign the CTL. An - * overview of this structure is as follows: - * - * @note: - * - If in future CTL types are defined that contain the same - * information as, or a subset of the information in, the fullIeeeCtl, those - * types are anticipated to contain the same sequence number as the - * corresponding fullIeeeCtl. - * - * - Any root CA or elector certificate that is not on the CTL is - * not trusted. The electorRemove and rootCaRemove are intended to be used - * only if the SCMS manager wants to explicitly indicate that a previously - * trusted entity (elector or root CA) is now not trusted even though that - * entity's certificate is still within its validity period. In practice, it - * is anticipated that the remove fields (electorRemove and rootCaRemove) - * will almost always be sequences of length 0. - * - * @param type: contains the type of the CTL. It is identical to the type - * field that appears in the enclosing MultiSignedCtl. The field is included - * here as well to provide the simplest mechanism to help ensure that the - * type is included in the calculated CTL hash. - * - * @param CtlSeriesId: contains the group of electors that have signed the - * CTL. It plays a role similar to CrlSeries in a CRL. This field is intended - * to be globally unique in the universe of all systems that use the - * MultiSignedCtl. See the specification of CtlSeriesId for discussion of - * a convention that can be followed to enable uniqueness. - * - * @param sequenceNumber: contains the sequence number of the CTL. This is - * incremented by 1 every time a new FullIeeeTbsCtl is issued. - * - * @param effectiveDate: contains the time when the CTL is to take effect. - * This is to be greater than or equal to the effectiveDate field in the CTL - * with the same CtlSeriesId and the previous sequence number. - * - * @param electorApprove: contains the list of hashes of the elector - * certificates that are approved as of the effective date. The hash is - * calculated with the same hash algorithm that is used to hash the elector - * certificate for signing. - * - * @param electorRemove: contains the list of hashes of the elector - * certificates that are valid (that is, not expired) on the effective date and - * are not approved, as of the effective date, to sign a CTL. The hash is - * calculated with the same hash algorithm that is used to hash the elector - * certificate for signing. This field is to be considered informational as a - * certificate that is not included in electorApprove is not valid even if it - * does not appear in electorRemove. - * - * @param rootCaApprove: contains the list of root CA certificates that are - * approved as of the effective date. The hash is calculated with the same - * hash algorithm that is used to hash the root certificate for signing. If - * the root certificate is signed with a hash function with a 48 octet - * output, this is truncated to the low-order 32 bytes for inclusion in the - * CTL. - * - * @param rootCaRemove: contains the list of root CA certificates that are - * valid (that is, not expired) on the effective date and are not approved, as - * of the effective date, to issue certificates or carry out other - * activities. If the root certificate is signed with a hash function - * with a 48 octet output, this is truncated to the low-order 32 bytes for - * inclusion in the CTL. This field is to be considered informational as a - * certificate that is not included in rootCaApprove is not valid even if it - * does not appear in rootCaRemove. - * - * @param quorum: contains the quorum, that is, the number of the electors - * required to sign the next CTL with the same CtlSeriesId value for that - * CTL to be trusted. If this field is absent, the quorum for the next CTL - * shall be the quorum for the current CTL. - */ -FullIeeeTbsCtl ::= SEQUENCE { - type Ieee1609dot2dot1MsctlType(fullIeeeCtl), - ctlSeriesId CtlSeriesId, - sequenceNumber CtlSequenceNumber, - effectiveDate Time32, - electorApprove SEQUENCE OF CtlElectorEntry, - electorRemove SEQUENCE OF CtlElectorEntry, - rootCaApprove SEQUENCE OF CtlRootCaEntry, - rootCaRemove SEQUENCE OF CtlRootCaEntry, - ..., - quorum INTEGER -} - -/** - * @brief This structure identifies a group of electors that sign a series of - * CTLs for a specific purpose. Registration of CtlSeriesId values is - * managed by the IEEE RA; see http://standards.ieee.org/regauth. A list of - * assigned CtlSeriesId values is provided in K.1. - */ -CtlSeriesId ::= OCTET STRING (SIZE(8)) - -/** - * @brief This structure is used to encode the CTL sequence number. This - * document does not specify semantics of this type once it reaches its - * maximum value. - */ -CtlSequenceNumber ::= INTEGER(0..65535) - -/** - * @brief This structure contains the hash of an elector certificate. - */ -CtlElectorEntry ::= HashedId48 - -/** - * @brief This structure contains the hash of a root CA certificate. - */ -CtlRootCaEntry ::= HashedId32 - -/** - * @brief This structure contains the CTL-instance-specific information used - * to generate a signature on the CTL. An overview of this structure is as - * follows: - * - * @param ctlSeriesId: contains the CtlSeriesId that appears in the CTL. - * - * @param ctlType: identifies the type of the CTL. - * - * @param sequenceNumber: contains the sequence number of the CTL being signed. - * - * @param tbsCtlHash: contains the hash of the C-OER encoded tbsCtl field - * in the MultiSignedCtl. The hash is calculated using the same hash - * algorithm that is used to generate the signature on this structure when it - * is contained in a CtlSignatureSpdu. This algorithm can be determined from - * the headers of the CtlSignatureSpdu. - */ -ToBeSignedCtlSignature ::= SEQUENCE { - ctlSeriesId CtlSeriesId, - ctlType Ieee1609dot2dot1MsctlType, - sequenceNumber CtlSequenceNumber, - tbsCtlHash HashedId48 -} - -/** - * @brief This structure contains the status of different certificate - * management information, including CRLs, CTLs, and individual certificates - * of CAs, MAs, and the RA. - * - * @param crl: contains the status information for CRLs. - * - * @param ctl: contains the status information for CTLs. - * - * @param caCcf: contains the time of the last update of any of the CA - * certificates in the CCF. - * - * @param ma: contains the status information for MA certificates. - * - * @param ra: shall be present and contain the time of last update of the RA's - * certificate, if this structure is sent by an RA. - */ -CertificateManagementInfoStatus ::= SEQUENCE { - crl SequenceOfCrlInfoStatus, - ctl SequenceOfCtlInfoStatus, - caCcf Time32, - ma SequenceOfMaInfoStatus, - ra Time32 OPTIONAL, - ... -} - -/** - * @brief This type is used for clarity of definitions. - */ -SequenceOfCtlInfoStatus ::= SEQUENCE OF CtlInfoStatus - -/** - * @brief This structure contains the status information for a CTL. - * - * @param ctlSeriesId: contains the elector group ID of the CTL. - * - * @param sequenceNumber: contains the sequence number of the CTL. - * - * @param lastUpdate: contains the time of the last update of the CTL. - */ -CtlInfoStatus ::= SEQUENCE { - ctlSeriesId CtlSeriesId, - sequenceNumber CtlSequenceNumber, - lastUpdate Time32, - ... -} - -/** - * @brief This type is used for clarity of definitions. - */ -SequenceOfCrlInfoStatus ::= SEQUENCE OF CrlInfoStatus - -/** - * @brief This structure contains the status information for a CRL. - * - * @param cracaId: contains the CRACA ID of the CRL. - * - * @param series: contains the CRL series of the CRL. - * - * @param issueDate: contains the time of the last update of the CRL. - */ -CrlInfoStatus ::= SEQUENCE { - cracaId HashedId8, - series CrlSeries, - issueDate Time32, - ... -} - -/** - * @brief This type is used for clarity of definitions. - */ -SequenceOfMaInfoStatus ::= SEQUENCE OF MaInfoStatus - -/** - * @brief This structure contains the status information for an MA's - * certificate. - * - * @param psids: contains the PSIDs associated with the misbehavior that is to - * be reported to that MA. - * - * @param updated: contains the time of the last update of the MA's certificate. - */ -MaInfoStatus ::= SEQUENCE { - psids SequenceOfPsid, - updated Time32, - ... -} - -END +--***************************************************************************-- +-- IEEE Std 1609.2.1: Certificate Management -- +--***************************************************************************-- + +/** + * @note Section references in this file are to clauses in IEEE Std + * 1609.2.1 unless indicated otherwise. Full forms of acronyms and + * abbreviations used in this file are specified in 3.2. + */ + +Ieee1609Dot2Dot1CertManagement {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) + extension-standards(255) dot1(1) interfaces(1) cert-management(7) + major-version-3(3) minor-version-1(1)} + +DEFINITIONS AUTOMATIC TAGS ::= BEGIN + +EXPORTS ALL; + +IMPORTS + Certificate, + SequenceOfCertificate +FROM Ieee1609Dot2 {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) + dot2(2) base(1) schema(1) major-version-2(2) minor-version-5(5)} +WITH SUCCESSORS + + HashedId8, + HashedId32, + HashedId48, + Time32, + Uint8 +FROM Ieee1609Dot2BaseTypes {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) + base(1) base-types(2) major-version-2(2) minor-version-3(3)} +WITH SUCCESSORS + + CrlSeries +FROM Ieee1609Dot2CrlBaseTypes {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) + crl(3) base-types(2) major-version-3(3) minor-version-1(1)} +WITH SUCCESSORS + + SecuredCrl +FROM Ieee1609Dot2Crl {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) + crl(3) major-version-3(3) minor-version-1(1)} +WITH SUCCESSORS + + CtlSignatureSpdu, + MultiSignedCtlSpdu, + SequenceOfPsid +FROM Ieee1609Dot2Dot1Protocol {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) + extension-standards(255) dot1(1) interfaces(1) protocol(17) + major-version-3(3) minor-version-1(1)} +WITH SUCCESSORS +; + +/** + * @brief This is the parent structure for all SCMS component certificate + * management structures. An overview of this structure is as follows: + * + * @param compositeCrl: contains zero or more SecuredCrl as defined in IEEE + * Std 1609.2, and the CTL. + * + * @param certificateChain: contains a collection of certificates and the CTL. + * + * @param multiSignedCtl: contains the CTL signed by multiple + * signers, the electors. + * + * @param tbsCtlSignature: contains the CTL-instance-specific information used + * to generate a signature on the CTL. + */ +CertManagementPdu ::= CHOICE { + compositeCrl CompositeCrl, + certificateChain CertificateChain, + multiSignedCtl MultiSignedCtl, + tbsCtlSignature ToBeSignedCtlSignature, + infoStatus CertificateManagementInfoStatus, + ... +} + +/** + * @brief This structure is used to encapsulate CRLs and a CTL. An overview + * of this structure is as follows: + * + * @param crl: contains a list of signed CRLs for different (CRACA ID, CRL + * series) pairs. The CRLs are signed individually, and this document does not + * specify the order in which they should appear. + * + * @param homeCtl: contains a CTL. If the composite CRL was requested via the + * mechanisms given in 6.3.5.8, the CtlSeriesId in this CTL is the same as + * the CtlSeriesId provided in the request. The intent is that this is the + * "home" CTL of the requester, but this field can in practice be used to + * provide any CTL with any CtlSeriesId value. + */ +CompositeCrl ::= SEQUENCE { + crl SEQUENCE SIZE(0..MAX) OF SecuredCrl, + homeCtl MultiSignedCtlSpdu, + ... +} + +/** + * @brief This structure is used to encapsulate certificates and a CTL. An + * overview of this structure is as follows: + * + * @param homeCtl: contains a CTL. If the certificate chain was requested via + * the mechanisms given in 6.3.5.7, the CtlSeriesId in this CTL is the + * same as the CtlSeriesId provided in the request. The intent is that + * this is the "home" CTL of the requester, but this field can in practice be + * used to provide any CTL. + * + * @param others: contains additional valid certificates of the CAs and the + * MAs chosen by means outside the scope of this document. + */ +CertificateChain ::= SEQUENCE { + homeCtl MultiSignedCtlSpdu, + others SEQUENCE SIZE(0..MAX) OF Certificate, + ... +} + +/** + * @brief This structure a certificate trust list (CTL) signed by multiple + * signers, the electors. An overview of this structure is as follows: + * + * @param type: contains the type of the multi-signed CTL. Only one type of + * multi-signed CTL is supported in this version of this document. + * + * @param tbsCtl: contains the CTL contents. + * + * @param unsigned: contains data that are associated with the CTL and that + * are not included directly in tbsCtl. For example, if the type is + * fullIeeeCtlType, the FullIeeeTbsCtl contains the hashes of the + * certificates, and the certificates themselves are contained in unsigned. + * + * @param signatures: contains the signatures. How the signatures are + * calculated is specified in the definition of ToBeSignedCtlSignature. The + * number of signatures shall be no more than the number of electors. Each + * signature shall have been generated by a distinct elector. + */ +MultiSignedCtl ::= SEQUENCE { + type IEEE-1609-2-1-MSCTL.&type({ + Ieee1609dot2dot1Ctls + }), + tbsCtl IEEE-1609-2-1-MSCTL.&TbsCtl({ + Ieee1609dot2dot1Ctls + }{@.type}), + unsigned IEEE-1609-2-1-MSCTL.&UnsignedCtlMaterial({ + Ieee1609dot2dot1Ctls + }{@.type}), + signatures SEQUENCE (SIZE(1..MAX)) OF CtlSignatureSpdu +} + +/** + * @brief This is the ASN.1 Information Object Class used to associate + * multisigned CTL type identifiers, CTL contents, and unsigned material. In + * this structure: + * + * @param type: contains the type, an Ieee1609dot2dot1MsctlType. + * + * @param TbsCtl: contains the CTL contents. + * + * @param UnsignedCtlMaterial: contains unsigned material associated with the + * CTL, as specified in 7.3.11. + */ +IEEE-1609-2-1-MSCTL ::= CLASS { + &type Ieee1609dot2dot1MsctlType, + &TbsCtl, + &UnsignedCtlMaterial +} WITH SYNTAX {&TbsCtl IDENTIFIED BY &type USING &UnsignedCtlMaterial} + +/** + * @brief This is the Information Object Set containing the instances of the + * IEEE-1609-2-1-MSCTL class that are specified for use. Only one instance is + * specified for use in this version of this document. + */ +Ieee1609dot2dot1Ctls IEEE-1609-2-1-MSCTL ::= { + {FullIeeeTbsCtl IDENTIFIED BY + fullIeeeCtl USING SequenceOfCertificate}, + ... +} + +/** + * @brief This is the integer used to identify the type of the CTL. + */ +Ieee1609dot2dot1MsctlType ::= INTEGER (0..255) + +fullIeeeCtl Ieee1609dot2dot1MsctlType ::= 1 + +/** + * @brief This structure specifies a CTL that contains information about the + * complete set of certificates trusted by the electors that sign the CTL. An + * overview of this structure is as follows: + * + * @note: + * - If in future CTL types are defined that contain the same + * information as, or a subset of the information in, the fullIeeeCtl, those + * types are anticipated to contain the same sequence number as the + * corresponding fullIeeeCtl. + * + * - Any root CA or elector certificate that is not on the CTL is + * not trusted. The electorRemove and rootCaRemove are intended to be used + * only if the SCMS manager wants to explicitly indicate that a previously + * trusted entity (elector or root CA) is now not trusted even though that + * entity's certificate is still within its validity period. In practice, it + * is anticipated that the remove fields (electorRemove and rootCaRemove) + * will almost always be sequences of length 0. + * + * @param type: contains the type of the CTL. It is identical to the type + * field that appears in the enclosing MultiSignedCtl. The field is included + * here as well to provide the simplest mechanism to help ensure that the + * type is included in the calculated CTL hash. + * + * @param CtlSeriesId: contains the group of electors that have signed the + * CTL. It plays a role similar to CrlSeries in a CRL. This field is intended + * to be globally unique in the universe of all systems that use the + * MultiSignedCtl. See the specification of CtlSeriesId for discussion of + * a convention that can be followed to enable uniqueness. + * + * @param sequenceNumber: contains the sequence number of the CTL. This is + * incremented by 1 every time a new FullIeeeTbsCtl is issued. + * + * @param effectiveDate: contains the time when the CTL is to take effect. + * This is to be greater than or equal to the effectiveDate field in the CTL + * with the same CtlSeriesId and the previous sequence number. + * + * @param electorApprove: contains the list of hashes of the elector + * certificates that are approved as of the effective date. The hash is + * calculated with the same hash algorithm that is used to hash the elector + * certificate for signing. + * + * @param electorRemove: contains the list of hashes of the elector + * certificates that are valid (that is, not expired) on the effective date and + * are not approved, as of the effective date, to sign a CTL. The hash is + * calculated with the same hash algorithm that is used to hash the elector + * certificate for signing. This field is to be considered informational as a + * certificate that is not included in electorApprove is not valid even if it + * does not appear in electorRemove. + * + * @param rootCaApprove: contains the list of root CA certificates that are + * approved as of the effective date. The hash is calculated with the same + * hash algorithm that is used to hash the root certificate for signing. If + * the root certificate is signed with a hash function with a 48 octet + * output, this is truncated to the low-order 32 bytes for inclusion in the + * CTL. + * + * @param rootCaRemove: contains the list of root CA certificates that are + * valid (that is, not expired) on the effective date and are not approved, as + * of the effective date, to issue certificates or carry out other + * activities. If the root certificate is signed with a hash function + * with a 48 octet output, this is truncated to the low-order 32 bytes for + * inclusion in the CTL. This field is to be considered informational as a + * certificate that is not included in rootCaApprove is not valid even if it + * does not appear in rootCaRemove. + * + * @param quorum: contains the quorum, that is, the number of the electors + * required to sign the next CTL with the same CtlSeriesId value for that + * CTL to be trusted. If this field is absent, the quorum for the next CTL + * shall be the quorum for the current CTL. + */ +FullIeeeTbsCtl ::= SEQUENCE { + type Ieee1609dot2dot1MsctlType(fullIeeeCtl), + ctlSeriesId CtlSeriesId, + sequenceNumber CtlSequenceNumber, + effectiveDate Time32, + electorApprove SEQUENCE OF CtlElectorEntry, + electorRemove SEQUENCE OF CtlElectorEntry, + rootCaApprove SEQUENCE OF CtlRootCaEntry, + rootCaRemove SEQUENCE OF CtlRootCaEntry, + ..., + quorum INTEGER +} + +/** + * @brief This structure identifies a group of electors that sign a series of + * CTLs for a specific purpose. Registration of CtlSeriesId values is + * managed by the IEEE RA; see http://standards.ieee.org/regauth. A list of + * assigned CtlSeriesId values is provided in K.1. + */ +CtlSeriesId ::= OCTET STRING (SIZE(8)) + +/** + * @brief This structure is used to encode the CTL sequence number. This + * document does not specify semantics of this type once it reaches its + * maximum value. + */ +CtlSequenceNumber ::= INTEGER(0..65535) + +/** + * @brief This structure contains the hash of an elector certificate. + */ +CtlElectorEntry ::= HashedId48 + +/** + * @brief This structure contains the hash of a root CA certificate. + */ +CtlRootCaEntry ::= HashedId32 + +/** + * @brief This structure contains the CTL-instance-specific information used + * to generate a signature on the CTL. An overview of this structure is as + * follows: + * + * @param ctlSeriesId: contains the CtlSeriesId that appears in the CTL. + * + * @param ctlType: identifies the type of the CTL. + * + * @param sequenceNumber: contains the sequence number of the CTL being signed. + * + * @param tbsCtlHash: contains the hash of the C-OER encoded tbsCtl field + * in the MultiSignedCtl. The hash is calculated using the same hash + * algorithm that is used to generate the signature on this structure when it + * is contained in a CtlSignatureSpdu. This algorithm can be determined from + * the headers of the CtlSignatureSpdu. + */ +ToBeSignedCtlSignature ::= SEQUENCE { + ctlSeriesId CtlSeriesId, + ctlType Ieee1609dot2dot1MsctlType, + sequenceNumber CtlSequenceNumber, + tbsCtlHash HashedId48 +} + +/** + * @brief This structure contains the status of different certificate + * management information, including CRLs, CTLs, and individual certificates + * of CAs, MAs, and the RA. + * + * @param crl: contains the status information for CRLs. + * + * @param ctl: contains the status information for CTLs. + * + * @param caCcf: contains the time of the last update of any of the CA + * certificates in the CCF. + * + * @param ma: contains the status information for MA certificates. + * + * @param ra: shall be present and contain the time of last update of the RA's + * certificate, if this structure is sent by an RA. + */ +CertificateManagementInfoStatus ::= SEQUENCE { + crl SequenceOfCrlInfoStatus, + ctl SequenceOfCtlInfoStatus, + caCcf Time32, + ma SequenceOfMaInfoStatus, + ra Time32 OPTIONAL, + ... +} + +/** + * @brief This type is used for clarity of definitions. + */ +SequenceOfCtlInfoStatus ::= SEQUENCE OF CtlInfoStatus + +/** + * @brief This structure contains the status information for a CTL. + * + * @param ctlSeriesId: contains the elector group ID of the CTL. + * + * @param sequenceNumber: contains the sequence number of the CTL. + * + * @param lastUpdate: contains the time of the last update of the CTL. + */ +CtlInfoStatus ::= SEQUENCE { + ctlSeriesId CtlSeriesId, + sequenceNumber CtlSequenceNumber, + lastUpdate Time32, + ... +} + +/** + * @brief This type is used for clarity of definitions. + */ +SequenceOfCrlInfoStatus ::= SEQUENCE OF CrlInfoStatus + +/** + * @brief This structure contains the status information for a CRL. + * + * @param cracaId: contains the CRACA ID of the CRL. + * + * @param series: contains the CRL series of the CRL. + * + * @param issueDate: contains the time of the last update of the CRL. + */ +CrlInfoStatus ::= SEQUENCE { + cracaId HashedId8, + series CrlSeries, + issueDate Time32, + ... +} + +/** + * @brief This type is used for clarity of definitions. + */ +SequenceOfMaInfoStatus ::= SEQUENCE OF MaInfoStatus + +/** + * @brief This structure contains the status information for an MA's + * certificate. + * + * @param psids: contains the PSIDs associated with the misbehavior that is to + * be reported to that MA. + * + * @param updated: contains the time of the last update of the MA's certificate. + */ +MaInfoStatus ::= SEQUENCE { + psids SequenceOfPsid, + updated Time32, + ... +} + +END diff --git a/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1EcaEeInterface.asn b/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1EcaEeInterface.asn index c325a77b569e5b7de7aa38c14e12486ffe51259f..105dbe387f6e102c19140f25eff821ab5d9a2308 100644 --- a/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1EcaEeInterface.asn +++ b/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1EcaEeInterface.asn @@ -1,172 +1,172 @@ ---***************************************************************************-- --- IEEE Std 1609.2.1: ECA - EE Interface -- ---***************************************************************************-- - -/** - * @note Section references in this file are to clauses in IEEE Std - * 1609.2.1 unless indicated otherwise. Full forms of acronyms and - * abbreviations used in this file are specified in 3.2. - */ - -Ieee1609Dot2Dot1EcaEeInterface {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) - extension-standards(255) dot1(1) interfaces(1) eca-ee(9) major-version-3(3) - minor-version-1(1)} - -DEFINITIONS AUTOMATIC TAGS ::= BEGIN - -EXPORTS ALL; - -IMPORTS - Certificate, - CertificateType, - SequenceOfCertificate -FROM Ieee1609Dot2 {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) - dot2(2) base(1) schema(1) major-version-2(2) minor-version-5(5)} -WITH SUCCESSORS - - EccP256CurvePoint, - HashedId8, - Time32, - Uint8 -FROM Ieee1609Dot2BaseTypes {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) - base(1) base-types(2) major-version-2(2) minor-version-3(3)} -WITH SUCCESSORS - - PublicVerificationKey, - ToBeSignedCertificate -FROM Ieee1609Dot2Dot1Protocol {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) - extension-standards(255) dot1(1) interfaces(1) protocol(17) - major-version-3(3) minor-version-1(1)} -WITH SUCCESSORS -; - -/** - * @brief This is the parent structure for all structures exchanged between - * the ECA and the EE. An overview of this structure is as follows: - * - * @param eeEcaCertRequest: contains the enrollment certificate request sent - * by the EE to the ECA. - * - * @param ecaEeCertResponse: contains the enrollment certificate response sent - * by the ECA to the EE. - */ -EcaEeInterfacePdu::= CHOICE { - eeEcaCertRequest EeEcaCertRequest, - ecaEeCertResponse EcaEeCertResponse, - ... -} - -/** - * @brief This structure contains parameters needed to request an enrollment - * certificate from the ECA. The ECA may, subject to policy, issue an - * enrollment certificate with different contents than the contents requested. - * An overview of this structure is as follows: - * - * @note: - * - The tbsCert.cracaId and tbsCert.crlSeries are set to the - * indicated values in the corresponding EeEcaCertRequest. In the issued - * enrollment certificate, they may have different values, set by the ECA. - * - The EE uses the type field to indicate whether it is - * requesting an explicit or an implicit enrollment certificate. A policy is - * anticipated that determines what type of certificate is appropriate for a - * given set of circumstances (such as PSIDs, other end entity information, - * and locality) and that if the EE has requested a kind of certificate that - * is not allowed by policy, the ECA returns an error to the EE. - * - * @param version: contains the current version of the structure. - * - * @param generationTime: contains the generation time of EeEcaCertRequest. - * - * @param type: indicates whether the request is for an explicit or implicit - * certificate (see 4.1.1, 4.1.4.3.1). - * - * @param tbsCert: contains the parameters used by the ECA to generate the - * enrollment certificate. tbsCert.verifyKeyIndicator.verificationKey - * contains the public key information sent by the requester. The - * verifyKeyIndicator field indicates the choice verificationKey even if type - * is implicit, as this allows the requester to indicate which signature - * algorithm and curve they are requesting. The value in this field is used - * as the verification key in the certificate if the certificate issued in - * response to this request is explicit, and as the input public key value - * for implicit certificate generation if the certificate issued in response - * to this request is implicit. - * - * @param canonicalId: shall be present and contain the canonical identifier - * for the device per 4.1.4.2, if the enclosing EeEcaCertRequestSpdu was - * signed by the canonical private key. The receiver is intended to use the - * canonicalId to look up the canonical public key to verify the certificate - * request. - */ -EeEcaCertRequest ::= SEQUENCE { - version Uint8 (2), - generationTime Time32, - type CertificateType, - tbsCert ToBeSignedCertificate (WITH COMPONENTS { - ..., - id (WITH COMPONENTS { - ..., - linkageData ABSENT - }), - cracaId ('000000'H), - crlSeries (0), - appPermissions ABSENT, - certIssuePermissions ABSENT, - certRequestPermissions PRESENT, - verifyKeyIndicator (WITH COMPONENTS { - verificationKey - }) - }), - canonicalId IA5String OPTIONAL, - ... -} - -/** - * @brief This structure is used by the ECA to respond to an EE's enrollment - * certificate request. Additional bootstrapping information including the - * RA's certificate are provided by the DCM. The specification of the DCM is - * outside the scope of this document. An overview of this structure is as - * follows: - * - * The definition of validity for a certificate request, including - * constraints on the fields in this structure, is specified in 10.1. - * - * @param version: contains the current version of the structure. - * - * @param generationTime: contains the generation time of EcaEeCertResponse. - * - * @param requestHash: contains the following hash: - * - EeEcaCertRequestSPDU, if the corresponding request was - * EeEcaCertRequestSPDU. This is calculated without "canonicalizing" the - * signature, i.e., it is calculated over the signature as given in the - * EeEcaCertRequestSpdu without re-encoding the signature's r component in - * x-coordinate-only form. See IEEE Std 1609.2 for further details on - * canonicalization. - * - EeRaSuccessorEnrollmentCertRequestSpd, if the corresponding request - * was EeRaSuccessorEnrollmentCertRequestSpd. - * - * @param ecaCertChain: contains the ECA's currently valid certificate and the - * certificate chain, up to and including the root CA. - * - * @param certificate: contains the enrollment certificate generated by the - * ECA, which shall be of the type indicated by the type field in the - * corresponding request. - * - * @param privateKeyInfo: shall be present and contain the private key - * reconstruction value, if certificate.type is implicit. This is used by the - * EE as specified in 9.3.5.1. - */ -EcaEeCertResponse ::= SEQUENCE { - version Uint8 (2), - generationTime Time32, - requestHash HashedId8, - ecaCertChain SequenceOfCertificate, - certificate Certificate, - privateKeyInfo OCTET STRING (SIZE(32)) OPTIONAL, - ... -} - -END +--***************************************************************************-- +-- IEEE Std 1609.2.1: ECA - EE Interface -- +--***************************************************************************-- + +/** + * @note Section references in this file are to clauses in IEEE Std + * 1609.2.1 unless indicated otherwise. Full forms of acronyms and + * abbreviations used in this file are specified in 3.2. + */ + +Ieee1609Dot2Dot1EcaEeInterface {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) + extension-standards(255) dot1(1) interfaces(1) eca-ee(9) major-version-3(3) + minor-version-1(1)} + +DEFINITIONS AUTOMATIC TAGS ::= BEGIN + +EXPORTS ALL; + +IMPORTS + Certificate, + CertificateType, + SequenceOfCertificate +FROM Ieee1609Dot2 {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) + dot2(2) base(1) schema(1) major-version-2(2) minor-version-5(5)} +WITH SUCCESSORS + + EccP256CurvePoint, + HashedId8, + Time32, + Uint8 +FROM Ieee1609Dot2BaseTypes {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) + base(1) base-types(2) major-version-2(2) minor-version-3(3)} +WITH SUCCESSORS + + PublicVerificationKey, + ToBeSignedCertificate +FROM Ieee1609Dot2Dot1Protocol {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) + extension-standards(255) dot1(1) interfaces(1) protocol(17) + major-version-3(3) minor-version-1(1)} +WITH SUCCESSORS +; + +/** + * @brief This is the parent structure for all structures exchanged between + * the ECA and the EE. An overview of this structure is as follows: + * + * @param eeEcaCertRequest: contains the enrollment certificate request sent + * by the EE to the ECA. + * + * @param ecaEeCertResponse: contains the enrollment certificate response sent + * by the ECA to the EE. + */ +EcaEeInterfacePdu::= CHOICE { + eeEcaCertRequest EeEcaCertRequest, + ecaEeCertResponse EcaEeCertResponse, + ... +} + +/** + * @brief This structure contains parameters needed to request an enrollment + * certificate from the ECA. The ECA may, subject to policy, issue an + * enrollment certificate with different contents than the contents requested. + * An overview of this structure is as follows: + * + * @note: + * - The tbsCert.cracaId and tbsCert.crlSeries are set to the + * indicated values in the corresponding EeEcaCertRequest. In the issued + * enrollment certificate, they may have different values, set by the ECA. + * - The EE uses the type field to indicate whether it is + * requesting an explicit or an implicit enrollment certificate. A policy is + * anticipated that determines what type of certificate is appropriate for a + * given set of circumstances (such as PSIDs, other end entity information, + * and locality) and that if the EE has requested a kind of certificate that + * is not allowed by policy, the ECA returns an error to the EE. + * + * @param version: contains the current version of the structure. + * + * @param generationTime: contains the generation time of EeEcaCertRequest. + * + * @param type: indicates whether the request is for an explicit or implicit + * certificate (see 4.1.1, 4.1.4.3.1). + * + * @param tbsCert: contains the parameters used by the ECA to generate the + * enrollment certificate. tbsCert.verifyKeyIndicator.verificationKey + * contains the public key information sent by the requester. The + * verifyKeyIndicator field indicates the choice verificationKey even if type + * is implicit, as this allows the requester to indicate which signature + * algorithm and curve they are requesting. The value in this field is used + * as the verification key in the certificate if the certificate issued in + * response to this request is explicit, and as the input public key value + * for implicit certificate generation if the certificate issued in response + * to this request is implicit. + * + * @param canonicalId: shall be present and contain the canonical identifier + * for the device per 4.1.4.2, if the enclosing EeEcaCertRequestSpdu was + * signed by the canonical private key. The receiver is intended to use the + * canonicalId to look up the canonical public key to verify the certificate + * request. + */ +EeEcaCertRequest ::= SEQUENCE { + version Uint8 (2), + generationTime Time32, + type CertificateType, + tbsCert ToBeSignedCertificate (WITH COMPONENTS { + ..., + id (WITH COMPONENTS { + ..., + linkageData ABSENT + }), + cracaId ('000000'H), + crlSeries (0), + appPermissions ABSENT, + certIssuePermissions ABSENT, + certRequestPermissions PRESENT, + verifyKeyIndicator (WITH COMPONENTS { + verificationKey + }) + }), + canonicalId IA5String OPTIONAL, + ... +} + +/** + * @brief This structure is used by the ECA to respond to an EE's enrollment + * certificate request. Additional bootstrapping information including the + * RA's certificate are provided by the DCM. The specification of the DCM is + * outside the scope of this document. An overview of this structure is as + * follows: + * + * The definition of validity for a certificate request, including + * constraints on the fields in this structure, is specified in 10.1. + * + * @param version: contains the current version of the structure. + * + * @param generationTime: contains the generation time of EcaEeCertResponse. + * + * @param requestHash: contains the following hash: + * - EeEcaCertRequestSPDU, if the corresponding request was + * EeEcaCertRequestSPDU. This is calculated without "canonicalizing" the + * signature, i.e., it is calculated over the signature as given in the + * EeEcaCertRequestSpdu without re-encoding the signature's r component in + * x-coordinate-only form. See IEEE Std 1609.2 for further details on + * canonicalization. + * - EeRaSuccessorEnrollmentCertRequestSpd, if the corresponding request + * was EeRaSuccessorEnrollmentCertRequestSpd. + * + * @param ecaCertChain: contains the ECA's currently valid certificate and the + * certificate chain, up to and including the root CA. + * + * @param certificate: contains the enrollment certificate generated by the + * ECA, which shall be of the type indicated by the type field in the + * corresponding request. + * + * @param privateKeyInfo: shall be present and contain the private key + * reconstruction value, if certificate.type is implicit. This is used by the + * EE as specified in 9.3.5.1. + */ +EcaEeCertResponse ::= SEQUENCE { + version Uint8 (2), + generationTime Time32, + requestHash HashedId8, + ecaCertChain SequenceOfCertificate, + certificate Certificate, + privateKeyInfo OCTET STRING (SIZE(32)) OPTIONAL, + ... +} + +END diff --git a/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1EeMaInterface.asn b/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1EeMaInterface.asn index e0eebae73342f24b79a629d46911533b3195957f..f69f911284f7b57fcbe61a238a24dcbb12f07634 100644 --- a/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1EeMaInterface.asn +++ b/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1EeMaInterface.asn @@ -1,26 +1,26 @@ ---***************************************************************************-- --- IEEE Std 1609.2.1: EE - MA Interface -- ---***************************************************************************-- - -/** - * @note Section references in this file are to clauses in IEEE Std - * 1609.2.1 unless indicated otherwise. Full forms of acronyms and - * abbreviations used in this file are specified in 3.2. - */ - -Ieee1609Dot2Dot1EeMaInterface {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) - extension-standards(255) dot1(1) interfaces(1) ee-ma(10) major-version-2(2) - minor-version-1(1)} - -DEFINITIONS AUTOMATIC TAGS ::= BEGIN - -EXPORTS ALL; - -/** - * @brief This structure is currently being defined outside of this document, - * so it is defined as NULL for purposes of this document. - */ -EeMaInterfacePdu ::= NULL - -END +--***************************************************************************-- +-- IEEE Std 1609.2.1: EE - MA Interface -- +--***************************************************************************-- + +/** + * @note Section references in this file are to clauses in IEEE Std + * 1609.2.1 unless indicated otherwise. Full forms of acronyms and + * abbreviations used in this file are specified in 3.2. + */ + +Ieee1609Dot2Dot1EeMaInterface {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) + extension-standards(255) dot1(1) interfaces(1) ee-ma(10) major-version-2(2) + minor-version-1(1)} + +DEFINITIONS AUTOMATIC TAGS ::= BEGIN + +EXPORTS ALL; + +/** + * @brief This structure is currently being defined outside of this document, + * so it is defined as NULL for purposes of this document. + */ +EeMaInterfacePdu ::= NULL + +END diff --git a/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1EeRaInterface.asn b/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1EeRaInterface.asn index 6384ae6d5685cf1ee48e5a0b1a179b4b13c7e6d1..4376c9f72875e2c0127bee377bde80437e37c24b 100644 --- a/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1EeRaInterface.asn +++ b/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1EeRaInterface.asn @@ -1,305 +1,305 @@ ---***************************************************************************-- --- IEEE Std 1609.2.1: EE - RA Interface -- ---***************************************************************************-- - -/** - * @note Section references in this file are to clauses in IEEE Std - * 1609.2.1 unless indicated otherwise. Full forms of acronyms and - * abbreviations used in this file are specified in 3.2. - */ - -Ieee1609Dot2Dot1EeRaInterface {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) - extension-standards(255) dot1(1) interfaces(1) ee-ra(11) major-version-3(3) - minor-version-1(1)} - -DEFINITIONS AUTOMATIC TAGS ::= BEGIN - -EXPORTS ALL; - -IMPORTS - CertificateType -FROM Ieee1609Dot2 {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) - dot2(2) base(1) schema(1) major-version-2(2) minor-version-5(5)} -WITH SUCCESSORS - - HashedId8, - IValue, - PublicEncryptionKey, - Time32, - Uint8 -FROM Ieee1609Dot2BaseTypes {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) - base(1) base-types(2) major-version-2(2) minor-version-3(3)} -WITH SUCCESSORS - - AcpcTreeId -FROM Ieee1609Dot2Dot1Acpc {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) - extension-standards(255) dot1(1) interfaces(1) acpc(18) major-version-3(3) - minor-version-1(1)} -WITH SUCCESSORS - - EeEcaCertRequestSpdu, - PublicVerificationKey, - ToBeSignedCertificate -FROM Ieee1609Dot2Dot1Protocol {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) - extension-standards(255) dot1(1) interfaces(1) protocol(17) - major-version-3(3) minor-version-1(1)} -WITH SUCCESSORS -; - -/** - * @brief This is the parent structure for all structures exchanged between - * the EE and the RA. An overview of this structure is as follows: - * - * @note This CHOICE does not include a PDU type for encrypted - * misbehavior report upload; see 4.1.5. - * - * @param eeRaCertRequest: contains the certificate generation request sent by - * the EE to the RA. - * - * @param raEeCertAck: contains the RA's acknowledgement of the receipt of - * EeRaCertRequestSpdu. - * - * @param raEeCertInfo: contains the information about certificate download. - * - * @param eeRaDownloadRequest: contains the download request sent by the EE to - * the RA. - * - * @param eeRaSuccessorEnrollmentCertRequest: contains a self-signed request - * for an enrollment certificate, identical in format to the one submitted - * for an initial enrollment certificate. (This becomes a request for a - * successor enrollment certificate by virtue of being signed by the current - * enrollment certificate.) - */ -EeRaInterfacePdu ::= CHOICE { - eeRaCertRequest EeRaCertRequest, - raEeCertAck RaEeCertAck, - raEeCertInfo RaEeCertInfo, - eeRaDownloadRequest EeRaDownloadRequest, - eeRaSuccessorEnrollmentCertRequest EeEcaCertRequestSpdu, - ... -} - -/** - * @brief This structure contains parameters needed to request different types - * of authorization certificates. An overview of this structure is as follows: - * - * The definition of validity for a certificate request, including - * constraints on the fields in this structure, is specified in 10.1. - * - * @note: - * - In the case where the butterfly key mechanism is used to - * derive the certificate encryption key, the value j is not communicated to - * the ACA. However, the EE that receives the certificate response can only - * decrypt the response if it knows j. The RA is therefore anticipated to - * store j so that it can be associated with the appropriate certificate - * response. - * - If the type of id is LinkageData, the contents of the - * field in the request are replaced by random data by the RA when it sends - * the individual certificate requests to the ACA. The ACA then in turn - * replaces that data with the linkage values generated with the help of the - * LAs; see Annex D. - * - This document does not specify a method to include an - * encryptionKey in the requested certificates, if the butterfly key - * mechanism is used. The EE using such a certificate to sign a message - * cannot request that the response is encrypted to the certificate. Instead, - * it can request an encrypted response using the - * tbsData.headerInfo.encryptionKey field of the SignedData; see 6.3.9, - * 6.3.33, 6.3.34, and 6.3.36 of IEEE Std 1609.2 for more details. - * - * @param version: contains the current version of the structure. - * - * @param generationTime: contains the generation time of EeRaCertRequest. - * - * @param type: indicates whether the request is for an explicit or implicit - * certificate (see 4.1.1 and 4.1.4.3.1). - * - * @param tbsCert: contains the parameters to be used by the ACA to generate - * authorization certificate(s). - * - id contains the identity information sent by the requester. If the - * type is LinkageData, the contents of the field are chosen by the EE using - * any appropriate means. RA replaces that in the certificates with the - * linkage values generated with the help of the LAs and the ACA; see Annex D. - * - validityPeriod contains the requested validity period of the first - * batch of certificates. - * - region, assuranceLevel, canRequestRollover, and encryptionKey, if - * present, contain the information sent by the requester for the requested - * certificates. - * - verifyKeyIndicator.verificationKey contains the public key - * information sent by the requester. The verifyKeyIndicator field indicates - * the choice verificationKey even if type is implicit, as this allows the - * requester to indicate which signature algorithm and curve they are - * requesting. - * - If the certificate issued in response to this request is explicit and - * butterfly expansion is not used, the value in this field is the - * verification key that appears in that certificate. - * - If the certificate issued in response to this request is implicit and - * butterfly expansion is not used, the value in this field is the input - * public key value for implicit certificate generation. - * - If butterfly expansion is used, that is, if one of (original, unified, - * compactUnified) options is present in the field additionalParams, the - * value in this field is combined with the values in the additionalParams - * field as specified in 9.3. - * - * @param additionalParams: shall be present and contain relevant parameters if - * the requested certificates are to be generated using the butterfly key - * mechanism as specified in 9.3, or if the requested certificates are to be - * encrypted without using the butterfly key mechanism. If present, the field - * tbsCert.verifyKeyIndicator shall be used as the caterpillar public key for - * signing in the butterfly key mechanism. - */ -EeRaCertRequest ::= SEQUENCE { - version Uint8 (2), - generationTime Time32, - type CertificateType, - tbsCert ToBeSignedCertificate (WITH COMPONENTS { - ..., - cracaId ('000000'H), - crlSeries (0), - appPermissions PRESENT, - certIssuePermissions ABSENT, - certRequestPermissions ABSENT, - verifyKeyIndicator (WITH COMPONENTS { - verificationKey - }) - }), - additionalParams AdditionalParams OPTIONAL, - ... -} - -/** - * @brief This structure contains parameters for the butterfly key mechanism. - * An overview of this structure is as follows: - * - * @param original: contains the parameters for the original variant. - * - * @param unified: contains the expansion function for signing to be used for - * the unified variant. The caterpillar public key and expansion function for - * encryption are the same as those for signing. - * - * @param compactUnified: contains the expansion function for signing to be - * used for the compact unified variant. The caterpillar public key and - * expansion function for encryption are the same as those for signing. - * - * @param encryptionKey: contains the public key for encrypting the - * certificate if the butterfly key mechanism is not used. - */ -AdditionalParams ::= CHOICE { - original ButterflyParamsOriginal, - unified ButterflyExpansion, - compactUnified ButterflyExpansion, - encryptionKey PublicEncryptionKey, - ... -} - -/** - * @brief This structure contains parameters for the original variation of the - * butterfly key mechanism. An overview of this structure is as follows: - * - * @param signingExpansion: contains the expansion function for signing. - * - * @param encryptionKey: contains the caterpillar public key for encryption. - * - * @param encryptionExpansion: contains the expansion function for encryption. - */ -ButterflyParamsOriginal ::= SEQUENCE { - signingExpansion ButterflyExpansion, - encryptionKey PublicEncryptionKey, - encryptionExpansion ButterflyExpansion -} - -/** - * @brief This structure contains material used in the butterfly key - * calculations as specified in 9.3.5.1 and 9.3.5.2. An overview of this - * structure is as follows: - * - * @param aes128: indicates that the symmetric algorithm used in the expansion - * function is AES-128 with the indicated 16 byte string used as the key. - */ -ButterflyExpansion ::= CHOICE { - aes128 OCTET STRING (SIZE(16)), - ... -} - -/** - * @brief This structure is used to create the acknowledgement for certificate - * requests. An overview of this structure is as follows: - * - * @param version: contains the current version of the structure. - * - * @param generationTime: contains the generation time of RaEeCertAck. - * - * @param requestHash: contains the hash of the corresponding - * EeRaCertRequestSpdu. - * - * @param firstI: shall be present and contain the i-value that will be - * associated with the first certificate or the certificate batch that will be - * made available to the EE, if the corresponding EeRaCertRequest uses the - * butterfly key mechanism as indicated in the field additionalParams. The EE - * uses this to form the download filename for the download request as - * specified in 8.2.2. - * - * @param nextDlTime: contains the time after which the EE should connect to - * the RA to download the certificates. - */ -RaEeCertAck ::= SEQUENCE { - version Uint8 (2), - generationTime Time32, - requestHash HashedId8, - firstI IValue OPTIONAL, - nextDlTime Time32, - ... -} - -/** - * @brief This structure is used to create the info file that accompanies a - * batch of certificates for download as specified in 8.2.3. It is used when - * certificates were generated using the butterfly key expansion mechanism - * specified in 9.3. An overview of this structure is as follows: - * - * @param version: contains the current version of the structure. - * - * @param generationTime: contains the generation time of RaEeCertInfo. - * - * @param currentI: contains the i-value associated with the batch of - * certificates. - * - * @param requestHash: contains the hash of the corresponding - * EeRaCertRequestSpdu. - * - * @param nextDlTime: contains the time after which the EE should connect to - * the RA to download the certificates. - * - * @param acpcTreeId: shall be present and contain the ACPC Tree Id, if the - * certificates were generated using ACPC as specified in 9.5. - */ -RaEeCertInfo ::= SEQUENCE { - version Uint8 (2), - generationTime Time32, - currentI IValue, - requestHash HashedId8, - nextDlTime Time32, - acpcTreeId AcpcTreeId OPTIONAL, - ... -} - -/** - * @brief This structure contains parameters needed to request the download of - * certificates from the RA. An overview of this structure is as follows: - * - * @param generationTime: contains the generation time of EeRaDownloadRequest. - * - * @param filename: contains the name of the file requested for download, - * formed as specified in 8.2.2. - */ -EeRaDownloadRequest ::= SEQUENCE { - generationTime Time32, - filename UTF8String (SIZE (0..255)), - ... -} - -END +--***************************************************************************-- +-- IEEE Std 1609.2.1: EE - RA Interface -- +--***************************************************************************-- + +/** + * @note Section references in this file are to clauses in IEEE Std + * 1609.2.1 unless indicated otherwise. Full forms of acronyms and + * abbreviations used in this file are specified in 3.2. + */ + +Ieee1609Dot2Dot1EeRaInterface {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) + extension-standards(255) dot1(1) interfaces(1) ee-ra(11) major-version-3(3) + minor-version-1(1)} + +DEFINITIONS AUTOMATIC TAGS ::= BEGIN + +EXPORTS ALL; + +IMPORTS + CertificateType +FROM Ieee1609Dot2 {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) + dot2(2) base(1) schema(1) major-version-2(2) minor-version-5(5)} +WITH SUCCESSORS + + HashedId8, + IValue, + PublicEncryptionKey, + Time32, + Uint8 +FROM Ieee1609Dot2BaseTypes {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) + base(1) base-types(2) major-version-2(2) minor-version-3(3)} +WITH SUCCESSORS + + AcpcTreeId +FROM Ieee1609Dot2Dot1Acpc {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) + extension-standards(255) dot1(1) interfaces(1) acpc(18) major-version-3(3) + minor-version-1(1)} +WITH SUCCESSORS + + EeEcaCertRequestSpdu, + PublicVerificationKey, + ToBeSignedCertificate +FROM Ieee1609Dot2Dot1Protocol {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) + extension-standards(255) dot1(1) interfaces(1) protocol(17) + major-version-3(3) minor-version-1(1)} +WITH SUCCESSORS +; + +/** + * @brief This is the parent structure for all structures exchanged between + * the EE and the RA. An overview of this structure is as follows: + * + * @note This CHOICE does not include a PDU type for encrypted + * misbehavior report upload; see 4.1.5. + * + * @param eeRaCertRequest: contains the certificate generation request sent by + * the EE to the RA. + * + * @param raEeCertAck: contains the RA's acknowledgement of the receipt of + * EeRaCertRequestSpdu. + * + * @param raEeCertInfo: contains the information about certificate download. + * + * @param eeRaDownloadRequest: contains the download request sent by the EE to + * the RA. + * + * @param eeRaSuccessorEnrollmentCertRequest: contains a self-signed request + * for an enrollment certificate, identical in format to the one submitted + * for an initial enrollment certificate. (This becomes a request for a + * successor enrollment certificate by virtue of being signed by the current + * enrollment certificate.) + */ +EeRaInterfacePdu ::= CHOICE { + eeRaCertRequest EeRaCertRequest, + raEeCertAck RaEeCertAck, + raEeCertInfo RaEeCertInfo, + eeRaDownloadRequest EeRaDownloadRequest, + eeRaSuccessorEnrollmentCertRequest EeEcaCertRequestSpdu, + ... +} + +/** + * @brief This structure contains parameters needed to request different types + * of authorization certificates. An overview of this structure is as follows: + * + * The definition of validity for a certificate request, including + * constraints on the fields in this structure, is specified in 10.1. + * + * @note: + * - In the case where the butterfly key mechanism is used to + * derive the certificate encryption key, the value j is not communicated to + * the ACA. However, the EE that receives the certificate response can only + * decrypt the response if it knows j. The RA is therefore anticipated to + * store j so that it can be associated with the appropriate certificate + * response. + * - If the type of id is LinkageData, the contents of the + * field in the request are replaced by random data by the RA when it sends + * the individual certificate requests to the ACA. The ACA then in turn + * replaces that data with the linkage values generated with the help of the + * LAs; see Annex D. + * - This document does not specify a method to include an + * encryptionKey in the requested certificates, if the butterfly key + * mechanism is used. The EE using such a certificate to sign a message + * cannot request that the response is encrypted to the certificate. Instead, + * it can request an encrypted response using the + * tbsData.headerInfo.encryptionKey field of the SignedData; see 6.3.9, + * 6.3.33, 6.3.34, and 6.3.36 of IEEE Std 1609.2 for more details. + * + * @param version: contains the current version of the structure. + * + * @param generationTime: contains the generation time of EeRaCertRequest. + * + * @param type: indicates whether the request is for an explicit or implicit + * certificate (see 4.1.1 and 4.1.4.3.1). + * + * @param tbsCert: contains the parameters to be used by the ACA to generate + * authorization certificate(s). + * - id contains the identity information sent by the requester. If the + * type is LinkageData, the contents of the field are chosen by the EE using + * any appropriate means. RA replaces that in the certificates with the + * linkage values generated with the help of the LAs and the ACA; see Annex D. + * - validityPeriod contains the requested validity period of the first + * batch of certificates. + * - region, assuranceLevel, canRequestRollover, and encryptionKey, if + * present, contain the information sent by the requester for the requested + * certificates. + * - verifyKeyIndicator.verificationKey contains the public key + * information sent by the requester. The verifyKeyIndicator field indicates + * the choice verificationKey even if type is implicit, as this allows the + * requester to indicate which signature algorithm and curve they are + * requesting. + * - If the certificate issued in response to this request is explicit and + * butterfly expansion is not used, the value in this field is the + * verification key that appears in that certificate. + * - If the certificate issued in response to this request is implicit and + * butterfly expansion is not used, the value in this field is the input + * public key value for implicit certificate generation. + * - If butterfly expansion is used, that is, if one of (original, unified, + * compactUnified) options is present in the field additionalParams, the + * value in this field is combined with the values in the additionalParams + * field as specified in 9.3. + * + * @param additionalParams: shall be present and contain relevant parameters if + * the requested certificates are to be generated using the butterfly key + * mechanism as specified in 9.3, or if the requested certificates are to be + * encrypted without using the butterfly key mechanism. If present, the field + * tbsCert.verifyKeyIndicator shall be used as the caterpillar public key for + * signing in the butterfly key mechanism. + */ +EeRaCertRequest ::= SEQUENCE { + version Uint8 (2), + generationTime Time32, + type CertificateType, + tbsCert ToBeSignedCertificate (WITH COMPONENTS { + ..., + cracaId ('000000'H), + crlSeries (0), + appPermissions PRESENT, + certIssuePermissions ABSENT, + certRequestPermissions ABSENT, + verifyKeyIndicator (WITH COMPONENTS { + verificationKey + }) + }), + additionalParams AdditionalParams OPTIONAL, + ... +} + +/** + * @brief This structure contains parameters for the butterfly key mechanism. + * An overview of this structure is as follows: + * + * @param original: contains the parameters for the original variant. + * + * @param unified: contains the expansion function for signing to be used for + * the unified variant. The caterpillar public key and expansion function for + * encryption are the same as those for signing. + * + * @param compactUnified: contains the expansion function for signing to be + * used for the compact unified variant. The caterpillar public key and + * expansion function for encryption are the same as those for signing. + * + * @param encryptionKey: contains the public key for encrypting the + * certificate if the butterfly key mechanism is not used. + */ +AdditionalParams ::= CHOICE { + original ButterflyParamsOriginal, + unified ButterflyExpansion, + compactUnified ButterflyExpansion, + encryptionKey PublicEncryptionKey, + ... +} + +/** + * @brief This structure contains parameters for the original variation of the + * butterfly key mechanism. An overview of this structure is as follows: + * + * @param signingExpansion: contains the expansion function for signing. + * + * @param encryptionKey: contains the caterpillar public key for encryption. + * + * @param encryptionExpansion: contains the expansion function for encryption. + */ +ButterflyParamsOriginal ::= SEQUENCE { + signingExpansion ButterflyExpansion, + encryptionKey PublicEncryptionKey, + encryptionExpansion ButterflyExpansion +} + +/** + * @brief This structure contains material used in the butterfly key + * calculations as specified in 9.3.5.1 and 9.3.5.2. An overview of this + * structure is as follows: + * + * @param aes128: indicates that the symmetric algorithm used in the expansion + * function is AES-128 with the indicated 16 byte string used as the key. + */ +ButterflyExpansion ::= CHOICE { + aes128 OCTET STRING (SIZE(16)), + ... +} + +/** + * @brief This structure is used to create the acknowledgement for certificate + * requests. An overview of this structure is as follows: + * + * @param version: contains the current version of the structure. + * + * @param generationTime: contains the generation time of RaEeCertAck. + * + * @param requestHash: contains the hash of the corresponding + * EeRaCertRequestSpdu. + * + * @param firstI: shall be present and contain the i-value that will be + * associated with the first certificate or the certificate batch that will be + * made available to the EE, if the corresponding EeRaCertRequest uses the + * butterfly key mechanism as indicated in the field additionalParams. The EE + * uses this to form the download filename for the download request as + * specified in 8.2.2. + * + * @param nextDlTime: contains the time after which the EE should connect to + * the RA to download the certificates. + */ +RaEeCertAck ::= SEQUENCE { + version Uint8 (2), + generationTime Time32, + requestHash HashedId8, + firstI IValue OPTIONAL, + nextDlTime Time32, + ... +} + +/** + * @brief This structure is used to create the info file that accompanies a + * batch of certificates for download as specified in 8.2.3. It is used when + * certificates were generated using the butterfly key expansion mechanism + * specified in 9.3. An overview of this structure is as follows: + * + * @param version: contains the current version of the structure. + * + * @param generationTime: contains the generation time of RaEeCertInfo. + * + * @param currentI: contains the i-value associated with the batch of + * certificates. + * + * @param requestHash: contains the hash of the corresponding + * EeRaCertRequestSpdu. + * + * @param nextDlTime: contains the time after which the EE should connect to + * the RA to download the certificates. + * + * @param acpcTreeId: shall be present and contain the ACPC Tree Id, if the + * certificates were generated using ACPC as specified in 9.5. + */ +RaEeCertInfo ::= SEQUENCE { + version Uint8 (2), + generationTime Time32, + currentI IValue, + requestHash HashedId8, + nextDlTime Time32, + acpcTreeId AcpcTreeId OPTIONAL, + ... +} + +/** + * @brief This structure contains parameters needed to request the download of + * certificates from the RA. An overview of this structure is as follows: + * + * @param generationTime: contains the generation time of EeRaDownloadRequest. + * + * @param filename: contains the name of the file requested for download, + * formed as specified in 8.2.2. + */ +EeRaDownloadRequest ::= SEQUENCE { + generationTime Time32, + filename UTF8String (SIZE (0..255)), + ... +} + +END diff --git a/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1LaMaInterface.asn b/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1LaMaInterface.asn index 74959cbe316d321911a48ea6f8741694dee27f5b..9f604401e35cbd8a61911691210b293387ff9641 100644 --- a/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1LaMaInterface.asn +++ b/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1LaMaInterface.asn @@ -1,26 +1,26 @@ ---***************************************************************************-- --- IEEE Std 1609.2.1: LA - MA Interface -- ---***************************************************************************-- - -/** - * @note Section references in this file are to clauses in IEEE Std - * 1609.2.1 unless indicated otherwise. Full forms of acronyms and - * abbreviations used in this file are specified in 3.2. - */ - -Ieee1609Dot2Dot1LaMaInterface {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) - extension-standards(255) dot1(1) interfaces(1) la-ma(12) major-version-2(2) - minor-version-1(1)} - -DEFINITIONS AUTOMATIC TAGS ::= BEGIN - -EXPORTS ALL; - -/** - * @brief This structure is not used by EEs, so it is defined as NULL for - * purposes of this document. - */ -LaMaInterfacePdu ::= NULL - -END +--***************************************************************************-- +-- IEEE Std 1609.2.1: LA - MA Interface -- +--***************************************************************************-- + +/** + * @note Section references in this file are to clauses in IEEE Std + * 1609.2.1 unless indicated otherwise. Full forms of acronyms and + * abbreviations used in this file are specified in 3.2. + */ + +Ieee1609Dot2Dot1LaMaInterface {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) + extension-standards(255) dot1(1) interfaces(1) la-ma(12) major-version-2(2) + minor-version-1(1)} + +DEFINITIONS AUTOMATIC TAGS ::= BEGIN + +EXPORTS ALL; + +/** + * @brief This structure is not used by EEs, so it is defined as NULL for + * purposes of this document. + */ +LaMaInterfacePdu ::= NULL + +END diff --git a/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1LaRaInterface.asn b/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1LaRaInterface.asn index c5f819a04e9d3df1f771ff6e1f2290b99eae3497..3b61a13fb9f42fcddaeca9ae73e19d3956fcb0a0 100644 --- a/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1LaRaInterface.asn +++ b/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1LaRaInterface.asn @@ -1,26 +1,26 @@ ---***************************************************************************-- --- IEEE Std 1609.2.1: LA - RA Interface -- ---***************************************************************************-- - -/** - * @note Section references in this file are to clauses in IEEE Std - * 1609.2.1 unless indicated otherwise. Full forms of acronyms and - * abbreviations used in this file are specified in 3.2. - */ - -Ieee1609Dot2Dot1LaRaInterface {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) - extension-standards(255) dot1(1) interfaces(1) la-ra(13) major-version-2(2) - minor-version-1(1)} - -DEFINITIONS AUTOMATIC TAGS ::= BEGIN - -EXPORTS ALL; - -/** - * @brief This structure is not used by EEs, so it is defined as NULL for - * purposes of this document. - */ -LaRaInterfacePdu ::= NULL - -END +--***************************************************************************-- +-- IEEE Std 1609.2.1: LA - RA Interface -- +--***************************************************************************-- + +/** + * @note Section references in this file are to clauses in IEEE Std + * 1609.2.1 unless indicated otherwise. Full forms of acronyms and + * abbreviations used in this file are specified in 3.2. + */ + +Ieee1609Dot2Dot1LaRaInterface {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) + extension-standards(255) dot1(1) interfaces(1) la-ra(13) major-version-2(2) + minor-version-1(1)} + +DEFINITIONS AUTOMATIC TAGS ::= BEGIN + +EXPORTS ALL; + +/** + * @brief This structure is not used by EEs, so it is defined as NULL for + * purposes of this document. + */ +LaRaInterfacePdu ::= NULL + +END diff --git a/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1MaRaInterface.asn b/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1MaRaInterface.asn index b74c2486a8bdbf1e99b7001aaeea93cc755f9ffc..47a0a0c61429bb3b316aa0aab6bde9b209473904 100644 --- a/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1MaRaInterface.asn +++ b/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1MaRaInterface.asn @@ -1,26 +1,26 @@ ---***************************************************************************-- --- IEEE Std 1609.2.1: MA - RA Interface -- ---***************************************************************************-- - -/** - * @note Section references in this file are to clauses in IEEE Std - * 1609.2.1 unless indicated otherwise. Full forms of acronyms and - * abbreviations used in this file are specified in 3.2. - */ - -Ieee1609Dot2Dot1MaRaInterface {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) - extension-standards(255) dot1(1) interfaces(1) ma-ra(14) major-version-2(2) - minor-version-1(1)} - -DEFINITIONS AUTOMATIC TAGS ::= BEGIN - -EXPORTS ALL; - -/** - * @brief This structure is not used by EEs, so it is defined as NULL for - * purposes of this document. - */ -MaRaInterfacePdu ::= NULL - -END +--***************************************************************************-- +-- IEEE Std 1609.2.1: MA - RA Interface -- +--***************************************************************************-- + +/** + * @note Section references in this file are to clauses in IEEE Std + * 1609.2.1 unless indicated otherwise. Full forms of acronyms and + * abbreviations used in this file are specified in 3.2. + */ + +Ieee1609Dot2Dot1MaRaInterface {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) + extension-standards(255) dot1(1) interfaces(1) ma-ra(14) major-version-2(2) + minor-version-1(1)} + +DEFINITIONS AUTOMATIC TAGS ::= BEGIN + +EXPORTS ALL; + +/** + * @brief This structure is not used by EEs, so it is defined as NULL for + * purposes of this document. + */ +MaRaInterfacePdu ::= NULL + +END diff --git a/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn b/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn index b518c63e95da9c80536f8f5354f56d4c5b73c27c..5624a2bc94f574f224f6bbca2709e7abcf95e75d 100644 --- a/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn +++ b/certgen/asncodec/asn1/ieee1609.2.1/Ieee1609Dot2Dot1Protocol.asn @@ -1,1277 +1,1277 @@ ---***************************************************************************-- --- IEEE Std 1609.2.1 -- ---***************************************************************************-- - -/** - * @note Section references in this file are to clauses in IEEE Std - * 1609.2.1 unless indicated otherwise. Full forms of acronyms and - * abbreviations used in this file are specified in 3.2. - */ - -Ieee1609Dot2Dot1Protocol {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) - extension-standards(255) dot1(1) interfaces(1) protocol(17) - major-version-3(3) minor-version-1(1)} - -DEFINITIONS AUTOMATIC TAGS ::= BEGIN - -EXPORTS ALL; - -IMPORTS - Certificate, - CertificateId, - Ieee1609Dot2Data, - SequenceOfCertificate, - SequenceOfPsidGroupPermissions, - SignerIdentifier, - ToBeSignedCertificate, - VerificationKeyIndicator -FROM Ieee1609Dot2 {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) - dot2(2) base(1) schema(1) major-version-2(2) minor-version-5(5)} -WITH SUCCESSORS - - CrlSeries, - EccP256CurvePoint, - EccP384CurvePoint, - EcdsaP256Signature, - EcdsaP384Signature, - GeographicRegion, - HashAlgorithm, - HashedId3, - Psid, - PublicEncryptionKey, - PublicVerificationKey, - SequenceOfPsid, - SequenceOfPsidSsp, - Signature, - SubjectAssurance, - Uint8, - Uint16, - ValidityPeriod -FROM Ieee1609Dot2BaseTypes {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) - base(1) base-types(2) major-version-2(2) minor-version-3(3)} -WITH SUCCESSORS - - AcaEeInterfacePdu -FROM Ieee1609Dot2Dot1AcaEeInterface {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) - extension-standards(255) dot1(1) interfaces(1) aca-ee(1) major-version-2(2) - minor-version-3(3)} -WITH SUCCESSORS - - AcaLaInterfacePdu -FROM Ieee1609Dot2Dot1AcaLaInterface {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) - extension-standards(255) dot1(1) interfaces(1) aca-la(2) major-version-2(2) - minor-version-1(1)} -WITH SUCCESSORS - - AcaMaInterfacePdu -FROM Ieee1609Dot2Dot1AcaMaInterface {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) - extension-standards(255) dot1(1) interfaces(1) aca-ma(3) major-version-2(2) - minor-version-1(1)} -WITH SUCCESSORS - - AcaRaInterfacePdu -FROM Ieee1609Dot2Dot1AcaRaInterface {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) - extension-standards(255) dot1(1) interfaces(1) aca-ra(4) major-version-3(3) - minor-version-1(1)} -WITH SUCCESSORS - - AcpcTreeId -FROM Ieee1609Dot2Dot1Acpc {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) - extension-standards(255) dot1(1) interfaces(1) acpc(18) major-version-3(3) - minor-version-1(1)} -WITH SUCCESSORS - - CertManagementPdu -FROM Ieee1609Dot2Dot1CertManagement {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) - extension-standards(255) dot1(1) interfaces(1) cert-management(7) - major-version-3(3) minor-version-1(1)} -WITH SUCCESSORS - - EcaEeInterfacePdu -FROM Ieee1609Dot2Dot1EcaEeInterface {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) - extension-standards(255) dot1(1) interfaces(1) eca-ee(9) major-version-3(3) - minor-version-1(1)} -WITH SUCCESSORS - - EeMaInterfacePdu -FROM Ieee1609Dot2Dot1EeMaInterface {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) - extension-standards(255) dot1(1) interfaces(1) ee-ma(10) major-version-2(2) - minor-version-1(1)} -WITH SUCCESSORS - - EeRaInterfacePdu -FROM Ieee1609Dot2Dot1EeRaInterface {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) - extension-standards(255) dot1(1) interfaces(1) ee-ra(11) major-version-3(3) - minor-version-1(1)} -WITH SUCCESSORS - - LaMaInterfacePdu -FROM Ieee1609Dot2Dot1LaMaInterface {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) - extension-standards(255) dot1(1) interfaces(1) la-ma(12) major-version-2(2) - minor-version-1(1)} -WITH SUCCESSORS - - LaRaInterfacePdu -FROM Ieee1609Dot2Dot1LaRaInterface {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) - extension-standards(255) dot1(1) interfaces(1) la-ra(13) major-version-2(2) - minor-version-1(1)} -WITH SUCCESSORS - - MaRaInterfacePdu -FROM Ieee1609Dot2Dot1MaRaInterface {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) - extension-standards(255) dot1(1) interfaces(1) ma-ra(14) major-version-2(2) - minor-version-1(1)} -WITH SUCCESSORS -; - -/** - * @brief This PSID, 0x23, identifies security management activities as - * defined in this document. - */ -SecurityMgmtPsid ::= Psid (35) - -/** - * @brief This is the parent structure that encompasses all parent structures - * of interfaces defined in the SCMS. An overview of this structure is as - * follows: - * - aca-ee contains the interface structures defined for interaction - * between the ACA and the EE. - * - aca-la contains the interface structures defined for interaction - * between the ACA and the LA. - * - aca-ma contains the interface structures defined for interaction - * between the ACA and the MA. - * - aca-ra contains the interface structures defined for interaction - * between the ACA and the RA. - * - cert contains the interface structures defined for certificate - * management. - * - eca-ee contains the interface structures defined for interaction - * between the ECA and the EE. - * - ee-ma contains the interface structures defined for interaction - * between the EE and the MA. - * - ee-ra contains the interface structures defined for interaction - * between the EE and the RA. - * - la-ma contains the interface structures defined for interaction - * between the LA and the MA. - * - la-ra contains the interface structures defined for interaction - * between the LA and the RA. - * - ma-ra contains the interface structures defined for interactions - * between the MA and the RA. - * - * @param version: contains the current version of the structure. - */ -ScmsPdu ::= SEQUENCE { - version Uint8 (2), - content CHOICE { - aca-ee AcaEeInterfacePdu, - aca-la AcaLaInterfacePdu, - aca-ma AcaMaInterfacePdu, - aca-ra AcaRaInterfacePdu, - cert CertManagementPdu, - eca-ee EcaEeInterfacePdu, - ee-ma EeMaInterfacePdu, - ee-ra EeRaInterfacePdu, - la-ma LaMaInterfacePdu, - la-ra LaRaInterfacePdu, - ma-ra MaRaInterfacePdu, - ... - } -} - - ---***************************************************************************-- --- Parameterized Types -- ---***************************************************************************-- - -/** - * @brief This structure defines a parameterized type for creating a scoped - * data as a subtype of ScmsPdu. - */ -ScmsPdu-Scoped {Pdu} ::= ScmsPdu (WITH COMPONENTS { - ..., - content (CONSTRAINED BY { - Pdu - }) -}) - -/** - * @brief This structure defines a parameterized type for creating an - * unsecured data as a subtype of Ieee1609Dot2Data. - */ -Ieee1609Dot2Data-Unsecured {Tbu} ::= - Ieee1609Dot2Data (WITH COMPONENTS { - content (WITH COMPONENTS { - ..., - unsecuredData (CONTAINING Tbu) - }) -}) - -/** - * @brief This structure defines a parameterized type for creating a signed - * data as a subtype of Ieee1609Dot2Data. - */ -Ieee1609Dot2Data-Signed {Tbs, Psid} ::= - Ieee1609Dot2Data (WITH COMPONENTS { - ..., - content (WITH COMPONENTS { - ..., - signedData (WITH COMPONENTS { - ..., - tbsData (WITH COMPONENTS { - ..., - payload (WITH COMPONENTS { - ..., - data (WITH COMPONENTS { - ..., - content (WITH COMPONENTS { - unsecuredData (CONTAINING Tbs) - }) - }) - }), - headerInfo (WITH COMPONENTS { - ..., - psid (Psid), - generationTime ABSENT, - expiryTime ABSENT, - generationLocation ABSENT, - p2pcdLearningRequest ABSENT, - missingCrlIdentifier ABSENT, - encryptionKey ABSENT - }) - }), - signer (SignerSingleCert) - }) - }) -}) - -/** - * @brief This structure defines a parameterized type for creating an - * encrypted data as a subtype of Ieee1609Dot2Data. An overview of this - * structure is as follows: - * - * @param Tbe: is first encrypted per IEEE 1609.2. Per IEEE 1609.2, this - * includes encapsulating Tbe in an Ieee1609Dot2Data of type unsecured if - * Tbe is not already an Ieee1609Dot2Data. The ciphertext output from the - * encryption of Tbe is used to set the encryptedData.ciphertext field. The - * encryptedData.recipients field is set to reflect the recipients. This - * parameterized type does not provide parameters to set the recipients; that - * information is set directly by the entity that creates an instance of this - * type. - */ -Ieee1609Dot2Data-Encrypted {Tbe} ::= - Ieee1609Dot2Data (WITH COMPONENTS { - ..., - content (WITH COMPONENTS { - encryptedData (CONSTRAINED BY { - --encryption of-- Tbe - }) - }) -}) - -/** - * @brief This structure defines a parameterized type for creating a signed - * certificate request as a subtype of Ieee1609Dot2Data. - */ -Ieee1609Dot2Data-SignedCertRequest {Tbscr, Signer} ::= - Ieee1609Dot2Data (WITH COMPONENTS { - ..., - content (WITH COMPONENTS { - ..., - signedCertificateRequest (CONTAINING - SignedCertificateRequest (WITH COMPONENTS { - ..., - tbsRequest (Tbscr), - signer (Signer) - })) - }) -}) - -/** - * @brief This structure is a wrapper for an ITU-T X.509 certificate. - * - * @note ITU-T X.509 certificates are encoded with the ASN.1 DER - * rather than the OER used in this document and so cannot be "directly" - * imported into these structures. - */ -X509Certificate ::= OCTET STRING - -/** - * @brief This type is used for clarity of definitions. - */ -SequenceOfX509Certificate ::= - SEQUENCE (SIZE(1..MAX)) OF X509Certificate - -/** - * @brief This structure identifies an ITU-T X.509 certificate used to sign a - * signed data structure. The only data structure currently defined that can - * be signed by an ITU-T X.509 certificate is SignedX509CertificateRequest. - */ -X509SignerIdentifier ::= CHOICE { - certificate SequenceOfX509Certificate, - ... -} - -/** - * @brief This structure defines a parameterized type for creating a - * certificate request, signed with an ITU-T X.509 certificate, as a subtype of - * Ieee1609Dot2Data. It makes use of the extension of Ieee1609Dot2Content - * defined in 11.2.3. - */ -Ieee1609Dot2Data-SignedX509AuthenticatedCertRequest {Tbscr, Signer} ::= - Ieee1609Dot2Data (WITH COMPONENTS { - ..., - content (WITH COMPONENTS { - ..., - signedX509CertificateRequest (CONTAINING - SignedX509CertificateRequest (WITH COMPONENTS { - ..., - tbsRequest (Tbscr), - signer (Signer) - })) - }) -}) - -/** - * @brief This structure defines a parameterized type for creating a signed - * then encrypted data as a subtype of Ieee1609Dot2Data. - */ -Ieee1609Dot2Data-SignedEncrypted {Tbse, Psid} ::= - Ieee1609Dot2Data-Encrypted { - Ieee1609Dot2Data-Signed { - Tbse, - Psid - } -} - -/** - * @brief This structure defines a parameterized type for creating an - * encrypted then signed data as a subtype of Ieee1609Dot2Data. - * - * @note This parameterized type inadvertently adds some overhead. - * The Ieee1609Dot2Data-EncryptedSigned {Tbes, Psid} structure, because it - * puts Ieee1609Dot2Data-Encrypted inside Ieee1609Dot2Data-Signed {Tbs, Psid}, - * and because Ieee1609Dot2Data-Signed {Tbs, Psid} puts Tbs inside - * unsecuredData, Tbes is "Signed (Unsecured (Encrypted))" instead of - * "Signed (Encrypted))", which was the intent and also in the original CAMP - * design. Other documents that use this document may be better off defining - * this structure on their own, if they want avoid this overhead. - */ -Ieee1609Dot2Data-EncryptedSigned {Tbes, Psid} ::= - Ieee1609Dot2Data-Signed { - Ieee1609Dot2Data-Encrypted { - Tbes - }, - Psid -} - -/** - * @brief This structure defines a parameterized type for creating a signed - * then encrypted certificate request as a subtype of Ieee1609Dot2Data. - */ -Ieee1609Dot2Data-SignedEncryptedCertRequest {Tbstecr, Signer} ::= - Ieee1609Dot2Data-Encrypted { - Ieee1609Dot2Data-SignedCertRequest { - Tbstecr, - Signer - } -} - -/** - * @brief This structure defines a parameterized type for creating an - * encrypted data as a subtype of Ieee1609Dot2Data. An overview of this - * structure is as follows: - * - * @param Tbe: is first encrypted and the resulting ciphertext is used as - * input to the encryptedData field. - */ -Ieee1609Dot2Data-SymmEncryptedSingleRecipient {Tbe} ::= - Ieee1609Dot2Data (WITH COMPONENTS { - ..., - content (WITH COMPONENTS { - encryptedData (CONSTRAINED BY { - --contains only one RecipientInfo, of form symmRecipinfo - --symmetric encryption of-- Tbe - }) - }) -}) - ---***************************************************************************-- --- Signer Types -- ---***************************************************************************-- - -/** - * @brief This structure is used to indicate a SignerIdentifier with a - * certificate chain of size 1. - */ -SignerSingleCert ::= SignerIdentifier (WITH COMPONENTS { - certificate (SequenceOfCertificate (SIZE (1))) -}) - -/** - * @brief This structure is used to indicate an X509SignerIdentifier with a - * certificate chain of size 1. - */ -SignerSingleX509Cert ::= X509SignerIdentifier (WITH COMPONENTS { - certificate (SequenceOfX509Certificate (SIZE (1))) -}) - -/** - * @brief This structure is used to indicate a SignerIdentifier of type self. - */ -SignerSelf ::= SignerIdentifier (WITH COMPONENTS { - self -}) - ---***************************************************************************-- --- Certificate Requests -- ---***************************************************************************-- - - ScmsPdu-RaAcaCertRequest ::= ScmsPdu-Scoped { - AcaRaInterfacePdu (WITH COMPONENTS { - raAcaCertRequest - }) - } - ScmsPdu-EeEcaCertRequest ::= ScmsPdu-Scoped { - EcaEeInterfacePdu (WITH COMPONENTS { - eeEcaCertRequest - }) - } - ScmsPdu-EeRaCertRequest ::= ScmsPdu-Scoped { - EeRaInterfacePdu (WITH COMPONENTS { - eeRaCertRequest - }) - } - ScmsPdu-EeRaSuccessorEnrollmentCertRequest ::= ScmsPdu-Scoped { - EeRaInterfacePdu (WITH COMPONENTS { - eeRaSuccessorEnrollmentCertRequest - }) - } - - -/** - * @brief This structure defines the all certificate request structures as a - * scoped version of the ScmsPdu. - */ -ScopedCertificateRequest ::= ScmsPdu ( - ScmsPdu-RaAcaCertRequest | ScmsPdu-EeEcaCertRequest | - ScmsPdu-EeRaCertRequest | ScmsPdu-EeRaSuccessorEnrollmentCertRequest -) - -/** - * @brief This structure defines the format of a signed certificate request. - * An overview of this structure is as follows: - * - * The signature is generated on the hash of this structure, obtained - * per the rules specified for hashing data objects in 5.3.1 of IEEE Std - * 1609.2a-2017, where the parameter Data Input shall be the C-OER - * encoding of tbsRequest, and the parameter Signer Identifier Input - * depending on whether the request is self-signed or signed using an - * enrollment certificate: - * - If the request is self-signed, the parameter Signer Identifier - * Input shall be the empty string, i.e., a string of length 0. - * - If the request is signed using an enrollment certificate, the - * parameter Signer Identifier Input shall be the signer's enrollment - * certificate. - * - * @param hashAlgorithmId: contains the identifier of the hash algorithm used - * to calculate the hash of tbsRequest. - * - * @param tbsRequest: contains the certificate request information that is - * signed by the recipient. - * - * @param signer: denotes the signing entity's identifier. - * - * @param signature: contains the request sender's signature. - */ -SignedCertificateRequest ::= SEQUENCE { - hashAlgorithmId HashAlgorithm, - tbsRequest ScopedCertificateRequest, - signer SignerIdentifier, - signature Signature -} - -/** - * @brief This structure contains a certificate request signed with an ITU-T - * X.509 certificate. The only type of certificate request signed with an - * ITU-T X.509 certificate supported in this document is an authorization - * certificate request. An overview of this structure is as follows: - * - * The signature is generated on the hash of this structure, obtained - * per the rules specified for hashing data objects in 5.3.1 of IEEE Std - * 1609.2a-2017, where the parameter Data Input shall be the C-OER - * encoding of tbsRequest, and the parameter Signer Identifier Input - * shall be the signer's certificate, that is, the ITU-T X.509 certificate - * contained in the OCTET STRING indicated by the first X509Certificate in - * signer. For example, if the signer is as below, the first 6 bytes are the - * ASN.1 encoding overhead, where 80 01 01 is the overhead for signer, and - * then 82 01 AC is the overhead introduced by the OCTET STRING encoding for - * the first (in this case, the only) X509Certificate; and the first - * X509Certificate is contained in the next 428 bytes (30 82 01 ... 00 00 00), - * so the parameter Signer Identifier Input shall be '30 82 01 ... 00 00 00'. - * - * An example X509SignerIdentifier with one X509Certificate: - * - * 80 01 01 82 01 AC 30 82 01 A8 30 82 01 4D A0 03 02 01 02 02 04 90 - * C5 9D 21 30 0A 06 08 2A 86 48 CE 3D 04 03 02 30 24 31 0A 30 08 06 03 55 04 - * 06 13 01 00 31 0A 30 08 06 03 55 04 0A 13 01 00 31 0A 30 08 06 03 55 04 03 - * 13 01 00 30 1E 17 0D 30 30 30 31 30 31 30 30 30 30 30 30 5A 17 0D 30 30 30 - * 31 30 31 30 30 30 30 30 30 5A 30 24 31 0A 30 08 06 03 55 04 06 13 01 00 31 - * 0A 30 08 06 03 55 04 0A 13 01 00 31 0A 30 08 06 03 55 04 03 13 01 00 30 59 - * 30 13 06 07 2A 86 48 CE 3D 02 01 06 08 2A 86 48 CE 3D 03 01 07 03 42 00 00 - * 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 - * 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 - * 00 00 00 00 00 00 00 00 00 00 00 00 00 00 A3 6D 30 6B 30 0A 06 03 55 1D 0E - * 04 03 04 01 00 30 0A 06 03 55 1D 23 04 03 04 01 00 30 0C 06 03 55 1D 13 01 - * 01 FF 04 02 30 00 30 0E 06 03 55 1D 0F 01 01 FF 04 04 03 02 03 C8 30 0A 06 - * 03 55 1D 25 04 03 04 01 00 30 0A 06 03 55 1D 1F 04 03 04 01 00 30 0F 06 08 - * 2B 06 01 05 05 07 01 01 04 03 04 01 00 30 0A 06 03 55 1D 20 04 03 04 01 00 - * 30 0A 06 08 2A 86 48 CE 3D 04 03 02 03 49 00 00 00 00 00 00 00 00 00 00 00 - * 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 - * 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 - * 00 00 00 00 00 00 00 00 00 00 00 00 - * - * @param hashAlgorithmId: contains the identifier of the hash algorithm used - * inside the binary tree. - * - * @param tbsRequest: contains the certificate request information that is - * signed by the recipient. - * - * @param signer: denotes the signing entity's identifier. - * - * @param signature: contains the request sender's signature. - */ -SignedX509CertificateRequest ::= SEQUENCE { - hashAlgorithmId HashAlgorithm, - tbsRequest ScopedCertificateRequest, - signer X509SignerIdentifier, - signature Signature -} - ---***************************************************************************-- --- ACA - EE Interface -- ---***************************************************************************-- - -/** - * @brief This structure contains a certificate response for consumption by - * the EE. In the architecture of this document, although it is created by the - * ACA, it is made available to the EE via the RA as described in 8.2. - * - * The ACA creates this response when 1) the compact unified - * butterfly key mechanism is not being used (that is, some other flavor of - * butterfly key is being used, or butterfly keys are not being used) and 2) - * it is not necessary to protect the EE's privacy from the RA, for example, - * when the certificate being returned is not a pseudonym certificate. - */ -AcaEeCertResponsePlainSpdu ::= Ieee1609Dot2Data-Unsecured { - ScmsPdu-Scoped { - AcaEeInterfacePdu (WITH COMPONENTS { - acaEeCertResponse - }) - } -} - -/** - * @brief This structure contains a certificate response for consumption by - * the EE. In the architecture of this document, although it is created by the - * ACA, it is made available to the EE via the RA as described in 8.2. - * - * The ACA creates this response when 1) the compact unified - * butterfly key mechanism is not being used (that is, some other flavor of - * butterfly key is being used, or butterfly keys are not being used) and 2) - * it is necessary to protect the EE's privacy from the RA, for example when - * the certificate being returned is a pseudonym certificate. - * - * The structure consists of a signed SPDU containing an encrypted - * SPDU. - * - * The encrypted SPDU is encrypted with the response - * encryption key that was provided to the ACA for that purpose. This key is - * determined as follows: - * - If the original EeRaCertRequest from the end entity indicated a single - * response encryption key, that is, if the additionalParams.encryptionKey - * field was present in the request, then the response is encrypted with that - * key. - * - If the original EeRaCertRequest from the end entity indicated a - * response encryption key generated with the "original" butterfly key - * mechanism, that is, the additionalParams.original field was provided in the - * request, then the response is encrypted with the cocoon encryption key - * derived from additionalParams.original.encryptionKey and - * additionalParams.original.encryptionExpansion as specified in 9.3.4.2 - * and the corresponding decryption private key is derived as specified in - * 9.3.4.1. - * - If the original EeRaCertRequest from the end entity indicated a - * response encryption key generated with the "unified" butterfly key - * mechanism, that is, the additionalParams.unified field was provided in the - * request, then the response is encrypted with the cocoon encryption key - * derived from tbsCert.verifyKeyIndicator and additionalParams.unified as - * specified in 9.3.4.2 and the corresponding decryption private key is - * derived as specified in 9.3.4.1. - * - * See 9.3 for more material about butterfly keys. - * - * The resulting Ieee1609Dot2Data of content type encryptedData is - * signed by the same ACA certificate that was used to issue the certificate - * field in the AcaEeCertResponse. If this structure is signed by a different - * ACA certificate, it is invalid. The ACA certificate shall follow the ACA - * certificate profile given in 7.7.3.2. - * - * @note: - * - Other potential responses to an authorization certificate - * request: If the original request indicated the use of "compact unified" - * butterfly key mechanism by including the additionalParams.compactUnified - * field, the response shall be a AcaEeCertResponseCubkSpdu, not a - * AcaEeCertResponsePrivateSpdu. - * - * - How the ACA obtains the response encryption key: This - * document provides the RaAcaCertRequest structure to allow the RA to - * indicate whether the original or unified butterfly key mechanism is to be - * used via the flags field. The encryption key for encrypting - * AcaEeCertResponse is calculated by the indicated method even if the RA - * does not use an RaAcaCertRequest as defined in this document to - * communicate the certificate request to the ACA. - * - * - Consistency between inner and outer signers, and the IEEE - * Std 1609.2 model. This SPDU introduces a new type of validity condition - * by requiring that the ACA that signs the outer signed SPDU is also the ACA - * that issued the certificate inside the encrypted SPDU. This requires that - * to verify the inner "SPDU", that is, the certificate, the verifier - * needs to store the information from the outer SPDU. This is not a violation - * of the IEEE 1609.2 model: Subclause 4.2.2.3 of IEEE Std 1609.2 considers all - * operations carried out on received data to be atomic and does not put any - * restrictions on the information that is stored between operations. However, - * it should be noted that because the IEEE 1609.2 approach enables SPDUs to - * be nested within one another as Ieee1609Dot2Data, in principle an - * implementation could be built that iterated through the layers of a nested - * SPDU within a single call from the invoking application instance. (And it - * should also be noted that IEEE Std 1609.2 was consciously designed to - * enable this approach: Although the primitives provided in IEEE Std 1609.2 - * only support the series-of-single-operations approach, an implementation - * could layer this "one-invocation processing" on top of the IEEE 1609.2 - * interface as an optimization.) A "one-invocation processing" implementation - * of that type would have to anticipate situations of coupling between inner - * and outer SPDUs like the one created by this AcaEeCertResponsePrivateSpdu, - * and allow the invoking certificate management service to check consistency - * at the application layer, perhaps by (for example) returning the signing - * certificates for all nested signed SPDUs. How this is to be implemented is - * implementation specific; this note is intended as a notification of this - * potential issue to implementers planning to implement one-invocation - * processing. - */ -AcaEeCertResponsePrivateSpdu ::= Ieee1609Dot2Data-EncryptedSigned { - ScmsPdu-Scoped { - AcaEeInterfacePdu (WITH COMPONENTS { - acaEeCertResponse - }) - }, - SecurityMgmtPsid -} - -/** - * @brief This structure contains a certificate response for consumption by - * the EE. In the architecture of this document, although it is created by - * the ACA, it is made available to the EE via the RA as described in 8.2. - * - * The ACA creates a certificate response in this form when the - * compact unified butterfly key mechanism is being used. If the - * RaAcaCertRequest structure was used to communicate between the RA and the - * ACA, the RA indicated use of compact unified butterfly keys by setting the - * cubk (1) bit in the bkType field in the corresponding RaAcaCertRequest. - * - * The AcaEeCertResponse is encrypted by the ACA using the cocoon - * public key for encryption. See 9.3.4.2 for how the ACA derives the cocoon - * public key for encryption, using the tbsCert.verifyKeyIndicator field in the - * corresponding RaAcaCertRequest as the input cocoon public key for signing - * Bt. See 9.3.4.1 for how the EE derives the corresponding cocoon private - * key for encryption. - */ -AcaEeCertResponseCubkSpdu ::= Ieee1609Dot2Data-Encrypted { - ScmsPdu-Scoped { - AcaEeInterfacePdu (WITH COMPONENTS { - acaEeCertResponse - }) - } -} - ---***************************************************************************-- --- ACA - LA Interface -- ---***************************************************************************-- - ---***************************************************************************-- --- ACA - MA Interface -- ---***************************************************************************-- - ---***************************************************************************-- --- ACA - RA Interface -- ---***************************************************************************-- - -/** - * @brief This structure is the SPDU used to send a signed RaAcaCertRequest. - * For the signature to be valid the signing certificate shall conform to the - * RA certificate profile given in 7.7.3.9, contain a PSID equal to - * SecurityMgmtPsid and a corresponding SSP containing the C-OER encoding of a - * SecurityMgmtSsp indicating RaSsp. The toBeSigned.certRequestPermissions - * field of the RA certificate shall permit the requested permissions in the - * raAcaCertRequest.tbsCert.appPermissions field. - */ -RaAcaCertRequestSpdu ::= Ieee1609Dot2Data-SignedCertRequest { - ScmsPdu-Scoped { - AcaRaInterfacePdu (WITH COMPONENTS { - raAcaCertRequest - }) - }, - SignerSingleCert -} - -/** - * @brief This structure is the SPDU used to send a signed AcaRaCertResponse. - * For the signature to be valid the signing certificate shall contain a PSID - * equal to SecurityMgmtPsid and a corresponding SSP containing the C-OER - * encoding of a SecurityMgmtSsp indicating AcaSsp. - */ -AcaRaCertResponseSpdu ::= Ieee1609Dot2Data-Signed { - ScmsPdu-Scoped { - AcaRaInterfacePdu (WITH COMPONENTS { - acaRaCertResponse - }) - }, - SecurityMgmtPsid -} - ---***************************************************************************-- --- Certificate Management -- ---***************************************************************************-- - -/** - * @brief This structure is the SPDU used to send an unsecured CompositeCrl. - * It is used to create composite CRL files as specified in 8.5. - */ -CompositeCrlSpdu ::= Ieee1609Dot2Data-Unsecured { - ScmsPdu-Scoped { - CertManagementPdu (WITH COMPONENTS { - compositeCrl - }) - } -} - -/** - * @brief This structure is the SPDU used to send an unsecured - * CertificateChain. It is used to create certificate chain files as - * specified in 8.4. - */ -CertificateChainSpdu ::= Ieee1609Dot2Data-Unsecured { - ScmsPdu-Scoped { - CertManagementPdu (WITH COMPONENTS { - certificateChain - }) - } -} - -/** - * @brief This structure is the SPDU used to send an unsecured MultiSignedCtl. - */ -MultiSignedCtlSpdu ::= Ieee1609Dot2Data-Unsecured { - ScmsPdu-Scoped { - CertManagementPdu (WITH COMPONENTS { - multiSignedCtl - }) - } -} - -/** - * @brief This structure is the SPDU used to send a signed - * ToBeSignedCtlSignature. For the signature to be valid, the signing - * certificate shall match the elector certificate profile in 7.7.3.7. This - * means that the signature is calculated as specified in IEEE Std 1609.2, - * with the data input to the hash process consisting of the C-OER encoding - * of the tbsData that includes the ToBeSignedCtlSignature. - */ -CtlSignatureSpdu ::= Ieee1609Dot2Data-Signed { - ScmsPdu-Scoped { - CertManagementPdu (WITH COMPONENTS { - tbsCtlSignature - }) - }, - SecurityMgmtPsid -} - -/** - * @brief This structure is the SPDU used to send a signed - * CertManagementInfoStatus. For the signature to be valid the signing - * certificate shall conform to the RA certificate profile given in 7.7.3.9 or - * the DC certificate profile given in 7.7.3.10. - */ -CertificateManagementInformationStatusSpdu ::= - Ieee1609Dot2Data-Signed { - ScmsPdu-Scoped { - CertManagementPdu (WITH COMPONENTS { - infoStatus - }) - }, - SecurityMgmtPsid -} - - ---***************************************************************************-- --- ECA - EE Interface -- ---***************************************************************************-- - -/** - * @brief This structure is the SPDU used to send a signed EeEcaCertRequest, - * as follows: - * - If eeEcaCertRequest.canonicalId is not present, the EE signs this - * structure using the private key corresponding to the - * tbsCert.verifyKeyIndicator field of the EeEcaCertRequest. - * - If eeEcaCertRequest.canonicalId is present, the EE signs this - * structure using the canonical private key as specified in 4.1.4.2. - */ -EeEcaCertRequestSpdu ::= Ieee1609Dot2Data-SignedCertRequest { - ScmsPdu-Scoped { - EcaEeInterfacePdu (WITH COMPONENTS { - eeEcaCertRequest - }) - }, - SignerSelf -} - -/** - * @brief This structure is the SPDU used to send a signed EcaEeCertResponse. - * For the signature to be valid, the signing certificate shall contain a PSID - * equal to SecurityMgmtPsid and a corresponding SSP containing the C-OER - * encoding of a SecurityMgmtSsp indicating EcaSsp. - */ -EcaEeCertResponseSpdu ::= Ieee1609Dot2Data-Signed { - ScmsPdu-Scoped { - EcaEeInterfacePdu (WITH COMPONENTS { - ecaEeCertResponse - }) - }, - SecurityMgmtPsid -} - ---***************************************************************************-- --- EE - MA Interface -- ---***************************************************************************-- - ---***************************************************************************-- --- EE - RA Interface -- ---***************************************************************************-- - -/** - * @brief This structure is the SPDU used to send a signed then encrypted - * EeRaCertRequest. It is a choice of the IEEE 1609.2 authenticated - * certificate request, which may be any kind of EE-RA certificate request, - * and the ITU-T X.509 certificate request, which is required to be an - * authorization certificate request. - */ -EeRaCertRequestSpdu ::= Ieee1609Dot2Data ( - EeRa1609Dot2AuthenticatedCertRequestSpdu | - EeRaX509AuthenticatedCertRequestSpdu -) - -/** - * @brief This structure is the SPDU used to send a signed then encrypted IEEE - * 1609.2 authenticated certificate request. The EE signs this structure - * using its enrollment certificate. The enrollment certificate shall conform - * to the enrollment certificate profile given in 7.7.3.5. The EE encrypts - * the signed structure using the encryptionKey from the RA's certificate. - */ -EeRa1609Dot2AuthenticatedCertRequestSpdu ::= - Ieee1609Dot2Data-SignedEncryptedCertRequest { - ScmsPdu-Scoped { - EeRaInterfacePdu (WITH COMPONENTS { - eeRaCertRequest - }) - }, - SignerSingleCert -} - -/** - * @brief This structure is the SPDU used to send a signed then encrypted ITU-T - * X.509authenticated certificate request. The EE signs this structure - * using its enrollment certificate. The enrollment certificate shall conform - * to the enrollment certificate profile given in 7.7.3.6. The EE encrypts - * the signed structure using the encryptionKey from the RA's certificate. - */ -EeRaX509AuthenticatedCertRequestSpdu ::= Ieee1609Dot2Data-Encrypted { - Ieee1609Dot2Data-SignedX509AuthenticatedCertRequest { - ScmsPdu-Scoped { - EeRaInterfacePdu (WITH COMPONENTS { - eeRaCertRequest - }) - }, - SignerSingleX509Cert - } -} - -/** - * @brief This structure is the SPDU used to send a signed RaEeCertAck to - * acknowledge the receipt of an EeRaCertRequestSpdu. For the signature to be - * valid the signing certificate shall conform to the RA certificate profile - * given in 7.7.3.9. - */ -RaEeCertAckSpdu ::= Ieee1609Dot2Data-Signed { - ScmsPdu-Scoped { - EeRaInterfacePdu (WITH COMPONENTS { - raEeCertAck - }) - }, - SecurityMgmtPsid -} - -/** - * @brief This structure is the SPDU used to create an unsigned .info file - * to be included in a certificate batch zip file as specified in 8.2. This - * SPDU is used if the RaEeCertInfo does not contain an acpcTreeId field. - */ -RaEeCertInfoSpdu ::= Ieee1609Dot2Data-Unsecured { - ScmsPdu-Scoped { - EeRaInterfacePdu (WITH COMPONENTS { - raEeCertInfo (WITH COMPONENTS { - acpcTreeId ABSENT - }) - }) - } -} - -/** - * @brief This structure is the SPDU used to create a signed .info file to - * be included in a certificate batch zip file as specified in 8.2. This - * SPDU is used if the RaEeCertInfo contains an acpcTreeId field. For the - * signature to be valid the signing certificate shall conform to the RA - * certificate profile given in 7.7.3.9. - */ -RaEeCertAndAcpcInfoSpdu ::= Ieee1609Dot2Data-Signed { - ScmsPdu-Scoped { - EeRaInterfacePdu (WITH COMPONENTS { - raEeCertInfo (WITH COMPONENTS { - acpcTreeId PRESENT - }) - }) - }, - SecurityMgmtPsid -} - -/** - * @brief This structure is the SPDU used to send an unsecured - * EeRaDownloadRequest. - */ -EeRaDownloadRequestPlainSpdu ::= Ieee1609Dot2Data-Unsecured { - ScmsPdu-Scoped { - EeRaInterfacePdu (WITH COMPONENTS { - eeRaDownloadRequest - }) - } -} - -/** - * @brief This structure is the SPDU used to send a signed then encrypted - * EeRaDownloadRequest. The EE signs this structure using its enrollment - * certificate. The enrollment certificate shall conform to the enrollment - * certificate profile given in 7.7.3.5. The EE encrypts the signed - * structure using the encryptionKey from the RA's certificate. - */ -EeRaDownloadRequestSpdu ::= Ieee1609Dot2Data-SignedEncrypted { - ScmsPdu-Scoped { - EeRaInterfacePdu (WITH COMPONENTS { - eeRaDownloadRequest - }) - }, - SecurityMgmtPsid -} - -/** - * @brief This structure is the SPDU used to send a signed then encrypted - * EeEcaCertRequestSpdu. The EE signs this structure using its enrollment - * certificate. The enrollment certificate shall conform to the enrollment - * certificate profile given in 7.7.3.5. The EE encrypts the signed - * structure using the encryptionKey from the RA's certificate. - */ -EeRaSuccessorEnrollmentCertRequestSpdu ::= - Ieee1609Dot2Data-SignedEncryptedCertRequest { - ScmsPdu-Scoped { - EeRaInterfacePdu (WITH COMPONENTS { - eeRaSuccessorEnrollmentCertRequest - }) - }, - SignerSingleCert -} - -/** - * @brief This structure is the SPDU used to send a signed RaEeCertInfo. For - * the signature to be valid the signing certificate shall conform to the RA - * certificate profile given in 7.7.3.9. - */ -RaEeEnrollmentCertAckSpdu ::= Ieee1609Dot2Data-Signed { - ScmsPdu-Scoped { - EeRaInterfacePdu (WITH COMPONENTS { - raEeCertInfo (WITH COMPONENTS { - acpcTreeId ABSENT - }) - }) - }, - SecurityMgmtPsid -} - ---***************************************************************************-- --- LA - MA Interface -- ---***************************************************************************-- - ---***************************************************************************-- --- LA - RA Interface -- ---***************************************************************************-- - ---***************************************************************************-- --- MA - RA Interface -- ---***************************************************************************-- - ---***************************************************************************-- --- Service Specific Permissions -- ---***************************************************************************-- - -/** - * @brief This parent structure defines the SSP for SecurityMgmtPsid and - * encompasses all SSP structures defined in this document. An overview of - * this structure is as follows: - * - * @note The LOP is in the SSP for backward compatibility reasons, - * and in practice, in this design the LOP does not have a certificate. - * - * @param elector: contains the SSP defined for an elector. - * - * @param root: contains the SSP defined for a root CA. - * - * @param pg: contains the SSP defined for a policy generator. - * - * @param ica: contains the SSP defined for an intermediate CA. - * - * @param eca: contains the SSP defined for an enrollment CA. - * - * @param aca: contains the SSP defined for an authorization CA. - * - * @param crl: contains the SSP defined for a CRL signer. - * - * @param dcm: contains the SSP defined for a device configuration manager. - * - * @param la: contains the SSP defined for a linkage authority. - * - * @param lop: contains the SSP defined for a location obscurer proxy. - * - * @param ma: contains the SSP defined for a misbehavior authority. - * - * @param ra: contains the SSP defined for a registration authority. - * - * @param ee: contains the SSP defined for an end entity. - * - * @param dc: contains the SSP defined for a distribution center. - */ -SecurityMgmtSsp ::= CHOICE { - elector ElectorSsp, - root RootCaSsp, - pg PgSsp, - ica IcaSsp, - eca EcaSsp, - aca AcaSsp, - crl CrlSignerSsp, - dcm DcmSsp, - la LaSsp, - lop LopSsp, - ma MaSsp, - ra RaSsp, - ee EeSsp, - ..., - dc DcSsp - } - -TestSecurityMgmtSsp ::= SecurityMgmtSsp - -/** - * @brief This structure defines the SSP for an elector when it is authorizing - * SecurityMgmtPsid messages. It has no parameters other than the version - * number. - */ -ElectorSsp ::= SEQUENCE { - version Uint8 (2), - ... -} - -/** - * @brief This structure defines the SSP for a root CA when it is authorizing - * SecurityMgmtPsid messages. It has no parameters other than the version - * number. - */ -RootCaSsp ::= SEQUENCE { - version Uint8 (2), - ... -} - -/** - * @brief This structure defines the SSP for a policy generator when it is - * authorizing SecurityMgmtPsid messages. It has no parameters other than the - * version number. - */ -PgSsp ::= SEQUENCE { - version Uint8 (2), - ... -} - -/** - * @brief This structure defines the SSP for an intermediate CA when it is - * authorizing SecurityMgmtPsid messages. It has no parameters other than the - * version number. - */ -IcaSsp ::= SEQUENCE { - version Uint8 (2), - ... -} - -/** - * @brief This structure defines the SSP for an enrollment CA when it is - * authorizing SecurityMgmtPsid messages. It has no parameters other than the - * version number. - */ -EcaSsp ::= SEQUENCE { - version Uint8 (2), - ... -} - -/** - * @brief This structure defines the SSP for an authorization CA when it is - * authorizing SecurityMgmtPsid messages. It has no parameters other than the - * version number. - */ -AcaSsp ::= SEQUENCE { - version Uint8 (2), - ... -} - -/** - * @brief This structure defines the SSP for a CRL signer when it is - * authorizing SecurityMgmtPsid messages. It has no parameters other than the - * version number. - * - * @note The SSP for a CRL signer when signing CRLs is associated with - * PSID 0x0100 and is defined in IEEE Std 1609.2. - */ -CrlSignerSsp ::= SEQUENCE { - version Uint8 (2), - ... -} - -/** - * @brief This structure defines the SSP for a device configuration manager - * when it is authorizing SecurityMgmtPsid messages. It has no parameters - * other than the version number. - */ -DcmSsp ::= SEQUENCE { - version Uint8 (2), - ... -} - -/** - * @brief This structure defines the SSP for a linkage authority when it is - * authorizing SecurityMgmtPsid messages. It has no parameters other than the - * version number. - */ -LaSsp ::= SEQUENCE { - version Uint8 (2), - laId Uint16, - ... -} - -/** - * @brief This structure defines the SSP for a location obscurer proxy (LOP) - * when it is authorizing SecurityMgmtPsid messages. It has no parameters - * other than the version number. - * - * @note The LOP is in the SSP for backward compatibility reasons, and - * in practice, in this design the LOP does not have a certificate. - */ -LopSsp ::= SEQUENCE { - version Uint8 (2), - ... -} - -/** - * @brief This structure defines the SSP for a misbehavior authority when it - * is authorizing SecurityMgmtPsid messages. Its parameters - * indicate the PSIDs associated with the misbehavior that is to be reported - * to that MA (see 4.1.5 for further details). The certificate containing - * this SSP is the MA Certificate to which an end entity should encrypt - * misbehavior reports related to the indicated PSIDs. - */ -MaSsp ::= SEQUENCE { - version Uint8 (2), - relevantPsids SequenceOfPsid, - ... -} - -/** - * @brief This structure defines the SSP for an RA when it is authorizing - * SecurityMgmtPsid messages. It has no parameters other than the version - * number. - */ -RaSsp ::= SEQUENCE { - version Uint8 (2), - ... -} - -/** - * @brief This structure defines the SSP for an end entity when it is - * authorizing SecurityMgmtPsid messages. It has no parameters other than the - * version number. - */ -EeSsp ::= SEQUENCE { - version Uint8(2), - ... -} - -/** - * @brief This is a container for ACPC-related SSPs, specifying one SSP for - * each role. The only SSP defined in this document is the CamSsp, used in - * the CAM certificate that signs a SignedAprvBinaryTree or a - * SignedIndividualAprv. The SSP shall be C-OER encoded for inclusion in the - * CAM certificate. New versions of the CAM SSP should be handled by - * extending this structure rather than by use of a version number in the - * CamSsp structure. - * - * The AcpcSsp is associated with the AcpcPsid in the CAM certificate's - * appPermissions field. - */ -AcpcSsp ::= CHOICE { - cam CamSsp, - ... -} - -/** - * @brief This is a list of the ACPC Tree IDs for which the containing CAM - * certificate is entitled to sign a SignedAprvBinaryTree or a - * SignedIndividualAprv. The SSP entitles the certificate holder to sign - * either of these structures. - */ -CamSsp ::= SEQUENCE (SIZE(1..MAX)) OF AcpcTreeId - -/** - * @brief This structure defines the SSP for a distribution center when it is - * authorizing SecurityMgmtPsid messages. It has no parameters other than the - * version number. - */ -DcSsp ::= SEQUENCE { - version Uint8(2), - ... -} - -END +--***************************************************************************-- +-- IEEE Std 1609.2.1 -- +--***************************************************************************-- + +/** + * @note Section references in this file are to clauses in IEEE Std + * 1609.2.1 unless indicated otherwise. Full forms of acronyms and + * abbreviations used in this file are specified in 3.2. + */ + +Ieee1609Dot2Dot1Protocol {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) + extension-standards(255) dot1(1) interfaces(1) protocol(17) + major-version-3(3) minor-version-1(1)} + +DEFINITIONS AUTOMATIC TAGS ::= BEGIN + +EXPORTS ALL; + +IMPORTS + Certificate, + CertificateId, + Ieee1609Dot2Data, + SequenceOfCertificate, + SequenceOfPsidGroupPermissions, + SignerIdentifier, + ToBeSignedCertificate, + VerificationKeyIndicator +FROM Ieee1609Dot2 {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) + dot2(2) base(1) schema(1) major-version-2(2) minor-version-5(5)} +WITH SUCCESSORS + + CrlSeries, + EccP256CurvePoint, + EccP384CurvePoint, + EcdsaP256Signature, + EcdsaP384Signature, + GeographicRegion, + HashAlgorithm, + HashedId3, + Psid, + PublicEncryptionKey, + PublicVerificationKey, + SequenceOfPsid, + SequenceOfPsidSsp, + Signature, + SubjectAssurance, + Uint8, + Uint16, + ValidityPeriod +FROM Ieee1609Dot2BaseTypes {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) + base(1) base-types(2) major-version-2(2) minor-version-3(3)} +WITH SUCCESSORS + + AcaEeInterfacePdu +FROM Ieee1609Dot2Dot1AcaEeInterface {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) + extension-standards(255) dot1(1) interfaces(1) aca-ee(1) major-version-2(2) + minor-version-3(3)} +WITH SUCCESSORS + + AcaLaInterfacePdu +FROM Ieee1609Dot2Dot1AcaLaInterface {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) + extension-standards(255) dot1(1) interfaces(1) aca-la(2) major-version-2(2) + minor-version-1(1)} +WITH SUCCESSORS + + AcaMaInterfacePdu +FROM Ieee1609Dot2Dot1AcaMaInterface {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) + extension-standards(255) dot1(1) interfaces(1) aca-ma(3) major-version-2(2) + minor-version-1(1)} +WITH SUCCESSORS + + AcaRaInterfacePdu +FROM Ieee1609Dot2Dot1AcaRaInterface {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) + extension-standards(255) dot1(1) interfaces(1) aca-ra(4) major-version-3(3) + minor-version-1(1)} +WITH SUCCESSORS + + AcpcTreeId +FROM Ieee1609Dot2Dot1Acpc {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) + extension-standards(255) dot1(1) interfaces(1) acpc(18) major-version-3(3) + minor-version-1(1)} +WITH SUCCESSORS + + CertManagementPdu +FROM Ieee1609Dot2Dot1CertManagement {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) + extension-standards(255) dot1(1) interfaces(1) cert-management(7) + major-version-3(3) minor-version-1(1)} +WITH SUCCESSORS + + EcaEeInterfacePdu +FROM Ieee1609Dot2Dot1EcaEeInterface {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) + extension-standards(255) dot1(1) interfaces(1) eca-ee(9) major-version-3(3) + minor-version-1(1)} +WITH SUCCESSORS + + EeMaInterfacePdu +FROM Ieee1609Dot2Dot1EeMaInterface {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) + extension-standards(255) dot1(1) interfaces(1) ee-ma(10) major-version-2(2) + minor-version-1(1)} +WITH SUCCESSORS + + EeRaInterfacePdu +FROM Ieee1609Dot2Dot1EeRaInterface {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) + extension-standards(255) dot1(1) interfaces(1) ee-ra(11) major-version-3(3) + minor-version-1(1)} +WITH SUCCESSORS + + LaMaInterfacePdu +FROM Ieee1609Dot2Dot1LaMaInterface {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) + extension-standards(255) dot1(1) interfaces(1) la-ma(12) major-version-2(2) + minor-version-1(1)} +WITH SUCCESSORS + + LaRaInterfacePdu +FROM Ieee1609Dot2Dot1LaRaInterface {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) + extension-standards(255) dot1(1) interfaces(1) la-ra(13) major-version-2(2) + minor-version-1(1)} +WITH SUCCESSORS + + MaRaInterfacePdu +FROM Ieee1609Dot2Dot1MaRaInterface {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) + extension-standards(255) dot1(1) interfaces(1) ma-ra(14) major-version-2(2) + minor-version-1(1)} +WITH SUCCESSORS +; + +/** + * @brief This PSID, 0x23, identifies security management activities as + * defined in this document. + */ +SecurityMgmtPsid ::= Psid (35) + +/** + * @brief This is the parent structure that encompasses all parent structures + * of interfaces defined in the SCMS. An overview of this structure is as + * follows: + * - aca-ee contains the interface structures defined for interaction + * between the ACA and the EE. + * - aca-la contains the interface structures defined for interaction + * between the ACA and the LA. + * - aca-ma contains the interface structures defined for interaction + * between the ACA and the MA. + * - aca-ra contains the interface structures defined for interaction + * between the ACA and the RA. + * - cert contains the interface structures defined for certificate + * management. + * - eca-ee contains the interface structures defined for interaction + * between the ECA and the EE. + * - ee-ma contains the interface structures defined for interaction + * between the EE and the MA. + * - ee-ra contains the interface structures defined for interaction + * between the EE and the RA. + * - la-ma contains the interface structures defined for interaction + * between the LA and the MA. + * - la-ra contains the interface structures defined for interaction + * between the LA and the RA. + * - ma-ra contains the interface structures defined for interactions + * between the MA and the RA. + * + * @param version: contains the current version of the structure. + */ +ScmsPdu ::= SEQUENCE { + version Uint8 (2), + content CHOICE { + aca-ee AcaEeInterfacePdu, + aca-la AcaLaInterfacePdu, + aca-ma AcaMaInterfacePdu, + aca-ra AcaRaInterfacePdu, + cert CertManagementPdu, + eca-ee EcaEeInterfacePdu, + ee-ma EeMaInterfacePdu, + ee-ra EeRaInterfacePdu, + la-ma LaMaInterfacePdu, + la-ra LaRaInterfacePdu, + ma-ra MaRaInterfacePdu, + ... + } +} + + +--***************************************************************************-- +-- Parameterized Types -- +--***************************************************************************-- + +/** + * @brief This structure defines a parameterized type for creating a scoped + * data as a subtype of ScmsPdu. + */ +ScmsPdu-Scoped {Pdu} ::= ScmsPdu (WITH COMPONENTS { + ..., + content (CONSTRAINED BY { + Pdu + }) +}) + +/** + * @brief This structure defines a parameterized type for creating an + * unsecured data as a subtype of Ieee1609Dot2Data. + */ +Ieee1609Dot2Data-Unsecured {Tbu} ::= + Ieee1609Dot2Data (WITH COMPONENTS { + content (WITH COMPONENTS { + ..., + unsecuredData (CONTAINING Tbu) + }) +}) + +/** + * @brief This structure defines a parameterized type for creating a signed + * data as a subtype of Ieee1609Dot2Data. + */ +Ieee1609Dot2Data-Signed {Tbs, Psid} ::= + Ieee1609Dot2Data (WITH COMPONENTS { + ..., + content (WITH COMPONENTS { + ..., + signedData (WITH COMPONENTS { + ..., + tbsData (WITH COMPONENTS { + ..., + payload (WITH COMPONENTS { + ..., + data (WITH COMPONENTS { + ..., + content (WITH COMPONENTS { + unsecuredData (CONTAINING Tbs) + }) + }) + }), + headerInfo (WITH COMPONENTS { + ..., + psid (Psid), + generationTime ABSENT, + expiryTime ABSENT, + generationLocation ABSENT, + p2pcdLearningRequest ABSENT, + missingCrlIdentifier ABSENT, + encryptionKey ABSENT + }) + }), + signer (SignerSingleCert) + }) + }) +}) + +/** + * @brief This structure defines a parameterized type for creating an + * encrypted data as a subtype of Ieee1609Dot2Data. An overview of this + * structure is as follows: + * + * @param Tbe: is first encrypted per IEEE 1609.2. Per IEEE 1609.2, this + * includes encapsulating Tbe in an Ieee1609Dot2Data of type unsecured if + * Tbe is not already an Ieee1609Dot2Data. The ciphertext output from the + * encryption of Tbe is used to set the encryptedData.ciphertext field. The + * encryptedData.recipients field is set to reflect the recipients. This + * parameterized type does not provide parameters to set the recipients; that + * information is set directly by the entity that creates an instance of this + * type. + */ +Ieee1609Dot2Data-Encrypted {Tbe} ::= + Ieee1609Dot2Data (WITH COMPONENTS { + ..., + content (WITH COMPONENTS { + encryptedData (CONSTRAINED BY { + --encryption of-- Tbe + }) + }) +}) + +/** + * @brief This structure defines a parameterized type for creating a signed + * certificate request as a subtype of Ieee1609Dot2Data. + */ +Ieee1609Dot2Data-SignedCertRequest {Tbscr, Signer} ::= + Ieee1609Dot2Data (WITH COMPONENTS { + ..., + content (WITH COMPONENTS { + ..., + signedCertificateRequest (CONTAINING + SignedCertificateRequest (WITH COMPONENTS { + ..., + tbsRequest (Tbscr), + signer (Signer) + })) + }) +}) + +/** + * @brief This structure is a wrapper for an ITU-T X.509 certificate. + * + * @note ITU-T X.509 certificates are encoded with the ASN.1 DER + * rather than the OER used in this document and so cannot be "directly" + * imported into these structures. + */ +X509Certificate ::= OCTET STRING + +/** + * @brief This type is used for clarity of definitions. + */ +SequenceOfX509Certificate ::= + SEQUENCE (SIZE(1..MAX)) OF X509Certificate + +/** + * @brief This structure identifies an ITU-T X.509 certificate used to sign a + * signed data structure. The only data structure currently defined that can + * be signed by an ITU-T X.509 certificate is SignedX509CertificateRequest. + */ +X509SignerIdentifier ::= CHOICE { + certificate SequenceOfX509Certificate, + ... +} + +/** + * @brief This structure defines a parameterized type for creating a + * certificate request, signed with an ITU-T X.509 certificate, as a subtype of + * Ieee1609Dot2Data. It makes use of the extension of Ieee1609Dot2Content + * defined in 11.2.3. + */ +Ieee1609Dot2Data-SignedX509AuthenticatedCertRequest {Tbscr, Signer} ::= + Ieee1609Dot2Data (WITH COMPONENTS { + ..., + content (WITH COMPONENTS { + ..., + signedX509CertificateRequest (CONTAINING + SignedX509CertificateRequest (WITH COMPONENTS { + ..., + tbsRequest (Tbscr), + signer (Signer) + })) + }) +}) + +/** + * @brief This structure defines a parameterized type for creating a signed + * then encrypted data as a subtype of Ieee1609Dot2Data. + */ +Ieee1609Dot2Data-SignedEncrypted {Tbse, Psid} ::= + Ieee1609Dot2Data-Encrypted { + Ieee1609Dot2Data-Signed { + Tbse, + Psid + } +} + +/** + * @brief This structure defines a parameterized type for creating an + * encrypted then signed data as a subtype of Ieee1609Dot2Data. + * + * @note This parameterized type inadvertently adds some overhead. + * The Ieee1609Dot2Data-EncryptedSigned {Tbes, Psid} structure, because it + * puts Ieee1609Dot2Data-Encrypted inside Ieee1609Dot2Data-Signed {Tbs, Psid}, + * and because Ieee1609Dot2Data-Signed {Tbs, Psid} puts Tbs inside + * unsecuredData, Tbes is "Signed (Unsecured (Encrypted))" instead of + * "Signed (Encrypted))", which was the intent and also in the original CAMP + * design. Other documents that use this document may be better off defining + * this structure on their own, if they want avoid this overhead. + */ +Ieee1609Dot2Data-EncryptedSigned {Tbes, Psid} ::= + Ieee1609Dot2Data-Signed { + Ieee1609Dot2Data-Encrypted { + Tbes + }, + Psid +} + +/** + * @brief This structure defines a parameterized type for creating a signed + * then encrypted certificate request as a subtype of Ieee1609Dot2Data. + */ +Ieee1609Dot2Data-SignedEncryptedCertRequest {Tbstecr, Signer} ::= + Ieee1609Dot2Data-Encrypted { + Ieee1609Dot2Data-SignedCertRequest { + Tbstecr, + Signer + } +} + +/** + * @brief This structure defines a parameterized type for creating an + * encrypted data as a subtype of Ieee1609Dot2Data. An overview of this + * structure is as follows: + * + * @param Tbe: is first encrypted and the resulting ciphertext is used as + * input to the encryptedData field. + */ +Ieee1609Dot2Data-SymmEncryptedSingleRecipient {Tbe} ::= + Ieee1609Dot2Data (WITH COMPONENTS { + ..., + content (WITH COMPONENTS { + encryptedData (CONSTRAINED BY { + --contains only one RecipientInfo, of form symmRecipinfo + --symmetric encryption of-- Tbe + }) + }) +}) + +--***************************************************************************-- +-- Signer Types -- +--***************************************************************************-- + +/** + * @brief This structure is used to indicate a SignerIdentifier with a + * certificate chain of size 1. + */ +SignerSingleCert ::= SignerIdentifier (WITH COMPONENTS { + certificate (SequenceOfCertificate (SIZE (1))) +}) + +/** + * @brief This structure is used to indicate an X509SignerIdentifier with a + * certificate chain of size 1. + */ +SignerSingleX509Cert ::= X509SignerIdentifier (WITH COMPONENTS { + certificate (SequenceOfX509Certificate (SIZE (1))) +}) + +/** + * @brief This structure is used to indicate a SignerIdentifier of type self. + */ +SignerSelf ::= SignerIdentifier (WITH COMPONENTS { + self +}) + +--***************************************************************************-- +-- Certificate Requests -- +--***************************************************************************-- + + ScmsPdu-RaAcaCertRequest ::= ScmsPdu-Scoped { + AcaRaInterfacePdu (WITH COMPONENTS { + raAcaCertRequest + }) + } + ScmsPdu-EeEcaCertRequest ::= ScmsPdu-Scoped { + EcaEeInterfacePdu (WITH COMPONENTS { + eeEcaCertRequest + }) + } + ScmsPdu-EeRaCertRequest ::= ScmsPdu-Scoped { + EeRaInterfacePdu (WITH COMPONENTS { + eeRaCertRequest + }) + } + ScmsPdu-EeRaSuccessorEnrollmentCertRequest ::= ScmsPdu-Scoped { + EeRaInterfacePdu (WITH COMPONENTS { + eeRaSuccessorEnrollmentCertRequest + }) + } + + +/** + * @brief This structure defines the all certificate request structures as a + * scoped version of the ScmsPdu. + */ +ScopedCertificateRequest ::= ScmsPdu ( + ScmsPdu-RaAcaCertRequest | ScmsPdu-EeEcaCertRequest | + ScmsPdu-EeRaCertRequest | ScmsPdu-EeRaSuccessorEnrollmentCertRequest +) + +/** + * @brief This structure defines the format of a signed certificate request. + * An overview of this structure is as follows: + * + * The signature is generated on the hash of this structure, obtained + * per the rules specified for hashing data objects in 5.3.1 of IEEE Std + * 1609.2a-2017, where the parameter Data Input shall be the C-OER + * encoding of tbsRequest, and the parameter Signer Identifier Input + * depending on whether the request is self-signed or signed using an + * enrollment certificate: + * - If the request is self-signed, the parameter Signer Identifier + * Input shall be the empty string, i.e., a string of length 0. + * - If the request is signed using an enrollment certificate, the + * parameter Signer Identifier Input shall be the signer's enrollment + * certificate. + * + * @param hashAlgorithmId: contains the identifier of the hash algorithm used + * to calculate the hash of tbsRequest. + * + * @param tbsRequest: contains the certificate request information that is + * signed by the recipient. + * + * @param signer: denotes the signing entity's identifier. + * + * @param signature: contains the request sender's signature. + */ +SignedCertificateRequest ::= SEQUENCE { + hashAlgorithmId HashAlgorithm, + tbsRequest ScopedCertificateRequest, + signer SignerIdentifier, + signature Signature +} + +/** + * @brief This structure contains a certificate request signed with an ITU-T + * X.509 certificate. The only type of certificate request signed with an + * ITU-T X.509 certificate supported in this document is an authorization + * certificate request. An overview of this structure is as follows: + * + * The signature is generated on the hash of this structure, obtained + * per the rules specified for hashing data objects in 5.3.1 of IEEE Std + * 1609.2a-2017, where the parameter Data Input shall be the C-OER + * encoding of tbsRequest, and the parameter Signer Identifier Input + * shall be the signer's certificate, that is, the ITU-T X.509 certificate + * contained in the OCTET STRING indicated by the first X509Certificate in + * signer. For example, if the signer is as below, the first 6 bytes are the + * ASN.1 encoding overhead, where 80 01 01 is the overhead for signer, and + * then 82 01 AC is the overhead introduced by the OCTET STRING encoding for + * the first (in this case, the only) X509Certificate; and the first + * X509Certificate is contained in the next 428 bytes (30 82 01 ... 00 00 00), + * so the parameter Signer Identifier Input shall be '30 82 01 ... 00 00 00'. + * + * An example X509SignerIdentifier with one X509Certificate: + * + * 80 01 01 82 01 AC 30 82 01 A8 30 82 01 4D A0 03 02 01 02 02 04 90 + * C5 9D 21 30 0A 06 08 2A 86 48 CE 3D 04 03 02 30 24 31 0A 30 08 06 03 55 04 + * 06 13 01 00 31 0A 30 08 06 03 55 04 0A 13 01 00 31 0A 30 08 06 03 55 04 03 + * 13 01 00 30 1E 17 0D 30 30 30 31 30 31 30 30 30 30 30 30 5A 17 0D 30 30 30 + * 31 30 31 30 30 30 30 30 30 5A 30 24 31 0A 30 08 06 03 55 04 06 13 01 00 31 + * 0A 30 08 06 03 55 04 0A 13 01 00 31 0A 30 08 06 03 55 04 03 13 01 00 30 59 + * 30 13 06 07 2A 86 48 CE 3D 02 01 06 08 2A 86 48 CE 3D 03 01 07 03 42 00 00 + * 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 + * 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 + * 00 00 00 00 00 00 00 00 00 00 00 00 00 00 A3 6D 30 6B 30 0A 06 03 55 1D 0E + * 04 03 04 01 00 30 0A 06 03 55 1D 23 04 03 04 01 00 30 0C 06 03 55 1D 13 01 + * 01 FF 04 02 30 00 30 0E 06 03 55 1D 0F 01 01 FF 04 04 03 02 03 C8 30 0A 06 + * 03 55 1D 25 04 03 04 01 00 30 0A 06 03 55 1D 1F 04 03 04 01 00 30 0F 06 08 + * 2B 06 01 05 05 07 01 01 04 03 04 01 00 30 0A 06 03 55 1D 20 04 03 04 01 00 + * 30 0A 06 08 2A 86 48 CE 3D 04 03 02 03 49 00 00 00 00 00 00 00 00 00 00 00 + * 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 + * 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 + * 00 00 00 00 00 00 00 00 00 00 00 00 + * + * @param hashAlgorithmId: contains the identifier of the hash algorithm used + * inside the binary tree. + * + * @param tbsRequest: contains the certificate request information that is + * signed by the recipient. + * + * @param signer: denotes the signing entity's identifier. + * + * @param signature: contains the request sender's signature. + */ +SignedX509CertificateRequest ::= SEQUENCE { + hashAlgorithmId HashAlgorithm, + tbsRequest ScopedCertificateRequest, + signer X509SignerIdentifier, + signature Signature +} + +--***************************************************************************-- +-- ACA - EE Interface -- +--***************************************************************************-- + +/** + * @brief This structure contains a certificate response for consumption by + * the EE. In the architecture of this document, although it is created by the + * ACA, it is made available to the EE via the RA as described in 8.2. + * + * The ACA creates this response when 1) the compact unified + * butterfly key mechanism is not being used (that is, some other flavor of + * butterfly key is being used, or butterfly keys are not being used) and 2) + * it is not necessary to protect the EE's privacy from the RA, for example, + * when the certificate being returned is not a pseudonym certificate. + */ +AcaEeCertResponsePlainSpdu ::= Ieee1609Dot2Data-Unsecured { + ScmsPdu-Scoped { + AcaEeInterfacePdu (WITH COMPONENTS { + acaEeCertResponse + }) + } +} + +/** + * @brief This structure contains a certificate response for consumption by + * the EE. In the architecture of this document, although it is created by the + * ACA, it is made available to the EE via the RA as described in 8.2. + * + * The ACA creates this response when 1) the compact unified + * butterfly key mechanism is not being used (that is, some other flavor of + * butterfly key is being used, or butterfly keys are not being used) and 2) + * it is necessary to protect the EE's privacy from the RA, for example when + * the certificate being returned is a pseudonym certificate. + * + * The structure consists of a signed SPDU containing an encrypted + * SPDU. + * + * The encrypted SPDU is encrypted with the response + * encryption key that was provided to the ACA for that purpose. This key is + * determined as follows: + * - If the original EeRaCertRequest from the end entity indicated a single + * response encryption key, that is, if the additionalParams.encryptionKey + * field was present in the request, then the response is encrypted with that + * key. + * - If the original EeRaCertRequest from the end entity indicated a + * response encryption key generated with the "original" butterfly key + * mechanism, that is, the additionalParams.original field was provided in the + * request, then the response is encrypted with the cocoon encryption key + * derived from additionalParams.original.encryptionKey and + * additionalParams.original.encryptionExpansion as specified in 9.3.4.2 + * and the corresponding decryption private key is derived as specified in + * 9.3.4.1. + * - If the original EeRaCertRequest from the end entity indicated a + * response encryption key generated with the "unified" butterfly key + * mechanism, that is, the additionalParams.unified field was provided in the + * request, then the response is encrypted with the cocoon encryption key + * derived from tbsCert.verifyKeyIndicator and additionalParams.unified as + * specified in 9.3.4.2 and the corresponding decryption private key is + * derived as specified in 9.3.4.1. + * + * See 9.3 for more material about butterfly keys. + * + * The resulting Ieee1609Dot2Data of content type encryptedData is + * signed by the same ACA certificate that was used to issue the certificate + * field in the AcaEeCertResponse. If this structure is signed by a different + * ACA certificate, it is invalid. The ACA certificate shall follow the ACA + * certificate profile given in 7.7.3.2. + * + * @note: + * - Other potential responses to an authorization certificate + * request: If the original request indicated the use of "compact unified" + * butterfly key mechanism by including the additionalParams.compactUnified + * field, the response shall be a AcaEeCertResponseCubkSpdu, not a + * AcaEeCertResponsePrivateSpdu. + * + * - How the ACA obtains the response encryption key: This + * document provides the RaAcaCertRequest structure to allow the RA to + * indicate whether the original or unified butterfly key mechanism is to be + * used via the flags field. The encryption key for encrypting + * AcaEeCertResponse is calculated by the indicated method even if the RA + * does not use an RaAcaCertRequest as defined in this document to + * communicate the certificate request to the ACA. + * + * - Consistency between inner and outer signers, and the IEEE + * Std 1609.2 model. This SPDU introduces a new type of validity condition + * by requiring that the ACA that signs the outer signed SPDU is also the ACA + * that issued the certificate inside the encrypted SPDU. This requires that + * to verify the inner "SPDU", that is, the certificate, the verifier + * needs to store the information from the outer SPDU. This is not a violation + * of the IEEE 1609.2 model: Subclause 4.2.2.3 of IEEE Std 1609.2 considers all + * operations carried out on received data to be atomic and does not put any + * restrictions on the information that is stored between operations. However, + * it should be noted that because the IEEE 1609.2 approach enables SPDUs to + * be nested within one another as Ieee1609Dot2Data, in principle an + * implementation could be built that iterated through the layers of a nested + * SPDU within a single call from the invoking application instance. (And it + * should also be noted that IEEE Std 1609.2 was consciously designed to + * enable this approach: Although the primitives provided in IEEE Std 1609.2 + * only support the series-of-single-operations approach, an implementation + * could layer this "one-invocation processing" on top of the IEEE 1609.2 + * interface as an optimization.) A "one-invocation processing" implementation + * of that type would have to anticipate situations of coupling between inner + * and outer SPDUs like the one created by this AcaEeCertResponsePrivateSpdu, + * and allow the invoking certificate management service to check consistency + * at the application layer, perhaps by (for example) returning the signing + * certificates for all nested signed SPDUs. How this is to be implemented is + * implementation specific; this note is intended as a notification of this + * potential issue to implementers planning to implement one-invocation + * processing. + */ +AcaEeCertResponsePrivateSpdu ::= Ieee1609Dot2Data-EncryptedSigned { + ScmsPdu-Scoped { + AcaEeInterfacePdu (WITH COMPONENTS { + acaEeCertResponse + }) + }, + SecurityMgmtPsid +} + +/** + * @brief This structure contains a certificate response for consumption by + * the EE. In the architecture of this document, although it is created by + * the ACA, it is made available to the EE via the RA as described in 8.2. + * + * The ACA creates a certificate response in this form when the + * compact unified butterfly key mechanism is being used. If the + * RaAcaCertRequest structure was used to communicate between the RA and the + * ACA, the RA indicated use of compact unified butterfly keys by setting the + * cubk (1) bit in the bkType field in the corresponding RaAcaCertRequest. + * + * The AcaEeCertResponse is encrypted by the ACA using the cocoon + * public key for encryption. See 9.3.4.2 for how the ACA derives the cocoon + * public key for encryption, using the tbsCert.verifyKeyIndicator field in the + * corresponding RaAcaCertRequest as the input cocoon public key for signing + * Bt. See 9.3.4.1 for how the EE derives the corresponding cocoon private + * key for encryption. + */ +AcaEeCertResponseCubkSpdu ::= Ieee1609Dot2Data-Encrypted { + ScmsPdu-Scoped { + AcaEeInterfacePdu (WITH COMPONENTS { + acaEeCertResponse + }) + } +} + +--***************************************************************************-- +-- ACA - LA Interface -- +--***************************************************************************-- + +--***************************************************************************-- +-- ACA - MA Interface -- +--***************************************************************************-- + +--***************************************************************************-- +-- ACA - RA Interface -- +--***************************************************************************-- + +/** + * @brief This structure is the SPDU used to send a signed RaAcaCertRequest. + * For the signature to be valid the signing certificate shall conform to the + * RA certificate profile given in 7.7.3.9, contain a PSID equal to + * SecurityMgmtPsid and a corresponding SSP containing the C-OER encoding of a + * SecurityMgmtSsp indicating RaSsp. The toBeSigned.certRequestPermissions + * field of the RA certificate shall permit the requested permissions in the + * raAcaCertRequest.tbsCert.appPermissions field. + */ +RaAcaCertRequestSpdu ::= Ieee1609Dot2Data-SignedCertRequest { + ScmsPdu-Scoped { + AcaRaInterfacePdu (WITH COMPONENTS { + raAcaCertRequest + }) + }, + SignerSingleCert +} + +/** + * @brief This structure is the SPDU used to send a signed AcaRaCertResponse. + * For the signature to be valid the signing certificate shall contain a PSID + * equal to SecurityMgmtPsid and a corresponding SSP containing the C-OER + * encoding of a SecurityMgmtSsp indicating AcaSsp. + */ +AcaRaCertResponseSpdu ::= Ieee1609Dot2Data-Signed { + ScmsPdu-Scoped { + AcaRaInterfacePdu (WITH COMPONENTS { + acaRaCertResponse + }) + }, + SecurityMgmtPsid +} + +--***************************************************************************-- +-- Certificate Management -- +--***************************************************************************-- + +/** + * @brief This structure is the SPDU used to send an unsecured CompositeCrl. + * It is used to create composite CRL files as specified in 8.5. + */ +CompositeCrlSpdu ::= Ieee1609Dot2Data-Unsecured { + ScmsPdu-Scoped { + CertManagementPdu (WITH COMPONENTS { + compositeCrl + }) + } +} + +/** + * @brief This structure is the SPDU used to send an unsecured + * CertificateChain. It is used to create certificate chain files as + * specified in 8.4. + */ +CertificateChainSpdu ::= Ieee1609Dot2Data-Unsecured { + ScmsPdu-Scoped { + CertManagementPdu (WITH COMPONENTS { + certificateChain + }) + } +} + +/** + * @brief This structure is the SPDU used to send an unsecured MultiSignedCtl. + */ +MultiSignedCtlSpdu ::= Ieee1609Dot2Data-Unsecured { + ScmsPdu-Scoped { + CertManagementPdu (WITH COMPONENTS { + multiSignedCtl + }) + } +} + +/** + * @brief This structure is the SPDU used to send a signed + * ToBeSignedCtlSignature. For the signature to be valid, the signing + * certificate shall match the elector certificate profile in 7.7.3.7. This + * means that the signature is calculated as specified in IEEE Std 1609.2, + * with the data input to the hash process consisting of the C-OER encoding + * of the tbsData that includes the ToBeSignedCtlSignature. + */ +CtlSignatureSpdu ::= Ieee1609Dot2Data-Signed { + ScmsPdu-Scoped { + CertManagementPdu (WITH COMPONENTS { + tbsCtlSignature + }) + }, + SecurityMgmtPsid +} + +/** + * @brief This structure is the SPDU used to send a signed + * CertManagementInfoStatus. For the signature to be valid the signing + * certificate shall conform to the RA certificate profile given in 7.7.3.9 or + * the DC certificate profile given in 7.7.3.10. + */ +CertificateManagementInformationStatusSpdu ::= + Ieee1609Dot2Data-Signed { + ScmsPdu-Scoped { + CertManagementPdu (WITH COMPONENTS { + infoStatus + }) + }, + SecurityMgmtPsid +} + + +--***************************************************************************-- +-- ECA - EE Interface -- +--***************************************************************************-- + +/** + * @brief This structure is the SPDU used to send a signed EeEcaCertRequest, + * as follows: + * - If eeEcaCertRequest.canonicalId is not present, the EE signs this + * structure using the private key corresponding to the + * tbsCert.verifyKeyIndicator field of the EeEcaCertRequest. + * - If eeEcaCertRequest.canonicalId is present, the EE signs this + * structure using the canonical private key as specified in 4.1.4.2. + */ +EeEcaCertRequestSpdu ::= Ieee1609Dot2Data-SignedCertRequest { + ScmsPdu-Scoped { + EcaEeInterfacePdu (WITH COMPONENTS { + eeEcaCertRequest + }) + }, + SignerSelf +} + +/** + * @brief This structure is the SPDU used to send a signed EcaEeCertResponse. + * For the signature to be valid, the signing certificate shall contain a PSID + * equal to SecurityMgmtPsid and a corresponding SSP containing the C-OER + * encoding of a SecurityMgmtSsp indicating EcaSsp. + */ +EcaEeCertResponseSpdu ::= Ieee1609Dot2Data-Signed { + ScmsPdu-Scoped { + EcaEeInterfacePdu (WITH COMPONENTS { + ecaEeCertResponse + }) + }, + SecurityMgmtPsid +} + +--***************************************************************************-- +-- EE - MA Interface -- +--***************************************************************************-- + +--***************************************************************************-- +-- EE - RA Interface -- +--***************************************************************************-- + +/** + * @brief This structure is the SPDU used to send a signed then encrypted + * EeRaCertRequest. It is a choice of the IEEE 1609.2 authenticated + * certificate request, which may be any kind of EE-RA certificate request, + * and the ITU-T X.509 certificate request, which is required to be an + * authorization certificate request. + */ +EeRaCertRequestSpdu ::= Ieee1609Dot2Data ( + EeRa1609Dot2AuthenticatedCertRequestSpdu | + EeRaX509AuthenticatedCertRequestSpdu +) + +/** + * @brief This structure is the SPDU used to send a signed then encrypted IEEE + * 1609.2 authenticated certificate request. The EE signs this structure + * using its enrollment certificate. The enrollment certificate shall conform + * to the enrollment certificate profile given in 7.7.3.5. The EE encrypts + * the signed structure using the encryptionKey from the RA's certificate. + */ +EeRa1609Dot2AuthenticatedCertRequestSpdu ::= + Ieee1609Dot2Data-SignedEncryptedCertRequest { + ScmsPdu-Scoped { + EeRaInterfacePdu (WITH COMPONENTS { + eeRaCertRequest + }) + }, + SignerSingleCert +} + +/** + * @brief This structure is the SPDU used to send a signed then encrypted ITU-T + * X.509authenticated certificate request. The EE signs this structure + * using its enrollment certificate. The enrollment certificate shall conform + * to the enrollment certificate profile given in 7.7.3.6. The EE encrypts + * the signed structure using the encryptionKey from the RA's certificate. + */ +EeRaX509AuthenticatedCertRequestSpdu ::= Ieee1609Dot2Data-Encrypted { + Ieee1609Dot2Data-SignedX509AuthenticatedCertRequest { + ScmsPdu-Scoped { + EeRaInterfacePdu (WITH COMPONENTS { + eeRaCertRequest + }) + }, + SignerSingleX509Cert + } +} + +/** + * @brief This structure is the SPDU used to send a signed RaEeCertAck to + * acknowledge the receipt of an EeRaCertRequestSpdu. For the signature to be + * valid the signing certificate shall conform to the RA certificate profile + * given in 7.7.3.9. + */ +RaEeCertAckSpdu ::= Ieee1609Dot2Data-Signed { + ScmsPdu-Scoped { + EeRaInterfacePdu (WITH COMPONENTS { + raEeCertAck + }) + }, + SecurityMgmtPsid +} + +/** + * @brief This structure is the SPDU used to create an unsigned .info file + * to be included in a certificate batch zip file as specified in 8.2. This + * SPDU is used if the RaEeCertInfo does not contain an acpcTreeId field. + */ +RaEeCertInfoSpdu ::= Ieee1609Dot2Data-Unsecured { + ScmsPdu-Scoped { + EeRaInterfacePdu (WITH COMPONENTS { + raEeCertInfo (WITH COMPONENTS { + acpcTreeId ABSENT + }) + }) + } +} + +/** + * @brief This structure is the SPDU used to create a signed .info file to + * be included in a certificate batch zip file as specified in 8.2. This + * SPDU is used if the RaEeCertInfo contains an acpcTreeId field. For the + * signature to be valid the signing certificate shall conform to the RA + * certificate profile given in 7.7.3.9. + */ +RaEeCertAndAcpcInfoSpdu ::= Ieee1609Dot2Data-Signed { + ScmsPdu-Scoped { + EeRaInterfacePdu (WITH COMPONENTS { + raEeCertInfo (WITH COMPONENTS { + acpcTreeId PRESENT + }) + }) + }, + SecurityMgmtPsid +} + +/** + * @brief This structure is the SPDU used to send an unsecured + * EeRaDownloadRequest. + */ +EeRaDownloadRequestPlainSpdu ::= Ieee1609Dot2Data-Unsecured { + ScmsPdu-Scoped { + EeRaInterfacePdu (WITH COMPONENTS { + eeRaDownloadRequest + }) + } +} + +/** + * @brief This structure is the SPDU used to send a signed then encrypted + * EeRaDownloadRequest. The EE signs this structure using its enrollment + * certificate. The enrollment certificate shall conform to the enrollment + * certificate profile given in 7.7.3.5. The EE encrypts the signed + * structure using the encryptionKey from the RA's certificate. + */ +EeRaDownloadRequestSpdu ::= Ieee1609Dot2Data-SignedEncrypted { + ScmsPdu-Scoped { + EeRaInterfacePdu (WITH COMPONENTS { + eeRaDownloadRequest + }) + }, + SecurityMgmtPsid +} + +/** + * @brief This structure is the SPDU used to send a signed then encrypted + * EeEcaCertRequestSpdu. The EE signs this structure using its enrollment + * certificate. The enrollment certificate shall conform to the enrollment + * certificate profile given in 7.7.3.5. The EE encrypts the signed + * structure using the encryptionKey from the RA's certificate. + */ +EeRaSuccessorEnrollmentCertRequestSpdu ::= + Ieee1609Dot2Data-SignedEncryptedCertRequest { + ScmsPdu-Scoped { + EeRaInterfacePdu (WITH COMPONENTS { + eeRaSuccessorEnrollmentCertRequest + }) + }, + SignerSingleCert +} + +/** + * @brief This structure is the SPDU used to send a signed RaEeCertInfo. For + * the signature to be valid the signing certificate shall conform to the RA + * certificate profile given in 7.7.3.9. + */ +RaEeEnrollmentCertAckSpdu ::= Ieee1609Dot2Data-Signed { + ScmsPdu-Scoped { + EeRaInterfacePdu (WITH COMPONENTS { + raEeCertInfo (WITH COMPONENTS { + acpcTreeId ABSENT + }) + }) + }, + SecurityMgmtPsid +} + +--***************************************************************************-- +-- LA - MA Interface -- +--***************************************************************************-- + +--***************************************************************************-- +-- LA - RA Interface -- +--***************************************************************************-- + +--***************************************************************************-- +-- MA - RA Interface -- +--***************************************************************************-- + +--***************************************************************************-- +-- Service Specific Permissions -- +--***************************************************************************-- + +/** + * @brief This parent structure defines the SSP for SecurityMgmtPsid and + * encompasses all SSP structures defined in this document. An overview of + * this structure is as follows: + * + * @note The LOP is in the SSP for backward compatibility reasons, + * and in practice, in this design the LOP does not have a certificate. + * + * @param elector: contains the SSP defined for an elector. + * + * @param root: contains the SSP defined for a root CA. + * + * @param pg: contains the SSP defined for a policy generator. + * + * @param ica: contains the SSP defined for an intermediate CA. + * + * @param eca: contains the SSP defined for an enrollment CA. + * + * @param aca: contains the SSP defined for an authorization CA. + * + * @param crl: contains the SSP defined for a CRL signer. + * + * @param dcm: contains the SSP defined for a device configuration manager. + * + * @param la: contains the SSP defined for a linkage authority. + * + * @param lop: contains the SSP defined for a location obscurer proxy. + * + * @param ma: contains the SSP defined for a misbehavior authority. + * + * @param ra: contains the SSP defined for a registration authority. + * + * @param ee: contains the SSP defined for an end entity. + * + * @param dc: contains the SSP defined for a distribution center. + */ +SecurityMgmtSsp ::= CHOICE { + elector ElectorSsp, + root RootCaSsp, + pg PgSsp, + ica IcaSsp, + eca EcaSsp, + aca AcaSsp, + crl CrlSignerSsp, + dcm DcmSsp, + la LaSsp, + lop LopSsp, + ma MaSsp, + ra RaSsp, + ee EeSsp, + ..., + dc DcSsp + } + +TestSecurityMgmtSsp ::= SecurityMgmtSsp + +/** + * @brief This structure defines the SSP for an elector when it is authorizing + * SecurityMgmtPsid messages. It has no parameters other than the version + * number. + */ +ElectorSsp ::= SEQUENCE { + version Uint8 (2), + ... +} + +/** + * @brief This structure defines the SSP for a root CA when it is authorizing + * SecurityMgmtPsid messages. It has no parameters other than the version + * number. + */ +RootCaSsp ::= SEQUENCE { + version Uint8 (2), + ... +} + +/** + * @brief This structure defines the SSP for a policy generator when it is + * authorizing SecurityMgmtPsid messages. It has no parameters other than the + * version number. + */ +PgSsp ::= SEQUENCE { + version Uint8 (2), + ... +} + +/** + * @brief This structure defines the SSP for an intermediate CA when it is + * authorizing SecurityMgmtPsid messages. It has no parameters other than the + * version number. + */ +IcaSsp ::= SEQUENCE { + version Uint8 (2), + ... +} + +/** + * @brief This structure defines the SSP for an enrollment CA when it is + * authorizing SecurityMgmtPsid messages. It has no parameters other than the + * version number. + */ +EcaSsp ::= SEQUENCE { + version Uint8 (2), + ... +} + +/** + * @brief This structure defines the SSP for an authorization CA when it is + * authorizing SecurityMgmtPsid messages. It has no parameters other than the + * version number. + */ +AcaSsp ::= SEQUENCE { + version Uint8 (2), + ... +} + +/** + * @brief This structure defines the SSP for a CRL signer when it is + * authorizing SecurityMgmtPsid messages. It has no parameters other than the + * version number. + * + * @note The SSP for a CRL signer when signing CRLs is associated with + * PSID 0x0100 and is defined in IEEE Std 1609.2. + */ +CrlSignerSsp ::= SEQUENCE { + version Uint8 (2), + ... +} + +/** + * @brief This structure defines the SSP for a device configuration manager + * when it is authorizing SecurityMgmtPsid messages. It has no parameters + * other than the version number. + */ +DcmSsp ::= SEQUENCE { + version Uint8 (2), + ... +} + +/** + * @brief This structure defines the SSP for a linkage authority when it is + * authorizing SecurityMgmtPsid messages. It has no parameters other than the + * version number. + */ +LaSsp ::= SEQUENCE { + version Uint8 (2), + laId Uint16, + ... +} + +/** + * @brief This structure defines the SSP for a location obscurer proxy (LOP) + * when it is authorizing SecurityMgmtPsid messages. It has no parameters + * other than the version number. + * + * @note The LOP is in the SSP for backward compatibility reasons, and + * in practice, in this design the LOP does not have a certificate. + */ +LopSsp ::= SEQUENCE { + version Uint8 (2), + ... +} + +/** + * @brief This structure defines the SSP for a misbehavior authority when it + * is authorizing SecurityMgmtPsid messages. Its parameters + * indicate the PSIDs associated with the misbehavior that is to be reported + * to that MA (see 4.1.5 for further details). The certificate containing + * this SSP is the MA Certificate to which an end entity should encrypt + * misbehavior reports related to the indicated PSIDs. + */ +MaSsp ::= SEQUENCE { + version Uint8 (2), + relevantPsids SequenceOfPsid, + ... +} + +/** + * @brief This structure defines the SSP for an RA when it is authorizing + * SecurityMgmtPsid messages. It has no parameters other than the version + * number. + */ +RaSsp ::= SEQUENCE { + version Uint8 (2), + ... +} + +/** + * @brief This structure defines the SSP for an end entity when it is + * authorizing SecurityMgmtPsid messages. It has no parameters other than the + * version number. + */ +EeSsp ::= SEQUENCE { + version Uint8(2), + ... +} + +/** + * @brief This is a container for ACPC-related SSPs, specifying one SSP for + * each role. The only SSP defined in this document is the CamSsp, used in + * the CAM certificate that signs a SignedAprvBinaryTree or a + * SignedIndividualAprv. The SSP shall be C-OER encoded for inclusion in the + * CAM certificate. New versions of the CAM SSP should be handled by + * extending this structure rather than by use of a version number in the + * CamSsp structure. + * + * The AcpcSsp is associated with the AcpcPsid in the CAM certificate's + * appPermissions field. + */ +AcpcSsp ::= CHOICE { + cam CamSsp, + ... +} + +/** + * @brief This is a list of the ACPC Tree IDs for which the containing CAM + * certificate is entitled to sign a SignedAprvBinaryTree or a + * SignedIndividualAprv. The SSP entitles the certificate holder to sign + * either of these structures. + */ +CamSsp ::= SEQUENCE (SIZE(1..MAX)) OF AcpcTreeId + +/** + * @brief This structure defines the SSP for a distribution center when it is + * authorizing SecurityMgmtPsid messages. It has no parameters other than the + * version number. + */ +DcSsp ::= SEQUENCE { + version Uint8(2), + ... +} + +END diff --git a/certgen/asncodec/asn1/ieee1609.2/Ieee1609Dot2.asn b/certgen/asncodec/asn1/ieee1609.2/Ieee1609Dot2.asn index d12cd951a2e08af0fffa75034243ac4598df4580..4e266462cd17dcb9c209b506b010b032f32745b5 100644 --- a/certgen/asncodec/asn1/ieee1609.2/Ieee1609Dot2.asn +++ b/certgen/asncodec/asn1/ieee1609.2/Ieee1609Dot2.asn @@ -1,1471 +1,1471 @@ ---***************************************************************************-- --- IEEE Std 1609.2 -- ---***************************************************************************-- - -/** - * @note Section references in this file are to clauses in IEEE Std - * 1609.2 unless indicated otherwise. Full forms of acronyms and - * abbreviations used in this file are specified in 3.2. - */ - -Ieee1609Dot2 {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) - dot2(2) base(1) schema(1) major-version-2(2) minor-version-6(6)} - -DEFINITIONS AUTOMATIC TAGS ::= BEGIN - -IMPORTS - CERT-EXT-TYPE, - CrlSeries, - EccP256CurvePoint, - EcencP256EncryptedKey, - EciesP256EncryptedKey, - EncryptionKey, - EXT-TYPE, - Extension, - ExtId, - GeographicRegion, - GroupLinkageValue, - HashAlgorithm, - HashedId3, - HashedId8, - HashedId32, - HashedId48, - Hostname, - IValue, - LinkageValue, - Opaque, - Psid, - PsidSsp, - PsidSspRange, - PublicEncryptionKey, - PublicVerificationKey, - SequenceOfHashedId3, - SequenceOfPsidSsp, - SequenceOfPsidSspRange, - ServiceSpecificPermissions, - Signature, - SubjectAssurance, - SymmetricEncryptionKey, - ThreeDLocation, - Time64, - Uint3, - Uint8, - Uint16, - Uint32, - ValidityPeriod -FROM Ieee1609Dot2BaseTypes {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) - base(1) base-types(2) major-version-2(2) minor-version-4(4)} -WITH SUCCESSORS - - EtsiOriginatingHeaderInfoExtension -FROM EtsiTs103097ExtensionModule {itu-t(0) identified-organization(4) etsi(0) - itsDomain(5) wg5(5) secHeaders(103097) extension(2) major-version-1(1) - minor-version-0(0)} -WITH SUCCESSORS -; - ---***************************************************************************-- --- Secured Data -- ---***************************************************************************-- - -/** - * @brief This data type is used to contain the other data types in this - * clause. The fields in the Ieee1609Dot2Data have the following meanings: - * - * @param protocolVersion: contains the current version of the protocol. The - * version specified in this standard is version 3, represented by the - * integer 3. There are no major or minor version numbers. - * - * @param content: contains the content in the form of an Ieee1609Dot2Content. - * - * @note Canonicalization: This data structure is subject to canonicalization - * for the relevant operations specified in 6.1.2. The canonicalization - * applies to the Ieee1609Dot2Content. - */ -Ieee1609Dot2Data ::= SEQUENCE { - protocolVersion Uint8(3), - content Ieee1609Dot2Content -} - -/** - * @brief In this structure: - * - * @param unsecuredData: indicates that the content is an OCTET STRING to be - * consumed outside the SDS. - * - * @param signedData: indicates that the content has been signed according to - * this standard. - * - * @param encryptedData: indicates that the content has been encrypted - * according to this standard. - * - * @param signedCertificateRequest: indicates that the content is a - * certificate request signed by an IEEE 1609.2 certificate or self-signed. - * - * @param signedX509CertificateRequest: indicates that the content is a - * certificate request signed by an ITU-T X.509 certificate. - * - * @note Canonicalization: This data structure is subject to canonicalization - * for the relevant operations specified in 6.1.2 if it is of type signedData. - * The canonicalization applies to the SignedData. - */ -Ieee1609Dot2Content ::= CHOICE { - unsecuredData Opaque, - signedData SignedData, - encryptedData EncryptedData, - signedCertificateRequest Opaque, - ..., - signedX509CertificateRequest Opaque -} - -/** - * @brief In this structure: - * - * @param hashId: indicates the hash algorithm to be used to generate the hash - * of the message for signing and verification. - * - * @param tbsData: contains the data that is hashed as input to the signature. - * - * @param signer: determines the keying material and hash algorithm used to - * sign the data. - * - * @param signature: contains the digital signature itself, calculated as - * specified in 5.3.1. - * - If signer indicates the choice self, then the signature calculation - * is parameterized as follows: - * - Data input is equal to the COER encoding of the tbsData field - * canonicalized according to the encoding considerations given in 6.3.6. - * - Verification type is equal to self. - * - Signer identifier input is equal to the empty string. - * - If signer indicates certificate or digest, then the signature - * calculation is parameterized as follows: - * - Data input is equal to the COER encoding of the tbsData field - * canonicalized according to the encoding considerations given in 6.3.6. - * - Verification type is equal to certificate. - * - Signer identifier input equal to the COER-encoding of the - * Certificate that is to be used to verify the SPDU, canonicalized according - * to the encoding considerations given in 6.4.3. - * - * @note Canonicalization: This data structure is subject to canonicalization - * for the relevant operations specified in 6.1.2. The canonicalization - * applies to the ToBeSignedData and the Signature. - */ -SignedData ::= SEQUENCE { - hashId HashAlgorithm, - tbsData ToBeSignedData, - signer SignerIdentifier, - signature Signature -} - -/** - * @brief This structure contains the data to be hashed when generating or - * verifying a signature. See 6.3.4 for the specification of the input to the - * hash. - * - * @param payload: contains data that is provided by the entity that invokes - * the SDS. - * - * @param headerInfo: contains additional data that is inserted by the SDS. - * This structure is used as follows to determine the "data input" to the - * hash operation for signing or verification as specified in 5.3.1.2.2 or - * 5.3.1.3. - * - If payload does not contain the field omitted, the data input to the - * hash operation is the COER encoding of the ToBeSignedData. - * - If payload field in this ToBeSignedData instance contains the field - * omitted, the data input to the hash operation is the COER encoding of the - * ToBeSignedData, concatenated with the hash of the omitted payload. The hash - * of the omitted payload is calculated with the same hash algorithm that is - * used to calculate the hash of the data input for signing or verification. - * The data input to the hash operation is simply the COER enocding of the - * ToBeSignedData, concatenated with the hash of the omitted payload: there is - * no additional wrapping or length indication. As noted in 5.2.4.3.4, the - * means by which the signer and verifier establish the contents of the - * omitted payload are out of scope for this standard. - * - * @note Canonicalization: This data structure is subject to canonicalization - * for the relevant operations specified in 6.1.2. The canonicalization - * applies to the SignedDataPayload if it is of type data, and to the - * HeaderInfo. - */ -ToBeSignedData ::= SEQUENCE { - payload SignedDataPayload, - headerInfo HeaderInfo -} - -/** - * @brief This structure contains the data payload of a ToBeSignedData. This - * structure contains at least one of the optional elements, and may contain - * more than one. See 5.2.4.3.4 for more details. - * The security profile in Annex C allows an implementation of this standard - * to state which forms of Signed¬Data¬Payload are supported by that - * implementation, and also how the signer and verifier are intended to obtain - * the external data for hashing. The specification of an SDEE that uses - * external data is expected to be explicit and unambiguous about how this - * data is obtained and how it is formatted prior to processing by the hash - * function. - * - * @param data: contains data that is explicitly transported within the - * structure. - * - * @param extDataHash: contains the hash of data that is not explicitly - * transported within the structure, and which the creator of the structure - * wishes to cryptographically bind to the signature. - * - * @param omitted: indicates that there is external data to be included in the - * hash calculation for the signature.The mechanism for including the external - * data in the hash calculation is specified in 6.3.6. - * - * @note Canonicalization: This data structure is subject to canonicalization - * for the relevant operations specified in 6.1.2. The canonicalization - * applies to the Ieee1609Dot2Data. - */ -SignedDataPayload ::= SEQUENCE { - data Ieee1609Dot2Data OPTIONAL, - extDataHash HashedData OPTIONAL, - ..., - omitted NULL OPTIONAL -} (WITH COMPONENTS {..., data PRESENT} | - WITH COMPONENTS {..., extDataHash PRESENT} | - WITH COMPONENTS {..., omitted PRESENT}) - - -/** - * @brief This structure contains the hash of some data with a specified hash - * algorithm. See 5.3.3 for specification of the permitted hash algorithms. - * - * @param sha256HashedData: indicates data hashed with SHA-256. - * - * @param sha384HashedData: indicates data hashed with SHA-384. - * - * @param sm3HashedData: indicates data hashed with SM3. - * - * @note Critical information fields: If present, this is a critical - * information field as defined in 5.2.6. An implementation that does not - * recognize the indicated CHOICE for this type when verifying a signed SPDU - * shall indicate that the signed SPDU is invalid in the sense of 4.2.2.3.2, - * that is, it is invalid in the sense that its validity cannot be established. - */ -HashedData::= CHOICE { - sha256HashedData HashedId32, - ..., - sha384HashedData HashedId48, - sm3HashedData HashedId32 -} - -/** - * @brief This structure contains information that is used to establish - * validity by the criteria of 5.2. - * - * @param psid: indicates the application area with which the sender is - * claiming the payload is to be associated. - * - * @param generationTime: indicates the time at which the structure was - * generated. See 5.2.5.2.2 and 5.2.5.2.3 for discussion of the use of this - * field. - * - * @param expiryTime: if present, contains the time after which the data - * is no longer considered relevant. If both generationTime and - * expiryTime are present, the signed SPDU is invalid if generationTime is - * not strictly earlier than expiryTime. - * - * @param generationLocation: if present, contains the location at which the - * signature was generated. - * - * @param p2pcdLearningRequest: if present, is used by the SDS to request - * certificates for which it has seen identifiers and does not know the - * entire certificate. A specification of this peer-to-peer certificate - * distribution (P2PCD) mechanism is given in Clause 8. This field is used - * for the separate-certificate-pdu flavor of P2PCD and shall only be present - * if inlineP2pcdRequest is not present. The HashedId3 is calculated with the - * whole-certificate hash algorithm, determined as described in 6.4.3, - * applied to the COER-encoded certificate, canonicalized as defined in the - * definition of Certificate. - * - * @param missingCrlIdentifier: if present, is used by the SDS to request - * CRLs which it knows to have been issued and have not received. This is - * provided for future use and the associated mechanism is not defined in - * this version of this standard. - * - * @param encryptionKey: if present, is used to provide a key that is to - * be used to encrypt at least one response to this SPDU. The SDEE - * specification is expected to specify which response SPDUs are to be - * encrypted with this key. One possible use of this key to encrypt a - * response is specified in 6.3.35, 6.3.37, and 6.3.34. An encryptionKey - * field of type symmetric should only be used if the SignedData containing - * this field is securely encrypted by some means. - * - * @param inlineP2pcdRequest: if present, is used by the SDS to request - * unknown certificates per the inline peer-to-peer certificate distribution - * mechanism is given in Clause 8. This field shall only be present if - * p2pcdLearningRequest is not present. The HashedId3 is calculated with the - * whole-certificate hash algorithm, determined as described in 6.4.3, applied - * to the COER-encoded certificate, canonicalized as defined in the definition - * of Certificate. - * - * @param requestedCertificate: if present, is used by the SDS to provide - * certificates per the "inline" version of the peer-to-peer certificate - * distribution mechanism given in Clause 8. - * - * @param pduFunctionalType: if present, is used to indicate that the SPDU is - * to be consumed by a process other than an application process as defined - * in ISO 21177 [B14a]. See 6.3.23b for more details. - * - * @param contributedExtensions: if present, is used to contain additional - * extensions defined using the ContributedExtensionBlocks structure. - * - * @note Canonicalization: This data structure is subject to canonicalization - * for the relevant operations specified in 6.1.2. The canonicalization - * applies to the EncryptionKey. If encryptionKey is present, and indicates - * the choice public, and contains a BasePublicEncryptionKey that is an - * elliptic curve point (i.e., of type EccP256CurvePoint or - * EccP384CurvePoint), then the elliptic curve point is encoded in compressed - * form, i.e., such that the choice indicated within the Ecc*CurvePoint is - * compressed-y-0 or compressed-y-1. - * The canonicalization does not apply to any fields after the extension - * marker, including any fields in contributedExtensions. - */ -HeaderInfo ::= SEQUENCE { - psid Psid, - generationTime Time64 OPTIONAL, - expiryTime Time64 OPTIONAL, - generationLocation ThreeDLocation OPTIONAL, - p2pcdLearningRequest HashedId3 OPTIONAL, - missingCrlIdentifier MissingCrlIdentifier OPTIONAL, - encryptionKey EncryptionKey OPTIONAL, - ..., - inlineP2pcdRequest SequenceOfHashedId3 OPTIONAL, - requestedCertificate Certificate OPTIONAL, - pduFunctionalType PduFunctionalType OPTIONAL, - contributedExtensions ContributedExtensionBlocks OPTIONAL -} - -/** - * @brief This structure may be used to request a CRL that the SSME knows to - * have been issued and has not yet received. It is provided for future use - * and its use is not defined in this version of this standard. - * - * @param cracaId: is the HashedId3 of the CRACA, as defined in 5.1.3. The - * HashedId3 is calculated with the whole-certificate hash algorithm, - * determined as described in 6.4.3, applied to the COER-encoded certificate, - * canonicalized as defined in the definition of Certificate. - * - * @param crlSeries: is the requested CRL Series value. See 5.1.3 for more - * information. - */ -MissingCrlIdentifier ::= SEQUENCE { - cracaId HashedId3, - crlSeries CrlSeries, - ... -} - -/** - * @brief This data structure identifies the functional entity that is - * intended to consume an SPDU, for the case where that functional entity is - * not an application process, and are instead security support services for an - * application process. Further details and the intended use of this field are - * defined in ISO 21177 [B20]. - * - * @param tlsHandshake: indicates that the Signed SPDU is not to be directly - * consumed as an application PDU and is to be used to provide information - * about the holder’s permissions to a Transport Layer Security (TLS) - * (IETF 5246 [B15], IETF 8446 [B16]) handshake process operating to secure - * communications to an application process. See IETF [B15] and ISO 21177 - * [B20] for further information. - * - * @param iso21177ExtendedAuth: indicates that the Signed SPDU is not to be - * directly consumed as an application PDU and is to be used to provide - * additional information about the holder’s permissions to the ISO 21177 - * Security Subsystem for an application process. See ISO 21177 [B20] for - * further information. - * - * @param iso21177SessionExtension: indicates that the Signed SPDU is not to - * be directly consumed as an application PDU and is to be used to extend an - * existing ISO 21177 secure session. This enables a secure session to - * persist beyond the lifetime of the certificates used to establish that - * session. - */ -PduFunctionalType ::= INTEGER (0..255) - -tlsHandshake PduFunctionalType ::= 1 -iso21177ExtendedAuth PduFunctionalType ::= 2 -iso21177SessionExtension PduFunctionalType ::= 3 - - -/** - * @brief This type is used for clarity of definitions. - */ -ContributedExtensionBlocks ::= SEQUENCE (SIZE(1..MAX)) OF - ContributedExtensionBlock - -/** - * @brief This data structure defines the format of an extension block - * provided by an identified contributor by using the temnplate provided - * in the class IEEE1609DOT2-HEADERINFO-CONTRIBUTED-EXTENSION constraint - * to the objects in the set Ieee1609Dot2HeaderInfoContributedExtensions. - * - * @param contributorId: uniquely identifies the contributor. - * - * @param extns: contains a list of extensions from that contributor. - * Extensions are expected and not required to follow the format specified - * in 6.5. - */ -ContributedExtensionBlock ::= SEQUENCE { - contributorId IEEE1609DOT2-HEADERINFO-CONTRIBUTED-EXTENSION.&id({ - Ieee1609Dot2HeaderInfoContributedExtensions - }), - extns SEQUENCE (SIZE(1..MAX)) OF - IEEE1609DOT2-HEADERINFO-CONTRIBUTED-EXTENSION.&Extn({ - Ieee1609Dot2HeaderInfoContributedExtensions - }{@.contributorId}) -} - -/** - * @brief This Information Object Class defines the class that provides a - * template for defining extension blocks. - */ -IEEE1609DOT2-HEADERINFO-CONTRIBUTED-EXTENSION ::= CLASS { - &id HeaderInfoContributorId UNIQUE, - &Extn -} WITH SYNTAX {&Extn IDENTIFIED BY &id} - -/** - * @brief This structure is an ASN.1 Information Object Set listing the - * defined contributed extension types and the associated - * HeaderInfoContributorId values. In this version of this standard two - * extension types are defined: Ieee1609ContributedHeaderInfoExtension and - * EtsiOriginatingHeaderInfoExtension. - */ -Ieee1609Dot2HeaderInfoContributedExtensions - IEEE1609DOT2-HEADERINFO-CONTRIBUTED-EXTENSION ::= { - {Ieee1609ContributedHeaderInfoExtension IDENTIFIED BY - ieee1609HeaderInfoContributorId} | - {EtsiOriginatingHeaderInfoExtension IDENTIFIED BY - etsiHeaderInfoContributorId}, - ... -} - -/** - * @brief This is an integer used to identify a HeaderInfo extension - * contributing organization. In this version of this standard two values are - * defined: - * - ieee1609OriginatingExtensionId indicating extensions originating with - * IEEE 1609. - * - etsiOriginatingExtensionId indicating extensions originating with - * ETSI TC ITS. - */ -HeaderInfoContributorId ::= INTEGER (0..255) - -ieee1609HeaderInfoContributorId HeaderInfoContributorId ::= 1 -etsiHeaderInfoContributorId HeaderInfoContributorId ::= 2 - - -/** - * @brief This structure allows the recipient of data to determine which - * keying material to use to authenticate the data. It also indicates the - * verification type to be used to generate the hash for verification, as - * specified in 5.3.1. - * - * @param digest: If the choice indicated is digest: - * - The structure contains the HashedId8 of the relevant certificate. The - * HashedId8 is calculated with the whole-certificate hash algorithm, - * determined as described in 6.4.3. - * - The verification type is certificate and the certificate data - * passed to the hash function as specified in 5.3.1 is the authorization - * certificate. - * - * @param certificate: If the choice indicated is certificate: - * - The structure contains one or more Certificate structures, in order - * such that the first certificate is the authorization certificate and each - * subsequent certificate is the issuer of the one before it. - * - The verification type is certificate and the certificate data - * passed to the hash function as specified in 5.3.1 is the authorization - * certificate. - * - * @param self: If the choice indicated is self: - * - The structure does not contain any data beyond the indication that - * the choice value is self. - * - The verification type is self-signed. - * - * @note Critical information fields: - * - If present, this is a critical information field as defined in 5.2.6. - * An implementation that does not recognize the CHOICE value for this type - * when verifying a signed SPDU shall indicate that the signed SPDU is invalid. - * - If present, certificate is a critical information field as defined in - * 5.2.6. An implementation that does not support the number of certificates - * in certificate when verifying a signed SPDU shall indicate that the signed - * SPDU is invalid. A compliant implementation shall support certificate - * fields containing at least one certificate. - * - * @note Canonicalization: This data structure is subject to canonicalization - * for the relevant operations specified in 6.1.2. The canonicalization - * applies to every Certificate in the certificate field. - */ -SignerIdentifier ::= CHOICE { - digest HashedId8, - certificate SequenceOfCertificate, - self NULL, - ... -} - -/** - * @brief This data structure is used to perform a countersignature over an - * already-signed SPDU. This is the profile of an Ieee1609Dot2Data containing - * a signedData. The tbsData within content is composed of a payload - * containing the hash (extDataHash) of the externally generated, pre-signed - * SPDU over which the countersignature is performed. - */ -Countersignature ::= Ieee1609Dot2Data (WITH COMPONENTS {..., - content (WITH COMPONENTS {..., - signedData (WITH COMPONENTS {..., - tbsData (WITH COMPONENTS {..., - payload (WITH COMPONENTS {..., - data ABSENT, - extDataHash PRESENT - }), - headerInfo(WITH COMPONENTS {..., - generationTime PRESENT, - expiryTime ABSENT, - generationLocation ABSENT, - p2pcdLearningRequest ABSENT, - missingCrlIdentifier ABSENT, - encryptionKey ABSENT - }) - }) - }) - }) -}) - - ---***************************************************************************-- --- Encrypted Data -- ---***************************************************************************-- - -/** - * @brief This data structure encodes data that has been encrypted to one or - * more recipients using the recipients’ public or symmetric keys as - * specified in 5.3.4. - * - * @param recipients: contains one or more RecipientInfos. These entries may - * be more than one RecipientInfo, and more than one type of RecipientInfo, - * as long as all entries are indicating or containing the same data encryption - * key. - * - * @param ciphertext: contains the encrypted data. This is the encryption of - * an encoded Ieee1609Dot2Data structure as specified in 5.3.4.2. - * - * @note Critical information fields: - * - If present, recipients is a critical information field as defined in - * 5.2.6. An implementation that does not support the number of RecipientInfo - * in recipients when decrypted shall indicate that the encrypted SPDU could - * not be decrypted due to unsupported critical information fields. A - * compliant implementation shall support recipients fields containing at - * least eight entries. - * - * @note If the plaintext is raw data, i.e., it has not been output from a - * previous operation of the SDS, then it is trivial to encapsulate it in an - * Ieee1609Dot2Data of type unsecuredData as noted in 4.2.2.2.2. For example, - * '03 80 08 01 23 45 67 89 AB CD EF' is the C-OER encoding of '01 23 45 67 - * 89 AB CD EF' encapsulated in an Ieee1609Dot2Data of type unsecuredData. - * The first byte of the encoding 03 is the protocolVersion, the second byte - * 80 indicates the choice unsecuredData, and the third byte 08 is the length - * of the raw data '01 23 45 67 89 AB CD EF'. - */ -EncryptedData ::= SEQUENCE { - recipients SequenceOfRecipientInfo, - ciphertext SymmetricCiphertext -} - -/** - * @brief This data structure is used to transfer the data encryption key to - * an individual recipient of an EncryptedData. The option pskRecipInfo is - * selected if the EncryptedData was encrypted using the static encryption - * key approach specified in 5.3.4. The other options are selected if the - * EncryptedData was encrypted using the ephemeral encryption key approach - * specified in 5.3.4. The meanings of the choices are: - * - * See Annex C.7 for guidance on when it may be appropriate to use - * each of these approaches. - * - * @param pskRecipInfo: The data was encrypted directly using a pre-shared - * symmetric key. - * - * @param symmRecipInfo: The data was encrypted with a data encryption key, - * and the data encryption key was encrypted using a symmetric key. - * - * @param certRecipInfo: The data was encrypted with a data encryption key, - * the data encryption key was encrypted using a public key encryption scheme, - * where the public encryption key was obtained from a certificate. In this - * case, the parameter P1 to ECIES as defined in 5.3.5 is the hash of the - * certificate, calculated with the whole-certificate hash algorithm, - * determined as described in 6.4.3, applied to the COER-encoded certificate, - * canonicalized as defined in the definition of Certificate. - * - * @note If the encryption algorithm is SM2, there is no equivalent of the - * parameter P1 and so no input to the encryption process that uses the hash - * of the certificate. - * - * @param signedDataRecipInfo: The data was encrypted with a data encryption - * key, the data encryption key was encrypted using a public key encryption - * scheme, where the public encryption key was obtained as the public response - * encryption key from a SignedData. In this case, if ECIES is the encryption - * algorithm, then the parameter P1 to ECIES as defined in 5.3.5 is the - * SHA-256 hash of the Ieee1609Dot2Data of type signedData containing the - * response encryption key, canonicalized as defined in the definition of - * Ieee1609Dot2Data. - * - * @note If the encryption algorithm is SM2, there is no equivalent of the - * parameter P1 and so no input to the encryption process that uses the hash - * of the Ieee1609Dot2Data. - * - * @param rekRecipInfo: The data was encrypted with a data encryption key, - * the data encryption key was encrypted using a public key encryption scheme, - * where the public encryption key was not obtained from a Signed-Data or a - * certificate. In this case, the SDEE specification is expected to specify - * how the public key is obtained, and if ECIES is the encryption algorithm, - * then the parameter P1 to ECIES as defined in 5.3.5 is the hash of the - * empty string. - * - * @note If the encryption algorithm is SM2, there is no equivalent of the - * parameter P1 and so no input to the encryption process that uses the hash - * of the empty string. - * - * @note The material input to encryption is the bytes of the encryption key - * with no headers, encapsulation, or length indication. Contrast this to - * encryption of data, where the data is encapsulated in an Ieee1609Dot2Data. - */ -RecipientInfo ::= CHOICE { - pskRecipInfo PreSharedKeyRecipientInfo, - symmRecipInfo SymmRecipientInfo, - certRecipInfo PKRecipientInfo, - signedDataRecipInfo PKRecipientInfo, - rekRecipInfo PKRecipientInfo -} - -/** - * @brief This type is used for clarity of definitions. - */ -SequenceOfRecipientInfo ::= SEQUENCE OF RecipientInfo - -/** - * @brief This data structure is used to indicate a symmetric key that may - * be used directly to decrypt a SymmetricCiphertext. It consists of the - * low-order 8 bytes of the hash of the COER encoding of a - * SymmetricEncryptionKey structure containing the symmetric key in question. - * The HashedId8 is calculated with the hash algorithm determined as - * specified in 5.3.9.3. The symmetric key may be established by any - * appropriate means agreed by the two parties to the exchange. - */ -PreSharedKeyRecipientInfo ::= HashedId8 - -/** - * @brief This data structure contains the following fields: - * - * @param recipientId: contains the hash of the symmetric key encryption key - * that may be used to decrypt the data encryption key. It consists of the - * low-order 8 bytes of the hash of the COER encoding of a - * SymmetricEncryptionKey structure containing the symmetric key in question. - * The HashedId8 is calculated with the hash algorithm determined as - * specified in 5.3.9.4. The symmetric key may be established by any - * appropriate means agreed by the two parties to the exchange. - * - * @param encKey: contains the encrypted data encryption key within a - * SymmetricCiphertext, where the data encryption key is input to the data - * encryption key encryption process with no headers, encapsulation, or - * length indication. - */ -SymmRecipientInfo ::= SEQUENCE { - recipientId HashedId8, - encKey SymmetricCiphertext -} - -/** - * @brief This data structure contains the following fields: - * - * @param recipientId: contains the hash of the container for the encryption - * public key as specified in the definition of RecipientInfo. Specifically, - * depending on the choice indicated by the containing RecipientInfo structure: - * - If the containing RecipientInfo structure indicates certRecipInfo, - * this field contains the HashedId8 of the certificate. The HashedId8 is - * calculated with the whole-certificate hash algorithm, determined as - * described in 6.4.3, applied to the COER-encoded certificate, canonicalized - * as defined in the definition of Certificate. - * - If the containing RecipientInfo structure indicates - * signedDataRecipInfo, this field contains the HashedId8 of the - * Ieee1609Dot2Data of type signedData that contained the encryption key, - * with that Ieee¬¬1609¬Dot2¬¬Data canonicalized per 6.3.4. The HashedId8 is - * calculated with the hash algorithm determined as specified in 5.3.9.5. - * - If the containing RecipientInfo structure indicates rekRecipInfo, this - * field contains the HashedId8 of the COER encoding of a PublicEncryptionKey - * structure containing the response encryption key. The HashedId8 is - * calculated with the hash algorithm determined as specified in 5.3.9.5. - * - * @param encKey: contains the encrypted data encryption key, where the data - * encryption key is input to the data encryption key encryption process with - * no headers, encapsulation, or length indication. - */ -PKRecipientInfo ::= SEQUENCE { - recipientId HashedId8, - encKey EncryptedDataEncryptionKey -} - -/** - * @brief This data structure contains an encrypted data encryption key, - * where the data encryption key is input to the data encryption key - * encryption process with no headers, encapsulation, or length indication. - * - * Critical information fields: If present and applicable to - * the receiving SDEE, this is a critical information field as defined in - * 5.2.6. If an implementation receives an encrypted SPDU and determines that - * one or more RecipientInfo fields are relevant to it, and if all of those - * RecipientInfos contain an EncryptedDataEncryptionKey such that the - * implementation does not recognize the indicated CHOICE, the implementation - * shall indicate that the encrypted SPDU is not decryptable. - */ -EncryptedDataEncryptionKey ::= CHOICE { - eciesNistP256 EciesP256EncryptedKey, - eciesBrainpoolP256r1 EciesP256EncryptedKey, - ..., - ecencSm2256 EcencP256EncryptedKey -} - -/** - * @brief This data structure encapsulates a ciphertext generated with an - * approved symmetric algorithm. - * - * @note Critical information fields: If present, this is a critical - * information field as defined in 5.2.6. An implementation that does not - * recognize the indicated CHOICE value for this type in an encrypted SPDU - * shall indicate that the signed SPDU is invalid in the sense of 4.2.2.3.2, - * that is, it is invalid in the sense that its validity cannot be established. - */ -SymmetricCiphertext ::= CHOICE { - aes128ccm One28BitCcmCiphertext, - ..., - sm4Ccm One28BitCcmCiphertext -} - -/** - * @brief This data structure encapsulates an encrypted ciphertext for any - * symmetric algorithm with 128-bit blocks in CCM mode. The ciphertext is - * 16 bytes longer than the corresponding plaintext due to the inclusion of - * the message authentication code (MAC). The plaintext resulting from a - * correct decryption of the ciphertext is either a COER-encoded - * Ieee1609Dot2Data structure (see 6.3.41), or a 16-byte symmetric key - * (see 6.3.44). - * - * The ciphertext is 16 bytes longer than the corresponding plaintext. - * - * The plaintext resulting from a correct decryption of the - * ciphertext is a COER-encoded Ieee1609Dot2Data structure. - * - * @param nonce: contains the nonce N as specified in 5.3.8. - * - * @param ccmCiphertext: contains the ciphertext C as specified in 5.3.8. - * - * @note In the name of this structure, "One28" indicates that the - * symmetric cipher block size is 128 bits. It happens to also be the case - * that the keys used for both AES-128-CCM and SM4-CCM are also 128 bits long. - * This is, however, not what “One28” refers to. Since the cipher is used in - * counter mode, i.e., as a stream cipher, the fact that that block size is 128 - * bits affects only the size of the MAC and does not affect the size of the - * raw ciphertext. - */ -One28BitCcmCiphertext ::= SEQUENCE { - nonce OCTET STRING (SIZE (12)), - ccmCiphertext Opaque -} - -/** - * @brief This type is defined only for backwards compatibility. - */ -Aes128CcmCiphertext ::= One28BitCcmCiphertext - ---***************************************************************************-- --- Certificates and other Security Management -- ---***************************************************************************-- - -/** - * @brief This structure is a profile of the structure CertificateBase which - * specifies the valid combinations of fields to transmit implicit and - * explicit certificates. - * - * @note Canonicalization: This data structure is subject to canonicalization - * for the relevant operations specified in 6.1.2. The canonicalization - * applies to the CertificateBase. - */ -Certificate ::= - CertificateBase (ImplicitCertificate | ExplicitCertificate) - -TestCertificate ::= Certificate - -/** - * @brief This type is used for clarity of definitions. - */ -SequenceOfCertificate ::= SEQUENCE OF Certificate - -/** - * @brief The fields in this structure have the following meaning: - * - * @param version: contains the version of the certificate format. In this - * version of the data structures, this field is set to 3. - * - * @param type: states whether the certificate is implicit or explicit. This - * field is set to explicit for explicit certificates and to implicit for - * implicit certificates. See ExplicitCertificate and ImplicitCertificate for - * more details. - * - * @param issuer: identifies the issuer of the certificate. - * - * @param toBeSigned: is the certificate contents. This field is an input to - * the hash when generating or verifying signatures for an explicit - * certificate, or generating or verifying the public key from the - * reconstruction value for an implicit certificate. The details of how this - * field are encoded are given in the description of the - * ToBeSignedCertificate type. - * - * @param signature: is included in an ExplicitCertificate. It is the - * signature, calculated by the signer identified in the issuer field, over - * the hash of toBeSigned. The hash is calculated as specified in 5.3.1, where: - * - Data input is the encoding of toBeSigned following the COER. - * - Signer identifier input depends on the verification type, which in - * turn depends on the choice indicated by issuer. If the choice indicated by - * issuer is self, the verification type is self-signed and the signer - * identifier input is the empty string. If the choice indicated by issuer is - * not self, the verification type is certificate and the signer identifier - * input is the canonicalized COER encoding of the certificate indicated by - * issuer. The canonicalization is carried out as specified in the - * Canonicalization section of this subclause. - * - * @note Canonicalization: This data structure is subject to canonicalization - * for the relevant operations specified in 6.1.2. The canonicalization - * applies to the ToBeSignedCertificate and to the Signature. - * - * @note Whole-certificate hash: If the entirety of a certificate is hashed - * to calculate a HashedId3, HashedId8, or HashedId10, the algorithm used for - * this purpose is known as the whole-certificate hash. The method used to - * determine the whole-certificate hash algorithm is specified in 5.3.9.2. - */ -CertificateBase ::= SEQUENCE { - version Uint8(3), - type CertificateType, - issuer IssuerIdentifier, - toBeSigned ToBeSignedCertificate, - signature Signature OPTIONAL -} - -/** - * @brief This enumerated type indicates whether a certificate is explicit or - * implicit. - * - * @note Critical information fields: If present, this is a critical - * information field as defined in 5.2.5. An implementation that does not - * recognize the indicated CHOICE for this type when verifying a signed SPDU - * shall indicate that the signed SPDU is invalid in the sense of 4.2.2.3.2, - * that is, it is invalid in the sense that its validity cannot be - * established. - */ -CertificateType ::= ENUMERATED { - explicit, - implicit, - ... -} - -/** - * @brief This is a profile of the CertificateBase structure providing all - * the fields necessary for an implicit certificate, and no others. - */ -ImplicitCertificate ::= CertificateBase (WITH COMPONENTS {..., - type(implicit), - toBeSigned(WITH COMPONENTS {..., - verifyKeyIndicator(WITH COMPONENTS {reconstructionValue}) - }), - signature ABSENT -}) - -/** - * @brief This is a profile of the CertificateBase structure providing all - * the fields necessary for an explicit certificate, and no others. - */ -ExplicitCertificate ::= CertificateBase (WITH COMPONENTS {..., - type(explicit), - toBeSigned (WITH COMPONENTS {..., - verifyKeyIndicator(WITH COMPONENTS {verificationKey}) - }), - signature PRESENT -}) - -/** - * @brief This structure allows the recipient of a certificate to determine - * which keying material to use to authenticate the certificate. - * - * If the choice indicated is sha256AndDigest, sha384AndDigest, or - * sm3AndDigest: - * - The structure contains the HashedId8 of the issuing certificate. The - * HashedId8 is calculated with the whole-certificate hash algorithm, - * determined as described in 6.4.3, applied to the COER-encoded certificate, - * canonicalized as defined in the definition of Certificate. - * - The hash algorithm to be used to generate the hash of the certificate - * for verification is SHA-256 (in the case of sha256AndDigest), SM3 (in the - * case of sm3AndDigest) or SHA-384 (in the case of sha384AndDigest). - * - The certificate is to be verified with the public key of the - * indicated issuing certificate. - * - * If the choice indicated is self: - * - The structure indicates what hash algorithm is to be used to generate - * the hash of the certificate for verification. - * - The certificate is to be verified with the public key indicated by - * the verifyKeyIndicator field in theToBeSignedCertificate. - * - * @note Critical information fields: If present, this is a critical - * information field as defined in 5.2.5. An implementation that does not - * recognize the indicated CHOICE for this type when verifying a signed SPDU - * shall indicate that the signed SPDU is invalid in the sense of 4.2.2.3.2, - * that is, it is invalid in the sense that its validity cannot be - * established. - */ -IssuerIdentifier ::= CHOICE { - sha256AndDigest HashedId8, - self HashAlgorithm, - ..., - sha384AndDigest HashedId8, - sm3AndDigest HashedId8 -} - -/** - * @brief The fields in the ToBeSignedCertificate structure have the - * following meaning: - * - * For both implicit and explicit certificates, when the certificate - * is hashed to create or recover the public key (in the case of an implicit - * certificate) or to generate or verify the signature (in the case of an - * explicit certificate), the hash is Hash (Data input) || Hash ( - * Signer identifier input), where: - * - Data input is the COER encoding of toBeSigned, canonicalized - * as described above. - * - Signer identifier input depends on the verification type, - * which in turn depends on the choice indicated by issuer. If the choice - * indicated by issuer is self, the verification type is self-signed and the - * signer identifier input is the empty string. If the choice indicated by - * issuer is not self, the verification type is certificate and the signer - * identifier input is the COER encoding of the canonicalization per 6.4.3 of - * the certificate indicated by issuer. - * - * In other words, for implicit certificates, the value H (CertU) in SEC 4, - * section 3, is for purposes of this standard taken to be H [H - * (canonicalized ToBeSignedCertificate from the subordinate certificate) || - * H (entirety of issuer Certificate)]. See 5.3.2 for further discussion, - * including material differences between this standard and SEC 4 regarding - * how the hash function output is converted from a bit string to an integer. - * - * @param id: contains information that is used to identify the certificate - * holder if necessary. - * - * @param cracaId: identifies the Certificate Revocation Authorization CA - * (CRACA) responsible for certificate revocation lists (CRLs) on which this - * certificate might appear. Use of the cracaId is specified in 5.1.3. The - * HashedId3 is calculated with the whole-certificate hash algorithm, - * determined as described in 6.4.3, applied to the COER-encoded certificate, - * canonicalized as defined in the definition of Certificate. - * - * @param crlSeries: represents the CRL series relevant to a particular - * Certificate Revocation Authorization CA (CRACA) on which the certificate - * might appear. Use of this field is specified in 5.1.3. - * - * @param validityPeriod: contains the validity period of the certificate. - * - * @param region: if present, indicates the validity region of the - * certificate. If it is omitted the validity region is indicated as follows: - * - If enclosing certificate is self-signed, i.e., the choice indicated - * by the issuer field in the enclosing certificate structure is self, the - * certificate is valid worldwide. - * - Otherwise, the certificate has the same validity region as the - * certificate that issued it. - * - * @param assuranceLevel: indicates the assurance level of the certificate - * holder. - * - * @param appPermissions: indicates the permissions that the certificate - * holder has to sign application data with this certificate. A valid - * instance of appPermissions contains any particular Psid value in at most - * one entry. - * - * @param certIssuePermissions: indicates the permissions that the certificate - * holder has to sign certificates with this certificate. A valid instance of - * this array contains no more than one entry whose psidSspRange field - * indicates all. If the array has multiple entries and one entry has its - * psidSspRange field indicate all, then the entry indicating all specifies - * the permissions for all PSIDs other than the ones explicitly specified in - * the other entries. See the description of PsidGroupPermissions for further - * discussion. - * - * @param certRequestPermissions: indicates the permissions that the - * certificate holder can request in its certificate. A valid instance of this - * array contains no more than one entry whose psidSspRange field indicates - * all. If the array has multiple entries and one entry has its psidSspRange - * field indicate all, then the entry indicating all specifies the permissions - * for all PSIDs other than the ones explicitly specified in the other entries. - * See the description of PsidGroupPermissions for further discussion. - * - * @param canRequestRollover: indicates that the certificate may be used to - * sign a request for another certificate with the same permissions. This - * field is provided for future use and its use is not defined in this - * version of this standard. - * - * @param encryptionKey: contains a public key for encryption for which the - * certificate holder holds the corresponding private key. - * - * @param verifyKeyIndicator: contains material that may be used to recover - * the public key that may be used to verify data signed by this certificate. - * - * @param flags: indicates additional yes/no properties of the certificate - * holder. The only bit with defined semantics in this string in this version - * of this standard is usesCubk. If set, the usesCubk bit indicates that the - * certificate holder supports the compact unified butterfly key response. - * Further material about the compact unified butterfly key response can be - * found in IEEE Std 1609.2.1. - * - * @note usesCubk is only relevant for CA certificates, and the only - * functionality defined associated with this field is associated with - * consistency checks on received certificate responses. No functionality - * associated with communications between peer SDEEs is defined associated - * with this field. - * - * @param appExtensions: indicates additional permissions that may be applied - * to application activities that the certificate holder is carrying out. - * - * @param certIssueExtensions: indicates additional permissions to issue - * certificates containing endEntityExtensions. - * - * @param certRequestExtensions: indicates additional permissions to request - * certificates containing endEntityExtensions. - * - * @note Canonicalization: This data structure is subject to canonicalization - * for the relevant operations specified in 6.1.2. The canonicalization - * applies to the PublicEncryptionKey and to the VerificationKeyIndicator. - * - * If the PublicEncryptionKey contains a BasePublicEncryptionKey that is an - * elliptic curve point (i.e., of type EccP256CurvePoint or EccP384CurvePoint), - * then the elliptic curve point is encoded in compressed form, i.e., such - * that the choice indicated within the Ecc*CurvePoint is compressed-y-0 or - * compressed-y-1. - * - * @note Critical information fields: - * - If present, appPermissions is a critical information field as defined - * in 5.2.6. If an implementation of verification does not support the number - * of PsidSsp in the appPermissions field of a certificate that signed a - * signed SPDU, that implementation shall indicate that the signed SPDU is - * invalid in the sense of 4.2.2.3.2, that is, it is invalid in the sense - * that its validity cannot be established.. A conformant implementation - * shall support appPermissions fields containing at least eight entries. - * It may be the case that an implementation of verification does not support - * the number of entries in the appPermissions field and the appPermissions - * field is not relevant to the verification: this will occur, for example, - * if the certificate in question is a CA certificate and so the - * certIssuePermissions field is relevant to the verification and the - * appPermissions field is not. In this case, whether the implementation - * indicates that the signed SPDU is valid (because it could validate all - * relevant fields) or invalid (because it could not parse the entire - * certificate) is implementation-specific. - * - If present, certIssuePermissions is a critical information field as - * defined in 5.2.6. If an implementation of verification does not support - * the number of PsidGroupPermissions in the certIssuePermissions field of a - * CA certificate in the chain of a signed SPDU, the implementation shall - * indicate that the signed SPDU is invalid in the sense of 4.2.2.3.2, that - * is, it is invalid in the sense that its validity cannot be established. - * A conformant implementation shall support certIssuePermissions fields - * containing at least eight entries. - * It may be the case that an implementation of verification does not support - * the number of entries in the certIssuePermissions field and the - * certIssuePermissions field is not relevant to the verification: this will - * occur, for example, if the certificate in question is the signing - * certificate for the SPDU and so the appPermissions field is relevant to - * the verification and the certIssuePermissions field is not. In this case, - * whether the implementation indicates that the signed SPDU is valid - * (because it could validate all relevant fields) or invalid (because it - * could not parse the entire certificate) is implementation-specific. - * - If present, certRequestPermissions is a critical information field as - * defined in 5.2.6. If an implementaiton of verification of a certificate - * request does not support the number of PsidGroupPermissions in - * certRequestPermissions, the implementation shall indicate that the signed - * SPDU is invalid in the sense of 4.2.2.3.2, that is, it is invalid in the - * sense that its validity cannot be established. A conformant implementation - * shall support certRequestPermissions fields containing at least eight - * entries. - * It may be the case that an implementation of verification does not support - * the number of entries in the certRequestPermissions field and the - * certRequestPermissions field is not relevant to the verification: this will - * occur, for example, if the certificate in question is the signing - * certificate for the SPDU and so the appPermissions field is relevant to - * the verification and the certRequestPermissions field is not. In this - * case, whether the implementation indicates that the signed SPDU is valid - * (because it could validate all relevant fields) or invalid (because it - * could not parse the entire certificate) is implementation-specific. - */ -ToBeSignedCertificate ::= SEQUENCE { - id CertificateId, - cracaId HashedId3, - crlSeries CrlSeries, - validityPeriod ValidityPeriod, - region GeographicRegion OPTIONAL, - assuranceLevel SubjectAssurance OPTIONAL, - appPermissions SequenceOfPsidSsp OPTIONAL, - certIssuePermissions SequenceOfPsidGroupPermissions OPTIONAL, - certRequestPermissions SequenceOfPsidGroupPermissions OPTIONAL, - canRequestRollover NULL OPTIONAL, - encryptionKey PublicEncryptionKey OPTIONAL, - verifyKeyIndicator VerificationKeyIndicator, - ..., - flags BIT STRING {usesCubk (0)} (SIZE (8)) OPTIONAL, - appExtensions SequenceOfAppExtensions, - certIssueExtensions SequenceOfCertIssueExtensions, - certRequestExtension SequenceOfCertRequestExtensions -} -(WITH COMPONENTS { ..., appPermissions PRESENT} | - WITH COMPONENTS { ..., certIssuePermissions PRESENT} | - WITH COMPONENTS { ..., certRequestPermissions PRESENT}) - -/** - * @brief This structure contains information that is used to identify the - * certificate holder if necessary. - * - * @param linkageData: is used to identify the certificate for revocation - * purposes in the case of certificates that appear on linked certificate - * CRLs. See 5.1.3 and 7.3 for further discussion. - * - * @param name: is used to identify the certificate holder in the case of - * non-anonymous certificates. The contents of this field are a matter of - * policy and are expected to be human-readable. - * - * @param binaryId: supports identifiers that are not human-readable. - * - * @param none: indicates that the certificate does not include an identifier. - * - * @note Critical information fields: - * - If present, this is a critical information field as defined in 5.2.6. - * An implementation that does not recognize the choice indicated in this - * field shall reject a signed SPDU as invalid. - */ -CertificateId ::= CHOICE { - linkageData LinkageData, - name Hostname, - binaryId OCTET STRING(SIZE(1..64)), - none NULL, - ... -} - -/** - * @brief This structure contains information that is matched against - * information obtained from a linkage ID-based CRL to determine whether the - * containing certificate has been revoked. See 5.1.3.4 and 7.3 for details - * of use. - */ -LinkageData ::= SEQUENCE { - iCert IValue, - linkage-value LinkageValue, - group-linkage-value GroupLinkageValue OPTIONAL -} - -/** - * @brief This type indicates which type of permissions may appear in - * end-entity certificates the chain of whose permissions passes through the - * PsidGroupPermissions field containing this value. If app is indicated, the - * end-entity certificate may contain an appPermissions field. If enroll is - * indicated, the end-entity certificate may contain a certRequestPermissions - * field. - */ -EndEntityType ::= - BIT STRING {app (0), enrol (1) } (SIZE (8)) (ALL EXCEPT {}) - -/** - * @brief This structure states the permissions that a certificate holder has - * with respect to issuing and requesting certificates for a particular set - * of PSIDs. For examples, see D.5.3 and D.5.4. - * - * @param subjectPermissions: indicates PSIDs and SSP Ranges covered by this - * field. - * - * @param minChainLength: and chainLengthRange indicate how long the - * certificate chain from this certificate to the end-entity certificate is - * permitted to be. As specified in 5.1.2.1, the length of the certificate - * chain is the number of certificates "below" this certificate in the chain, - * down to and including the end-entity certificate. The length is permitted - * to be (a) greater than or equal to minChainLength certificates and (b) - * less than or equal to minChainLength + chainLengthRange certificates. A - * value of 0 for minChainLength is not permitted when this type appears in - * the certIssuePermissions field of a ToBeSignedCertificate; a certificate - * that has a value of 0 for this field is invalid. The value -1 for - * chainLengthRange is a special case: if the value of chainLengthRange is -1 - * it indicates that the certificate chain may be any length equal to or - * greater than minChainLength. See the examples below for further discussion. - * - * @param eeType: takes one or more of the values app and enroll and indicates - * the type of certificates or requests that this instance of - * PsidGroupPermissions in the certificate is entitled to authorize. - * Different instances of PsidGroupPermissions within a ToBeSignedCertificate - * may have different values for eeType. - * - If this field indicates app, the chain is allowed to end in an - * authorization certificate, i.e., a certficate in which these permissions - * appear in an appPermissions field (in other words, if the field does not - * indicate app and the chain ends in an authorization certificate, the - * chain shall be considered invalid). - * - If this field indicates enroll, the chain is allowed to end in an - * enrollment certificate, i.e., a certificate in which these permissions - * appear in a certReqPermissions permissions field (in other words, if the - * field does not indicate enroll and the chain ends in an enrollment - * certificate, the chain shall be considered invalid). - */ -PsidGroupPermissions ::= SEQUENCE { - subjectPermissions SubjectPermissions, - minChainLength INTEGER DEFAULT 1, - chainLengthRange INTEGER DEFAULT 0, - eeType EndEntityType DEFAULT {app} -} - -/** - * @brief This type is used for clarity of definitions. - */ -SequenceOfPsidGroupPermissions ::= SEQUENCE OF PsidGroupPermissions - -/** - * @brief This indicates the PSIDs and associated SSPs for which certificate - * issuance or request permissions are granted by a PsidGroupPermissions - * structure. If this takes the value explicit, the enclosing - * PsidGroupPermissions structure grants certificate issuance or request - * permissions for the indicated PSIDs and SSP Ranges. If this takes the - * value all, the enclosing PsidGroupPermissions structure grants certificate - * issuance or request permissions for all PSIDs not indicated by other - * PsidGroupPermissions in the same certIssuePermissions or - * certRequestPermissions field. - * - * @note Critical information fields: - * - If present, this is a critical information field as defined in 5.2.6. - * An implementation that does not recognize the indicated CHOICE when - * verifying a signed SPDU shall indicate that the signed SPDU is - * invalidin the sense of 4.2.2.3.2, that is, it is invalid in the sense that - * its validity cannot be established. - * - If present, explicit is a critical information field as defined in - * 5.2.6. An implementation that does not support the number of PsidSspRange - * in explicit when verifying a signed SPDU shall indicate that the signed - * SPDU is invalid in the sense of 4.2.2.3.2, that is, it is invalid in the - * sense that its validity cannot be established. A conformant implementation - * shall support explicit fields containing at least eight entries. - */ -SubjectPermissions ::= CHOICE { - explicit SequenceOfPsidSspRange, - all NULL, - ... -} - -/** - * @brief The contents of this field depend on whether the certificate is an - * implicit or an explicit certificate. - * - * @param verificationKey: is included in explicit certificates. It contains - * the public key to be used to verify signatures generated by the holder of - * the Certificate. - * - * @param reconstructionValue: is included in implicit certificates. It - * contains the reconstruction value, which is used to recover the public key - * as specified in SEC 4 and 5.3.2. - * - * @note Critical information fields: If present, this is a critical - * information field as defined in 5.2.5. An implementation that does not - * recognize the indicated CHOICE for this type when verifying a signed SPDU - * shall indicate that the signed SPDU is invalid indicate that the signed - * SPDU is invalid in the sense of 4.2.2.3.2, that is, it is invalid in the - * sense that its validity cannot be established. - * - * @note Canonicalization: This data structure is subject to canonicalization - * for the relevant operations specified in 6.1.2. The canonicalization - * applies to the PublicVerificationKey and to the EccP256CurvePoint. The - * EccP256CurvePoint is encoded in compressed form, i.e., such that the - * choice indicated within the EccP256CurvePoint is compressed-y-0 or - * compressed-y-1. - */ -VerificationKeyIndicator ::= CHOICE { - verificationKey PublicVerificationKey, - reconstructionValue ReconstructionValue, - ... -} - -ReconstructionValue ::= EccP256CurvePoint - -/** - * @brief This structure uses the parameterized type Extension to define an - * Ieee1609ContributedHeaderInfoExtension as an open Extension Content field - * identified by an extension identifier. The extension identifier value is - * unique to extensions defined by ETSI and need not be unique among all - * extension identifier values defined by all contributing organizations. - */ -Ieee1609ContributedHeaderInfoExtension ::= - Extension{{Ieee1609HeaderInfoExtensions}} - -/** - * @brief This is an integer used to identify an - * Ieee1609ContributedHeaderInfoExtension. - */ -Ieee1609HeaderInfoExtensionId ::= ExtId - -p2pcd8ByteLearningRequestId Ieee1609HeaderInfoExtensionId ::= 1 - -/** - * @brief This is the ASN.1 Information Object Class that associates IEEE - * 1609 HeaderInfo contributed extensions with the appropriate - * Ieee1609HeaderInfoExtensionId value. - */ -Ieee1609HeaderInfoExtensions EXT-TYPE ::= { - {HashedId8 IDENTIFIED BY p2pcd8ByteLearningRequestId}, - ... -} - -/** - * @brief This structure contains any AppExtensions that apply to the - * certificate holder. As specified in 5.2.4.2.3, each individual - * AppExtension type is associated with consistency conditions, specific to - * that extension, that govern its consistency with SPDUs signed by the - * certificate holder and with the CertIssueExtensions in the CA certificates - * in that certificate holder’s chain. Those consistency conditions are - * specified for each individual AppExtension below. - */ -SequenceOfAppExtensions ::= SEQUENCE (SIZE(1..MAX)) OF AppExtension - -/** - * @brief This structure contains an individual AppExtension. AppExtensions - * specified in this standard are drawn from the ASN.1 Information Object Set - * SetCertExtensions. This set, and its use in the AppExtension type, is - * structured so that each AppExtension is associated with a - * CertIssueExtension and a CertRequestExtension and all are identified by - * the same id value. In this structure: - * - * @param id: identifies the extension type. - * - * @param content: provides the content of the extension. - */ -AppExtension ::= SEQUENCE { - id CERT-EXT-TYPE.&id({SetCertExtensions}), - content CERT-EXT-TYPE.&App({SetCertExtensions}{@.id}) -} - -/** - * @brief This field contains any CertIssueExtensions that apply to the - * certificate holder. As specified in 5.2.4.2.3, each individual - * CertIssueExtension type is associated with consistency conditions, - * specific to that extension, that govern its consistency with - * AppExtensions in certificates issued by the certificate holder and with - * the CertIssueExtensions in the CA certificates in that certificate - * holder’s chain. Those consistency conditions are specified for each - * individual CertIssueExtension below. - */ -SequenceOfCertIssueExtensions ::= - SEQUENCE (SIZE(1..MAX)) OF CertIssueExtension - -/** - * @brief This field contains an individual CertIssueExtension. - * CertIssueExtensions specified in this standard are drawn from the ASN.1 - * Information Object Set SetCertExtensions. This set, and its use in the - * CertIssueExtension type, is structured so that each CertIssueExtension - * is associated with a AppExtension and a CertRequestExtension and all are - * identified by the same id value. In this structure: - * - * @param id: identifies the extension type. - * - * @param permissions: indicates the permissions. Within this field. - * - all indicates that the certificate is entitled to issue all values of - * the extension. - * - specific is used to specify which values of the extension may be - * issued in the case where all does not apply. - */ -CertIssueExtension ::= SEQUENCE { - id CERT-EXT-TYPE.&id({SetCertExtensions}), - permissions CHOICE { - specific CERT-EXT-TYPE.&Issue({SetCertExtensions}{@.id}), - all NULL - } -} - -/** - * @brief This field contains any CertRequestExtensions that apply to the - * certificate holder. As specified in 5.2.4.2.3, each individual - * CertRequestExtension type is associated with consistency conditions, - * specific to that extension, that govern its consistency with - * AppExtensions in certificates issued by the certificate holder and with - * the CertRequestExtensions in the CA certificates in that certificate - * holder’s chain. Those consistency conditions are specified for each - * individual CertRequestExtension below. - */ -SequenceOfCertRequestExtensions ::= SEQUENCE (SIZE(1..MAX)) OF CertRequestExtension - -/** - * @brief This field contains an individual CertRequestExtension. - * CertRequestExtensions specified in this standard are drawn from the - * ASN.1 Information Object Set SetCertExtensions. This set, and its use in - * the CertRequestExtension type, is structured so that each - * CertRequestExtension is associated with a AppExtension and a - * CertRequestExtension and all are identified by the same id value. In this - * structure: - * - * @param id: identifies the extension type. - * - * @param permissions: indicates the permissions. Within this field. - * - all indicates that the certificate is entitled to issue all values of - * the extension. - * - specific is used to specify which values of the extension may be - * issued in the case where all does not apply. - */ -CertRequestExtension ::= SEQUENCE { - id CERT-EXT-TYPE.&id({SetCertExtensions}), - permissions CHOICE { - content CERT-EXT-TYPE.&Req({SetCertExtensions}{@.id}), - all NULL - } -} - -/** - * @brief This type is the AppExtension used to identify an operating - * organization. The associated CertIssueExtension and CertRequestExtension - * are both of type OperatingOrganizationId. - * To determine consistency between this type and an SPDU, the SDEE - * specification for that SPDU is required to specify how the SPDU can be - * used to determine an OBJECT IDENTIFIER (for example, by including the - * full OBJECT IDENTIFIER in the SPDU, or by including a RELATIVE-OID with - * clear instructions about how a full OBJECT IDENTIFIER can be obtained from - * the RELATIVE-OID). The SPDU is then consistent with this type if the - * OBJECT IDENTIFIER determined from the SPDU is identical to the OBJECT - * IDENTIFIER contained in this field. - * This AppExtension does not have consistency conditions with a - * corresponding CertIssueExtension. It can appear in a certificate issued - * by any CA. - */ -OperatingOrganizationId ::= OBJECT IDENTIFIER - -certExtId-OperatingOrganization ExtId ::= 1 - -/** - * @brief This Information Object is an instance of the Information Object - * Class CERT-EXT-TYPE. It is defined to bind together the AppExtension, - * CertIssueExtension, and CertRequestExtension types associated with the - * use of an operating organization identifier, and to assocaute them all - * with the extension identifier value certExtId-OperatingOrganization. - */ -instanceOperatingOrganizationCertExtensions CERT-EXT-TYPE ::= { - ID certExtId-OperatingOrganization - APP OperatingOrganizationId - ISSUE NULL - REQUEST NULL -} - -/** - * @brief This Information Object Set is a collection of Information Objects - * used to contain the AppExtension, CertIssueExtension, and - * CertRequestExtension types associated with a specific use of certificate - * extensions. In this version of this standard it only has a single entry - * instanceOperatingOrganizationCertExtensions. - */ -SetCertExtensions CERT-EXT-TYPE ::= { - instanceOperatingOrganizationCertExtensions, - ... -} - -END +--***************************************************************************-- +-- IEEE Std 1609.2 -- +--***************************************************************************-- + +/** + * @note Section references in this file are to clauses in IEEE Std + * 1609.2 unless indicated otherwise. Full forms of acronyms and + * abbreviations used in this file are specified in 3.2. + */ + +Ieee1609Dot2 {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) + dot2(2) base(1) schema(1) major-version-2(2) minor-version-6(6)} + +DEFINITIONS AUTOMATIC TAGS ::= BEGIN + +IMPORTS + CERT-EXT-TYPE, + CrlSeries, + EccP256CurvePoint, + EcencP256EncryptedKey, + EciesP256EncryptedKey, + EncryptionKey, + EXT-TYPE, + Extension, + ExtId, + GeographicRegion, + GroupLinkageValue, + HashAlgorithm, + HashedId3, + HashedId8, + HashedId32, + HashedId48, + Hostname, + IValue, + LinkageValue, + Opaque, + Psid, + PsidSsp, + PsidSspRange, + PublicEncryptionKey, + PublicVerificationKey, + SequenceOfHashedId3, + SequenceOfPsidSsp, + SequenceOfPsidSspRange, + ServiceSpecificPermissions, + Signature, + SubjectAssurance, + SymmetricEncryptionKey, + ThreeDLocation, + Time64, + Uint3, + Uint8, + Uint16, + Uint32, + ValidityPeriod +FROM Ieee1609Dot2BaseTypes {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) + base(1) base-types(2) major-version-2(2) minor-version-4(4)} +WITH SUCCESSORS + + EtsiOriginatingHeaderInfoExtension +FROM EtsiTs103097ExtensionModule {itu-t(0) identified-organization(4) etsi(0) + itsDomain(5) wg5(5) secHeaders(103097) extension(2) major-version-1(1) + minor-version-0(0)} +WITH SUCCESSORS +; + +--***************************************************************************-- +-- Secured Data -- +--***************************************************************************-- + +/** + * @brief This data type is used to contain the other data types in this + * clause. The fields in the Ieee1609Dot2Data have the following meanings: + * + * @param protocolVersion: contains the current version of the protocol. The + * version specified in this standard is version 3, represented by the + * integer 3. There are no major or minor version numbers. + * + * @param content: contains the content in the form of an Ieee1609Dot2Content. + * + * @note Canonicalization: This data structure is subject to canonicalization + * for the relevant operations specified in 6.1.2. The canonicalization + * applies to the Ieee1609Dot2Content. + */ +Ieee1609Dot2Data ::= SEQUENCE { + protocolVersion Uint8(3), + content Ieee1609Dot2Content +} + +/** + * @brief In this structure: + * + * @param unsecuredData: indicates that the content is an OCTET STRING to be + * consumed outside the SDS. + * + * @param signedData: indicates that the content has been signed according to + * this standard. + * + * @param encryptedData: indicates that the content has been encrypted + * according to this standard. + * + * @param signedCertificateRequest: indicates that the content is a + * certificate request signed by an IEEE 1609.2 certificate or self-signed. + * + * @param signedX509CertificateRequest: indicates that the content is a + * certificate request signed by an ITU-T X.509 certificate. + * + * @note Canonicalization: This data structure is subject to canonicalization + * for the relevant operations specified in 6.1.2 if it is of type signedData. + * The canonicalization applies to the SignedData. + */ +Ieee1609Dot2Content ::= CHOICE { + unsecuredData Opaque, + signedData SignedData, + encryptedData EncryptedData, + signedCertificateRequest Opaque, + ..., + signedX509CertificateRequest Opaque +} + +/** + * @brief In this structure: + * + * @param hashId: indicates the hash algorithm to be used to generate the hash + * of the message for signing and verification. + * + * @param tbsData: contains the data that is hashed as input to the signature. + * + * @param signer: determines the keying material and hash algorithm used to + * sign the data. + * + * @param signature: contains the digital signature itself, calculated as + * specified in 5.3.1. + * - If signer indicates the choice self, then the signature calculation + * is parameterized as follows: + * - Data input is equal to the COER encoding of the tbsData field + * canonicalized according to the encoding considerations given in 6.3.6. + * - Verification type is equal to self. + * - Signer identifier input is equal to the empty string. + * - If signer indicates certificate or digest, then the signature + * calculation is parameterized as follows: + * - Data input is equal to the COER encoding of the tbsData field + * canonicalized according to the encoding considerations given in 6.3.6. + * - Verification type is equal to certificate. + * - Signer identifier input equal to the COER-encoding of the + * Certificate that is to be used to verify the SPDU, canonicalized according + * to the encoding considerations given in 6.4.3. + * + * @note Canonicalization: This data structure is subject to canonicalization + * for the relevant operations specified in 6.1.2. The canonicalization + * applies to the ToBeSignedData and the Signature. + */ +SignedData ::= SEQUENCE { + hashId HashAlgorithm, + tbsData ToBeSignedData, + signer SignerIdentifier, + signature Signature +} + +/** + * @brief This structure contains the data to be hashed when generating or + * verifying a signature. See 6.3.4 for the specification of the input to the + * hash. + * + * @param payload: contains data that is provided by the entity that invokes + * the SDS. + * + * @param headerInfo: contains additional data that is inserted by the SDS. + * This structure is used as follows to determine the "data input" to the + * hash operation for signing or verification as specified in 5.3.1.2.2 or + * 5.3.1.3. + * - If payload does not contain the field omitted, the data input to the + * hash operation is the COER encoding of the ToBeSignedData. + * - If payload field in this ToBeSignedData instance contains the field + * omitted, the data input to the hash operation is the COER encoding of the + * ToBeSignedData, concatenated with the hash of the omitted payload. The hash + * of the omitted payload is calculated with the same hash algorithm that is + * used to calculate the hash of the data input for signing or verification. + * The data input to the hash operation is simply the COER enocding of the + * ToBeSignedData, concatenated with the hash of the omitted payload: there is + * no additional wrapping or length indication. As noted in 5.2.4.3.4, the + * means by which the signer and verifier establish the contents of the + * omitted payload are out of scope for this standard. + * + * @note Canonicalization: This data structure is subject to canonicalization + * for the relevant operations specified in 6.1.2. The canonicalization + * applies to the SignedDataPayload if it is of type data, and to the + * HeaderInfo. + */ +ToBeSignedData ::= SEQUENCE { + payload SignedDataPayload, + headerInfo HeaderInfo +} + +/** + * @brief This structure contains the data payload of a ToBeSignedData. This + * structure contains at least one of the optional elements, and may contain + * more than one. See 5.2.4.3.4 for more details. + * The security profile in Annex C allows an implementation of this standard + * to state which forms of Signed¬Data¬Payload are supported by that + * implementation, and also how the signer and verifier are intended to obtain + * the external data for hashing. The specification of an SDEE that uses + * external data is expected to be explicit and unambiguous about how this + * data is obtained and how it is formatted prior to processing by the hash + * function. + * + * @param data: contains data that is explicitly transported within the + * structure. + * + * @param extDataHash: contains the hash of data that is not explicitly + * transported within the structure, and which the creator of the structure + * wishes to cryptographically bind to the signature. + * + * @param omitted: indicates that there is external data to be included in the + * hash calculation for the signature.The mechanism for including the external + * data in the hash calculation is specified in 6.3.6. + * + * @note Canonicalization: This data structure is subject to canonicalization + * for the relevant operations specified in 6.1.2. The canonicalization + * applies to the Ieee1609Dot2Data. + */ +SignedDataPayload ::= SEQUENCE { + data Ieee1609Dot2Data OPTIONAL, + extDataHash HashedData OPTIONAL, + ..., + omitted NULL OPTIONAL +} (WITH COMPONENTS {..., data PRESENT} | + WITH COMPONENTS {..., extDataHash PRESENT} | + WITH COMPONENTS {..., omitted PRESENT}) + + +/** + * @brief This structure contains the hash of some data with a specified hash + * algorithm. See 5.3.3 for specification of the permitted hash algorithms. + * + * @param sha256HashedData: indicates data hashed with SHA-256. + * + * @param sha384HashedData: indicates data hashed with SHA-384. + * + * @param sm3HashedData: indicates data hashed with SM3. + * + * @note Critical information fields: If present, this is a critical + * information field as defined in 5.2.6. An implementation that does not + * recognize the indicated CHOICE for this type when verifying a signed SPDU + * shall indicate that the signed SPDU is invalid in the sense of 4.2.2.3.2, + * that is, it is invalid in the sense that its validity cannot be established. + */ +HashedData::= CHOICE { + sha256HashedData HashedId32, + ..., + sha384HashedData HashedId48, + sm3HashedData HashedId32 +} + +/** + * @brief This structure contains information that is used to establish + * validity by the criteria of 5.2. + * + * @param psid: indicates the application area with which the sender is + * claiming the payload is to be associated. + * + * @param generationTime: indicates the time at which the structure was + * generated. See 5.2.5.2.2 and 5.2.5.2.3 for discussion of the use of this + * field. + * + * @param expiryTime: if present, contains the time after which the data + * is no longer considered relevant. If both generationTime and + * expiryTime are present, the signed SPDU is invalid if generationTime is + * not strictly earlier than expiryTime. + * + * @param generationLocation: if present, contains the location at which the + * signature was generated. + * + * @param p2pcdLearningRequest: if present, is used by the SDS to request + * certificates for which it has seen identifiers and does not know the + * entire certificate. A specification of this peer-to-peer certificate + * distribution (P2PCD) mechanism is given in Clause 8. This field is used + * for the separate-certificate-pdu flavor of P2PCD and shall only be present + * if inlineP2pcdRequest is not present. The HashedId3 is calculated with the + * whole-certificate hash algorithm, determined as described in 6.4.3, + * applied to the COER-encoded certificate, canonicalized as defined in the + * definition of Certificate. + * + * @param missingCrlIdentifier: if present, is used by the SDS to request + * CRLs which it knows to have been issued and have not received. This is + * provided for future use and the associated mechanism is not defined in + * this version of this standard. + * + * @param encryptionKey: if present, is used to provide a key that is to + * be used to encrypt at least one response to this SPDU. The SDEE + * specification is expected to specify which response SPDUs are to be + * encrypted with this key. One possible use of this key to encrypt a + * response is specified in 6.3.35, 6.3.37, and 6.3.34. An encryptionKey + * field of type symmetric should only be used if the SignedData containing + * this field is securely encrypted by some means. + * + * @param inlineP2pcdRequest: if present, is used by the SDS to request + * unknown certificates per the inline peer-to-peer certificate distribution + * mechanism is given in Clause 8. This field shall only be present if + * p2pcdLearningRequest is not present. The HashedId3 is calculated with the + * whole-certificate hash algorithm, determined as described in 6.4.3, applied + * to the COER-encoded certificate, canonicalized as defined in the definition + * of Certificate. + * + * @param requestedCertificate: if present, is used by the SDS to provide + * certificates per the "inline" version of the peer-to-peer certificate + * distribution mechanism given in Clause 8. + * + * @param pduFunctionalType: if present, is used to indicate that the SPDU is + * to be consumed by a process other than an application process as defined + * in ISO 21177 [B14a]. See 6.3.23b for more details. + * + * @param contributedExtensions: if present, is used to contain additional + * extensions defined using the ContributedExtensionBlocks structure. + * + * @note Canonicalization: This data structure is subject to canonicalization + * for the relevant operations specified in 6.1.2. The canonicalization + * applies to the EncryptionKey. If encryptionKey is present, and indicates + * the choice public, and contains a BasePublicEncryptionKey that is an + * elliptic curve point (i.e., of type EccP256CurvePoint or + * EccP384CurvePoint), then the elliptic curve point is encoded in compressed + * form, i.e., such that the choice indicated within the Ecc*CurvePoint is + * compressed-y-0 or compressed-y-1. + * The canonicalization does not apply to any fields after the extension + * marker, including any fields in contributedExtensions. + */ +HeaderInfo ::= SEQUENCE { + psid Psid, + generationTime Time64 OPTIONAL, + expiryTime Time64 OPTIONAL, + generationLocation ThreeDLocation OPTIONAL, + p2pcdLearningRequest HashedId3 OPTIONAL, + missingCrlIdentifier MissingCrlIdentifier OPTIONAL, + encryptionKey EncryptionKey OPTIONAL, + ..., + inlineP2pcdRequest SequenceOfHashedId3 OPTIONAL, + requestedCertificate Certificate OPTIONAL, + pduFunctionalType PduFunctionalType OPTIONAL, + contributedExtensions ContributedExtensionBlocks OPTIONAL +} + +/** + * @brief This structure may be used to request a CRL that the SSME knows to + * have been issued and has not yet received. It is provided for future use + * and its use is not defined in this version of this standard. + * + * @param cracaId: is the HashedId3 of the CRACA, as defined in 5.1.3. The + * HashedId3 is calculated with the whole-certificate hash algorithm, + * determined as described in 6.4.3, applied to the COER-encoded certificate, + * canonicalized as defined in the definition of Certificate. + * + * @param crlSeries: is the requested CRL Series value. See 5.1.3 for more + * information. + */ +MissingCrlIdentifier ::= SEQUENCE { + cracaId HashedId3, + crlSeries CrlSeries, + ... +} + +/** + * @brief This data structure identifies the functional entity that is + * intended to consume an SPDU, for the case where that functional entity is + * not an application process, and are instead security support services for an + * application process. Further details and the intended use of this field are + * defined in ISO 21177 [B20]. + * + * @param tlsHandshake: indicates that the Signed SPDU is not to be directly + * consumed as an application PDU and is to be used to provide information + * about the holder’s permissions to a Transport Layer Security (TLS) + * (IETF 5246 [B15], IETF 8446 [B16]) handshake process operating to secure + * communications to an application process. See IETF [B15] and ISO 21177 + * [B20] for further information. + * + * @param iso21177ExtendedAuth: indicates that the Signed SPDU is not to be + * directly consumed as an application PDU and is to be used to provide + * additional information about the holder’s permissions to the ISO 21177 + * Security Subsystem for an application process. See ISO 21177 [B20] for + * further information. + * + * @param iso21177SessionExtension: indicates that the Signed SPDU is not to + * be directly consumed as an application PDU and is to be used to extend an + * existing ISO 21177 secure session. This enables a secure session to + * persist beyond the lifetime of the certificates used to establish that + * session. + */ +PduFunctionalType ::= INTEGER (0..255) + +tlsHandshake PduFunctionalType ::= 1 +iso21177ExtendedAuth PduFunctionalType ::= 2 +iso21177SessionExtension PduFunctionalType ::= 3 + + +/** + * @brief This type is used for clarity of definitions. + */ +ContributedExtensionBlocks ::= SEQUENCE (SIZE(1..MAX)) OF + ContributedExtensionBlock + +/** + * @brief This data structure defines the format of an extension block + * provided by an identified contributor by using the temnplate provided + * in the class IEEE1609DOT2-HEADERINFO-CONTRIBUTED-EXTENSION constraint + * to the objects in the set Ieee1609Dot2HeaderInfoContributedExtensions. + * + * @param contributorId: uniquely identifies the contributor. + * + * @param extns: contains a list of extensions from that contributor. + * Extensions are expected and not required to follow the format specified + * in 6.5. + */ +ContributedExtensionBlock ::= SEQUENCE { + contributorId IEEE1609DOT2-HEADERINFO-CONTRIBUTED-EXTENSION.&id({ + Ieee1609Dot2HeaderInfoContributedExtensions + }), + extns SEQUENCE (SIZE(1..MAX)) OF + IEEE1609DOT2-HEADERINFO-CONTRIBUTED-EXTENSION.&Extn({ + Ieee1609Dot2HeaderInfoContributedExtensions + }{@.contributorId}) +} + +/** + * @brief This Information Object Class defines the class that provides a + * template for defining extension blocks. + */ +IEEE1609DOT2-HEADERINFO-CONTRIBUTED-EXTENSION ::= CLASS { + &id HeaderInfoContributorId UNIQUE, + &Extn +} WITH SYNTAX {&Extn IDENTIFIED BY &id} + +/** + * @brief This structure is an ASN.1 Information Object Set listing the + * defined contributed extension types and the associated + * HeaderInfoContributorId values. In this version of this standard two + * extension types are defined: Ieee1609ContributedHeaderInfoExtension and + * EtsiOriginatingHeaderInfoExtension. + */ +Ieee1609Dot2HeaderInfoContributedExtensions + IEEE1609DOT2-HEADERINFO-CONTRIBUTED-EXTENSION ::= { + {Ieee1609ContributedHeaderInfoExtension IDENTIFIED BY + ieee1609HeaderInfoContributorId} | + {EtsiOriginatingHeaderInfoExtension IDENTIFIED BY + etsiHeaderInfoContributorId}, + ... +} + +/** + * @brief This is an integer used to identify a HeaderInfo extension + * contributing organization. In this version of this standard two values are + * defined: + * - ieee1609OriginatingExtensionId indicating extensions originating with + * IEEE 1609. + * - etsiOriginatingExtensionId indicating extensions originating with + * ETSI TC ITS. + */ +HeaderInfoContributorId ::= INTEGER (0..255) + +ieee1609HeaderInfoContributorId HeaderInfoContributorId ::= 1 +etsiHeaderInfoContributorId HeaderInfoContributorId ::= 2 + + +/** + * @brief This structure allows the recipient of data to determine which + * keying material to use to authenticate the data. It also indicates the + * verification type to be used to generate the hash for verification, as + * specified in 5.3.1. + * + * @param digest: If the choice indicated is digest: + * - The structure contains the HashedId8 of the relevant certificate. The + * HashedId8 is calculated with the whole-certificate hash algorithm, + * determined as described in 6.4.3. + * - The verification type is certificate and the certificate data + * passed to the hash function as specified in 5.3.1 is the authorization + * certificate. + * + * @param certificate: If the choice indicated is certificate: + * - The structure contains one or more Certificate structures, in order + * such that the first certificate is the authorization certificate and each + * subsequent certificate is the issuer of the one before it. + * - The verification type is certificate and the certificate data + * passed to the hash function as specified in 5.3.1 is the authorization + * certificate. + * + * @param self: If the choice indicated is self: + * - The structure does not contain any data beyond the indication that + * the choice value is self. + * - The verification type is self-signed. + * + * @note Critical information fields: + * - If present, this is a critical information field as defined in 5.2.6. + * An implementation that does not recognize the CHOICE value for this type + * when verifying a signed SPDU shall indicate that the signed SPDU is invalid. + * - If present, certificate is a critical information field as defined in + * 5.2.6. An implementation that does not support the number of certificates + * in certificate when verifying a signed SPDU shall indicate that the signed + * SPDU is invalid. A compliant implementation shall support certificate + * fields containing at least one certificate. + * + * @note Canonicalization: This data structure is subject to canonicalization + * for the relevant operations specified in 6.1.2. The canonicalization + * applies to every Certificate in the certificate field. + */ +SignerIdentifier ::= CHOICE { + digest HashedId8, + certificate SequenceOfCertificate, + self NULL, + ... +} + +/** + * @brief This data structure is used to perform a countersignature over an + * already-signed SPDU. This is the profile of an Ieee1609Dot2Data containing + * a signedData. The tbsData within content is composed of a payload + * containing the hash (extDataHash) of the externally generated, pre-signed + * SPDU over which the countersignature is performed. + */ +Countersignature ::= Ieee1609Dot2Data (WITH COMPONENTS {..., + content (WITH COMPONENTS {..., + signedData (WITH COMPONENTS {..., + tbsData (WITH COMPONENTS {..., + payload (WITH COMPONENTS {..., + data ABSENT, + extDataHash PRESENT + }), + headerInfo(WITH COMPONENTS {..., + generationTime PRESENT, + expiryTime ABSENT, + generationLocation ABSENT, + p2pcdLearningRequest ABSENT, + missingCrlIdentifier ABSENT, + encryptionKey ABSENT + }) + }) + }) + }) +}) + + +--***************************************************************************-- +-- Encrypted Data -- +--***************************************************************************-- + +/** + * @brief This data structure encodes data that has been encrypted to one or + * more recipients using the recipients’ public or symmetric keys as + * specified in 5.3.4. + * + * @param recipients: contains one or more RecipientInfos. These entries may + * be more than one RecipientInfo, and more than one type of RecipientInfo, + * as long as all entries are indicating or containing the same data encryption + * key. + * + * @param ciphertext: contains the encrypted data. This is the encryption of + * an encoded Ieee1609Dot2Data structure as specified in 5.3.4.2. + * + * @note Critical information fields: + * - If present, recipients is a critical information field as defined in + * 5.2.6. An implementation that does not support the number of RecipientInfo + * in recipients when decrypted shall indicate that the encrypted SPDU could + * not be decrypted due to unsupported critical information fields. A + * compliant implementation shall support recipients fields containing at + * least eight entries. + * + * @note If the plaintext is raw data, i.e., it has not been output from a + * previous operation of the SDS, then it is trivial to encapsulate it in an + * Ieee1609Dot2Data of type unsecuredData as noted in 4.2.2.2.2. For example, + * '03 80 08 01 23 45 67 89 AB CD EF' is the C-OER encoding of '01 23 45 67 + * 89 AB CD EF' encapsulated in an Ieee1609Dot2Data of type unsecuredData. + * The first byte of the encoding 03 is the protocolVersion, the second byte + * 80 indicates the choice unsecuredData, and the third byte 08 is the length + * of the raw data '01 23 45 67 89 AB CD EF'. + */ +EncryptedData ::= SEQUENCE { + recipients SequenceOfRecipientInfo, + ciphertext SymmetricCiphertext +} + +/** + * @brief This data structure is used to transfer the data encryption key to + * an individual recipient of an EncryptedData. The option pskRecipInfo is + * selected if the EncryptedData was encrypted using the static encryption + * key approach specified in 5.3.4. The other options are selected if the + * EncryptedData was encrypted using the ephemeral encryption key approach + * specified in 5.3.4. The meanings of the choices are: + * + * See Annex C.7 for guidance on when it may be appropriate to use + * each of these approaches. + * + * @param pskRecipInfo: The data was encrypted directly using a pre-shared + * symmetric key. + * + * @param symmRecipInfo: The data was encrypted with a data encryption key, + * and the data encryption key was encrypted using a symmetric key. + * + * @param certRecipInfo: The data was encrypted with a data encryption key, + * the data encryption key was encrypted using a public key encryption scheme, + * where the public encryption key was obtained from a certificate. In this + * case, the parameter P1 to ECIES as defined in 5.3.5 is the hash of the + * certificate, calculated with the whole-certificate hash algorithm, + * determined as described in 6.4.3, applied to the COER-encoded certificate, + * canonicalized as defined in the definition of Certificate. + * + * @note If the encryption algorithm is SM2, there is no equivalent of the + * parameter P1 and so no input to the encryption process that uses the hash + * of the certificate. + * + * @param signedDataRecipInfo: The data was encrypted with a data encryption + * key, the data encryption key was encrypted using a public key encryption + * scheme, where the public encryption key was obtained as the public response + * encryption key from a SignedData. In this case, if ECIES is the encryption + * algorithm, then the parameter P1 to ECIES as defined in 5.3.5 is the + * SHA-256 hash of the Ieee1609Dot2Data of type signedData containing the + * response encryption key, canonicalized as defined in the definition of + * Ieee1609Dot2Data. + * + * @note If the encryption algorithm is SM2, there is no equivalent of the + * parameter P1 and so no input to the encryption process that uses the hash + * of the Ieee1609Dot2Data. + * + * @param rekRecipInfo: The data was encrypted with a data encryption key, + * the data encryption key was encrypted using a public key encryption scheme, + * where the public encryption key was not obtained from a Signed-Data or a + * certificate. In this case, the SDEE specification is expected to specify + * how the public key is obtained, and if ECIES is the encryption algorithm, + * then the parameter P1 to ECIES as defined in 5.3.5 is the hash of the + * empty string. + * + * @note If the encryption algorithm is SM2, there is no equivalent of the + * parameter P1 and so no input to the encryption process that uses the hash + * of the empty string. + * + * @note The material input to encryption is the bytes of the encryption key + * with no headers, encapsulation, or length indication. Contrast this to + * encryption of data, where the data is encapsulated in an Ieee1609Dot2Data. + */ +RecipientInfo ::= CHOICE { + pskRecipInfo PreSharedKeyRecipientInfo, + symmRecipInfo SymmRecipientInfo, + certRecipInfo PKRecipientInfo, + signedDataRecipInfo PKRecipientInfo, + rekRecipInfo PKRecipientInfo +} + +/** + * @brief This type is used for clarity of definitions. + */ +SequenceOfRecipientInfo ::= SEQUENCE OF RecipientInfo + +/** + * @brief This data structure is used to indicate a symmetric key that may + * be used directly to decrypt a SymmetricCiphertext. It consists of the + * low-order 8 bytes of the hash of the COER encoding of a + * SymmetricEncryptionKey structure containing the symmetric key in question. + * The HashedId8 is calculated with the hash algorithm determined as + * specified in 5.3.9.3. The symmetric key may be established by any + * appropriate means agreed by the two parties to the exchange. + */ +PreSharedKeyRecipientInfo ::= HashedId8 + +/** + * @brief This data structure contains the following fields: + * + * @param recipientId: contains the hash of the symmetric key encryption key + * that may be used to decrypt the data encryption key. It consists of the + * low-order 8 bytes of the hash of the COER encoding of a + * SymmetricEncryptionKey structure containing the symmetric key in question. + * The HashedId8 is calculated with the hash algorithm determined as + * specified in 5.3.9.4. The symmetric key may be established by any + * appropriate means agreed by the two parties to the exchange. + * + * @param encKey: contains the encrypted data encryption key within a + * SymmetricCiphertext, where the data encryption key is input to the data + * encryption key encryption process with no headers, encapsulation, or + * length indication. + */ +SymmRecipientInfo ::= SEQUENCE { + recipientId HashedId8, + encKey SymmetricCiphertext +} + +/** + * @brief This data structure contains the following fields: + * + * @param recipientId: contains the hash of the container for the encryption + * public key as specified in the definition of RecipientInfo. Specifically, + * depending on the choice indicated by the containing RecipientInfo structure: + * - If the containing RecipientInfo structure indicates certRecipInfo, + * this field contains the HashedId8 of the certificate. The HashedId8 is + * calculated with the whole-certificate hash algorithm, determined as + * described in 6.4.3, applied to the COER-encoded certificate, canonicalized + * as defined in the definition of Certificate. + * - If the containing RecipientInfo structure indicates + * signedDataRecipInfo, this field contains the HashedId8 of the + * Ieee1609Dot2Data of type signedData that contained the encryption key, + * with that Ieee¬¬1609¬Dot2¬¬Data canonicalized per 6.3.4. The HashedId8 is + * calculated with the hash algorithm determined as specified in 5.3.9.5. + * - If the containing RecipientInfo structure indicates rekRecipInfo, this + * field contains the HashedId8 of the COER encoding of a PublicEncryptionKey + * structure containing the response encryption key. The HashedId8 is + * calculated with the hash algorithm determined as specified in 5.3.9.5. + * + * @param encKey: contains the encrypted data encryption key, where the data + * encryption key is input to the data encryption key encryption process with + * no headers, encapsulation, or length indication. + */ +PKRecipientInfo ::= SEQUENCE { + recipientId HashedId8, + encKey EncryptedDataEncryptionKey +} + +/** + * @brief This data structure contains an encrypted data encryption key, + * where the data encryption key is input to the data encryption key + * encryption process with no headers, encapsulation, or length indication. + * + * Critical information fields: If present and applicable to + * the receiving SDEE, this is a critical information field as defined in + * 5.2.6. If an implementation receives an encrypted SPDU and determines that + * one or more RecipientInfo fields are relevant to it, and if all of those + * RecipientInfos contain an EncryptedDataEncryptionKey such that the + * implementation does not recognize the indicated CHOICE, the implementation + * shall indicate that the encrypted SPDU is not decryptable. + */ +EncryptedDataEncryptionKey ::= CHOICE { + eciesNistP256 EciesP256EncryptedKey, + eciesBrainpoolP256r1 EciesP256EncryptedKey, + ..., + ecencSm2256 EcencP256EncryptedKey +} + +/** + * @brief This data structure encapsulates a ciphertext generated with an + * approved symmetric algorithm. + * + * @note Critical information fields: If present, this is a critical + * information field as defined in 5.2.6. An implementation that does not + * recognize the indicated CHOICE value for this type in an encrypted SPDU + * shall indicate that the signed SPDU is invalid in the sense of 4.2.2.3.2, + * that is, it is invalid in the sense that its validity cannot be established. + */ +SymmetricCiphertext ::= CHOICE { + aes128ccm One28BitCcmCiphertext, + ..., + sm4Ccm One28BitCcmCiphertext +} + +/** + * @brief This data structure encapsulates an encrypted ciphertext for any + * symmetric algorithm with 128-bit blocks in CCM mode. The ciphertext is + * 16 bytes longer than the corresponding plaintext due to the inclusion of + * the message authentication code (MAC). The plaintext resulting from a + * correct decryption of the ciphertext is either a COER-encoded + * Ieee1609Dot2Data structure (see 6.3.41), or a 16-byte symmetric key + * (see 6.3.44). + * + * The ciphertext is 16 bytes longer than the corresponding plaintext. + * + * The plaintext resulting from a correct decryption of the + * ciphertext is a COER-encoded Ieee1609Dot2Data structure. + * + * @param nonce: contains the nonce N as specified in 5.3.8. + * + * @param ccmCiphertext: contains the ciphertext C as specified in 5.3.8. + * + * @note In the name of this structure, "One28" indicates that the + * symmetric cipher block size is 128 bits. It happens to also be the case + * that the keys used for both AES-128-CCM and SM4-CCM are also 128 bits long. + * This is, however, not what “One28” refers to. Since the cipher is used in + * counter mode, i.e., as a stream cipher, the fact that that block size is 128 + * bits affects only the size of the MAC and does not affect the size of the + * raw ciphertext. + */ +One28BitCcmCiphertext ::= SEQUENCE { + nonce OCTET STRING (SIZE (12)), + ccmCiphertext Opaque +} + +/** + * @brief This type is defined only for backwards compatibility. + */ +Aes128CcmCiphertext ::= One28BitCcmCiphertext + +--***************************************************************************-- +-- Certificates and other Security Management -- +--***************************************************************************-- + +/** + * @brief This structure is a profile of the structure CertificateBase which + * specifies the valid combinations of fields to transmit implicit and + * explicit certificates. + * + * @note Canonicalization: This data structure is subject to canonicalization + * for the relevant operations specified in 6.1.2. The canonicalization + * applies to the CertificateBase. + */ +Certificate ::= + CertificateBase (ImplicitCertificate | ExplicitCertificate) + +TestCertificate ::= Certificate + +/** + * @brief This type is used for clarity of definitions. + */ +SequenceOfCertificate ::= SEQUENCE OF Certificate + +/** + * @brief The fields in this structure have the following meaning: + * + * @param version: contains the version of the certificate format. In this + * version of the data structures, this field is set to 3. + * + * @param type: states whether the certificate is implicit or explicit. This + * field is set to explicit for explicit certificates and to implicit for + * implicit certificates. See ExplicitCertificate and ImplicitCertificate for + * more details. + * + * @param issuer: identifies the issuer of the certificate. + * + * @param toBeSigned: is the certificate contents. This field is an input to + * the hash when generating or verifying signatures for an explicit + * certificate, or generating or verifying the public key from the + * reconstruction value for an implicit certificate. The details of how this + * field are encoded are given in the description of the + * ToBeSignedCertificate type. + * + * @param signature: is included in an ExplicitCertificate. It is the + * signature, calculated by the signer identified in the issuer field, over + * the hash of toBeSigned. The hash is calculated as specified in 5.3.1, where: + * - Data input is the encoding of toBeSigned following the COER. + * - Signer identifier input depends on the verification type, which in + * turn depends on the choice indicated by issuer. If the choice indicated by + * issuer is self, the verification type is self-signed and the signer + * identifier input is the empty string. If the choice indicated by issuer is + * not self, the verification type is certificate and the signer identifier + * input is the canonicalized COER encoding of the certificate indicated by + * issuer. The canonicalization is carried out as specified in the + * Canonicalization section of this subclause. + * + * @note Canonicalization: This data structure is subject to canonicalization + * for the relevant operations specified in 6.1.2. The canonicalization + * applies to the ToBeSignedCertificate and to the Signature. + * + * @note Whole-certificate hash: If the entirety of a certificate is hashed + * to calculate a HashedId3, HashedId8, or HashedId10, the algorithm used for + * this purpose is known as the whole-certificate hash. The method used to + * determine the whole-certificate hash algorithm is specified in 5.3.9.2. + */ +CertificateBase ::= SEQUENCE { + version Uint8(3), + type CertificateType, + issuer IssuerIdentifier, + toBeSigned ToBeSignedCertificate, + signature Signature OPTIONAL +} + +/** + * @brief This enumerated type indicates whether a certificate is explicit or + * implicit. + * + * @note Critical information fields: If present, this is a critical + * information field as defined in 5.2.5. An implementation that does not + * recognize the indicated CHOICE for this type when verifying a signed SPDU + * shall indicate that the signed SPDU is invalid in the sense of 4.2.2.3.2, + * that is, it is invalid in the sense that its validity cannot be + * established. + */ +CertificateType ::= ENUMERATED { + explicit, + implicit, + ... +} + +/** + * @brief This is a profile of the CertificateBase structure providing all + * the fields necessary for an implicit certificate, and no others. + */ +ImplicitCertificate ::= CertificateBase (WITH COMPONENTS {..., + type(implicit), + toBeSigned(WITH COMPONENTS {..., + verifyKeyIndicator(WITH COMPONENTS {reconstructionValue}) + }), + signature ABSENT +}) + +/** + * @brief This is a profile of the CertificateBase structure providing all + * the fields necessary for an explicit certificate, and no others. + */ +ExplicitCertificate ::= CertificateBase (WITH COMPONENTS {..., + type(explicit), + toBeSigned (WITH COMPONENTS {..., + verifyKeyIndicator(WITH COMPONENTS {verificationKey}) + }), + signature PRESENT +}) + +/** + * @brief This structure allows the recipient of a certificate to determine + * which keying material to use to authenticate the certificate. + * + * If the choice indicated is sha256AndDigest, sha384AndDigest, or + * sm3AndDigest: + * - The structure contains the HashedId8 of the issuing certificate. The + * HashedId8 is calculated with the whole-certificate hash algorithm, + * determined as described in 6.4.3, applied to the COER-encoded certificate, + * canonicalized as defined in the definition of Certificate. + * - The hash algorithm to be used to generate the hash of the certificate + * for verification is SHA-256 (in the case of sha256AndDigest), SM3 (in the + * case of sm3AndDigest) or SHA-384 (in the case of sha384AndDigest). + * - The certificate is to be verified with the public key of the + * indicated issuing certificate. + * + * If the choice indicated is self: + * - The structure indicates what hash algorithm is to be used to generate + * the hash of the certificate for verification. + * - The certificate is to be verified with the public key indicated by + * the verifyKeyIndicator field in theToBeSignedCertificate. + * + * @note Critical information fields: If present, this is a critical + * information field as defined in 5.2.5. An implementation that does not + * recognize the indicated CHOICE for this type when verifying a signed SPDU + * shall indicate that the signed SPDU is invalid in the sense of 4.2.2.3.2, + * that is, it is invalid in the sense that its validity cannot be + * established. + */ +IssuerIdentifier ::= CHOICE { + sha256AndDigest HashedId8, + self HashAlgorithm, + ..., + sha384AndDigest HashedId8, + sm3AndDigest HashedId8 +} + +/** + * @brief The fields in the ToBeSignedCertificate structure have the + * following meaning: + * + * For both implicit and explicit certificates, when the certificate + * is hashed to create or recover the public key (in the case of an implicit + * certificate) or to generate or verify the signature (in the case of an + * explicit certificate), the hash is Hash (Data input) || Hash ( + * Signer identifier input), where: + * - Data input is the COER encoding of toBeSigned, canonicalized + * as described above. + * - Signer identifier input depends on the verification type, + * which in turn depends on the choice indicated by issuer. If the choice + * indicated by issuer is self, the verification type is self-signed and the + * signer identifier input is the empty string. If the choice indicated by + * issuer is not self, the verification type is certificate and the signer + * identifier input is the COER encoding of the canonicalization per 6.4.3 of + * the certificate indicated by issuer. + * + * In other words, for implicit certificates, the value H (CertU) in SEC 4, + * section 3, is for purposes of this standard taken to be H [H + * (canonicalized ToBeSignedCertificate from the subordinate certificate) || + * H (entirety of issuer Certificate)]. See 5.3.2 for further discussion, + * including material differences between this standard and SEC 4 regarding + * how the hash function output is converted from a bit string to an integer. + * + * @param id: contains information that is used to identify the certificate + * holder if necessary. + * + * @param cracaId: identifies the Certificate Revocation Authorization CA + * (CRACA) responsible for certificate revocation lists (CRLs) on which this + * certificate might appear. Use of the cracaId is specified in 5.1.3. The + * HashedId3 is calculated with the whole-certificate hash algorithm, + * determined as described in 6.4.3, applied to the COER-encoded certificate, + * canonicalized as defined in the definition of Certificate. + * + * @param crlSeries: represents the CRL series relevant to a particular + * Certificate Revocation Authorization CA (CRACA) on which the certificate + * might appear. Use of this field is specified in 5.1.3. + * + * @param validityPeriod: contains the validity period of the certificate. + * + * @param region: if present, indicates the validity region of the + * certificate. If it is omitted the validity region is indicated as follows: + * - If enclosing certificate is self-signed, i.e., the choice indicated + * by the issuer field in the enclosing certificate structure is self, the + * certificate is valid worldwide. + * - Otherwise, the certificate has the same validity region as the + * certificate that issued it. + * + * @param assuranceLevel: indicates the assurance level of the certificate + * holder. + * + * @param appPermissions: indicates the permissions that the certificate + * holder has to sign application data with this certificate. A valid + * instance of appPermissions contains any particular Psid value in at most + * one entry. + * + * @param certIssuePermissions: indicates the permissions that the certificate + * holder has to sign certificates with this certificate. A valid instance of + * this array contains no more than one entry whose psidSspRange field + * indicates all. If the array has multiple entries and one entry has its + * psidSspRange field indicate all, then the entry indicating all specifies + * the permissions for all PSIDs other than the ones explicitly specified in + * the other entries. See the description of PsidGroupPermissions for further + * discussion. + * + * @param certRequestPermissions: indicates the permissions that the + * certificate holder can request in its certificate. A valid instance of this + * array contains no more than one entry whose psidSspRange field indicates + * all. If the array has multiple entries and one entry has its psidSspRange + * field indicate all, then the entry indicating all specifies the permissions + * for all PSIDs other than the ones explicitly specified in the other entries. + * See the description of PsidGroupPermissions for further discussion. + * + * @param canRequestRollover: indicates that the certificate may be used to + * sign a request for another certificate with the same permissions. This + * field is provided for future use and its use is not defined in this + * version of this standard. + * + * @param encryptionKey: contains a public key for encryption for which the + * certificate holder holds the corresponding private key. + * + * @param verifyKeyIndicator: contains material that may be used to recover + * the public key that may be used to verify data signed by this certificate. + * + * @param flags: indicates additional yes/no properties of the certificate + * holder. The only bit with defined semantics in this string in this version + * of this standard is usesCubk. If set, the usesCubk bit indicates that the + * certificate holder supports the compact unified butterfly key response. + * Further material about the compact unified butterfly key response can be + * found in IEEE Std 1609.2.1. + * + * @note usesCubk is only relevant for CA certificates, and the only + * functionality defined associated with this field is associated with + * consistency checks on received certificate responses. No functionality + * associated with communications between peer SDEEs is defined associated + * with this field. + * + * @param appExtensions: indicates additional permissions that may be applied + * to application activities that the certificate holder is carrying out. + * + * @param certIssueExtensions: indicates additional permissions to issue + * certificates containing endEntityExtensions. + * + * @param certRequestExtensions: indicates additional permissions to request + * certificates containing endEntityExtensions. + * + * @note Canonicalization: This data structure is subject to canonicalization + * for the relevant operations specified in 6.1.2. The canonicalization + * applies to the PublicEncryptionKey and to the VerificationKeyIndicator. + * + * If the PublicEncryptionKey contains a BasePublicEncryptionKey that is an + * elliptic curve point (i.e., of type EccP256CurvePoint or EccP384CurvePoint), + * then the elliptic curve point is encoded in compressed form, i.e., such + * that the choice indicated within the Ecc*CurvePoint is compressed-y-0 or + * compressed-y-1. + * + * @note Critical information fields: + * - If present, appPermissions is a critical information field as defined + * in 5.2.6. If an implementation of verification does not support the number + * of PsidSsp in the appPermissions field of a certificate that signed a + * signed SPDU, that implementation shall indicate that the signed SPDU is + * invalid in the sense of 4.2.2.3.2, that is, it is invalid in the sense + * that its validity cannot be established.. A conformant implementation + * shall support appPermissions fields containing at least eight entries. + * It may be the case that an implementation of verification does not support + * the number of entries in the appPermissions field and the appPermissions + * field is not relevant to the verification: this will occur, for example, + * if the certificate in question is a CA certificate and so the + * certIssuePermissions field is relevant to the verification and the + * appPermissions field is not. In this case, whether the implementation + * indicates that the signed SPDU is valid (because it could validate all + * relevant fields) or invalid (because it could not parse the entire + * certificate) is implementation-specific. + * - If present, certIssuePermissions is a critical information field as + * defined in 5.2.6. If an implementation of verification does not support + * the number of PsidGroupPermissions in the certIssuePermissions field of a + * CA certificate in the chain of a signed SPDU, the implementation shall + * indicate that the signed SPDU is invalid in the sense of 4.2.2.3.2, that + * is, it is invalid in the sense that its validity cannot be established. + * A conformant implementation shall support certIssuePermissions fields + * containing at least eight entries. + * It may be the case that an implementation of verification does not support + * the number of entries in the certIssuePermissions field and the + * certIssuePermissions field is not relevant to the verification: this will + * occur, for example, if the certificate in question is the signing + * certificate for the SPDU and so the appPermissions field is relevant to + * the verification and the certIssuePermissions field is not. In this case, + * whether the implementation indicates that the signed SPDU is valid + * (because it could validate all relevant fields) or invalid (because it + * could not parse the entire certificate) is implementation-specific. + * - If present, certRequestPermissions is a critical information field as + * defined in 5.2.6. If an implementaiton of verification of a certificate + * request does not support the number of PsidGroupPermissions in + * certRequestPermissions, the implementation shall indicate that the signed + * SPDU is invalid in the sense of 4.2.2.3.2, that is, it is invalid in the + * sense that its validity cannot be established. A conformant implementation + * shall support certRequestPermissions fields containing at least eight + * entries. + * It may be the case that an implementation of verification does not support + * the number of entries in the certRequestPermissions field and the + * certRequestPermissions field is not relevant to the verification: this will + * occur, for example, if the certificate in question is the signing + * certificate for the SPDU and so the appPermissions field is relevant to + * the verification and the certRequestPermissions field is not. In this + * case, whether the implementation indicates that the signed SPDU is valid + * (because it could validate all relevant fields) or invalid (because it + * could not parse the entire certificate) is implementation-specific. + */ +ToBeSignedCertificate ::= SEQUENCE { + id CertificateId, + cracaId HashedId3, + crlSeries CrlSeries, + validityPeriod ValidityPeriod, + region GeographicRegion OPTIONAL, + assuranceLevel SubjectAssurance OPTIONAL, + appPermissions SequenceOfPsidSsp OPTIONAL, + certIssuePermissions SequenceOfPsidGroupPermissions OPTIONAL, + certRequestPermissions SequenceOfPsidGroupPermissions OPTIONAL, + canRequestRollover NULL OPTIONAL, + encryptionKey PublicEncryptionKey OPTIONAL, + verifyKeyIndicator VerificationKeyIndicator, + ..., + flags BIT STRING {usesCubk (0)} (SIZE (8)) OPTIONAL, + appExtensions SequenceOfAppExtensions, + certIssueExtensions SequenceOfCertIssueExtensions, + certRequestExtension SequenceOfCertRequestExtensions +} +(WITH COMPONENTS { ..., appPermissions PRESENT} | + WITH COMPONENTS { ..., certIssuePermissions PRESENT} | + WITH COMPONENTS { ..., certRequestPermissions PRESENT}) + +/** + * @brief This structure contains information that is used to identify the + * certificate holder if necessary. + * + * @param linkageData: is used to identify the certificate for revocation + * purposes in the case of certificates that appear on linked certificate + * CRLs. See 5.1.3 and 7.3 for further discussion. + * + * @param name: is used to identify the certificate holder in the case of + * non-anonymous certificates. The contents of this field are a matter of + * policy and are expected to be human-readable. + * + * @param binaryId: supports identifiers that are not human-readable. + * + * @param none: indicates that the certificate does not include an identifier. + * + * @note Critical information fields: + * - If present, this is a critical information field as defined in 5.2.6. + * An implementation that does not recognize the choice indicated in this + * field shall reject a signed SPDU as invalid. + */ +CertificateId ::= CHOICE { + linkageData LinkageData, + name Hostname, + binaryId OCTET STRING(SIZE(1..64)), + none NULL, + ... +} + +/** + * @brief This structure contains information that is matched against + * information obtained from a linkage ID-based CRL to determine whether the + * containing certificate has been revoked. See 5.1.3.4 and 7.3 for details + * of use. + */ +LinkageData ::= SEQUENCE { + iCert IValue, + linkage-value LinkageValue, + group-linkage-value GroupLinkageValue OPTIONAL +} + +/** + * @brief This type indicates which type of permissions may appear in + * end-entity certificates the chain of whose permissions passes through the + * PsidGroupPermissions field containing this value. If app is indicated, the + * end-entity certificate may contain an appPermissions field. If enroll is + * indicated, the end-entity certificate may contain a certRequestPermissions + * field. + */ +EndEntityType ::= + BIT STRING {app (0), enrol (1) } (SIZE (8)) (ALL EXCEPT {}) + +/** + * @brief This structure states the permissions that a certificate holder has + * with respect to issuing and requesting certificates for a particular set + * of PSIDs. For examples, see D.5.3 and D.5.4. + * + * @param subjectPermissions: indicates PSIDs and SSP Ranges covered by this + * field. + * + * @param minChainLength: and chainLengthRange indicate how long the + * certificate chain from this certificate to the end-entity certificate is + * permitted to be. As specified in 5.1.2.1, the length of the certificate + * chain is the number of certificates "below" this certificate in the chain, + * down to and including the end-entity certificate. The length is permitted + * to be (a) greater than or equal to minChainLength certificates and (b) + * less than or equal to minChainLength + chainLengthRange certificates. A + * value of 0 for minChainLength is not permitted when this type appears in + * the certIssuePermissions field of a ToBeSignedCertificate; a certificate + * that has a value of 0 for this field is invalid. The value -1 for + * chainLengthRange is a special case: if the value of chainLengthRange is -1 + * it indicates that the certificate chain may be any length equal to or + * greater than minChainLength. See the examples below for further discussion. + * + * @param eeType: takes one or more of the values app and enroll and indicates + * the type of certificates or requests that this instance of + * PsidGroupPermissions in the certificate is entitled to authorize. + * Different instances of PsidGroupPermissions within a ToBeSignedCertificate + * may have different values for eeType. + * - If this field indicates app, the chain is allowed to end in an + * authorization certificate, i.e., a certficate in which these permissions + * appear in an appPermissions field (in other words, if the field does not + * indicate app and the chain ends in an authorization certificate, the + * chain shall be considered invalid). + * - If this field indicates enroll, the chain is allowed to end in an + * enrollment certificate, i.e., a certificate in which these permissions + * appear in a certReqPermissions permissions field (in other words, if the + * field does not indicate enroll and the chain ends in an enrollment + * certificate, the chain shall be considered invalid). + */ +PsidGroupPermissions ::= SEQUENCE { + subjectPermissions SubjectPermissions, + minChainLength INTEGER DEFAULT 1, + chainLengthRange INTEGER DEFAULT 0, + eeType EndEntityType DEFAULT {app} +} + +/** + * @brief This type is used for clarity of definitions. + */ +SequenceOfPsidGroupPermissions ::= SEQUENCE OF PsidGroupPermissions + +/** + * @brief This indicates the PSIDs and associated SSPs for which certificate + * issuance or request permissions are granted by a PsidGroupPermissions + * structure. If this takes the value explicit, the enclosing + * PsidGroupPermissions structure grants certificate issuance or request + * permissions for the indicated PSIDs and SSP Ranges. If this takes the + * value all, the enclosing PsidGroupPermissions structure grants certificate + * issuance or request permissions for all PSIDs not indicated by other + * PsidGroupPermissions in the same certIssuePermissions or + * certRequestPermissions field. + * + * @note Critical information fields: + * - If present, this is a critical information field as defined in 5.2.6. + * An implementation that does not recognize the indicated CHOICE when + * verifying a signed SPDU shall indicate that the signed SPDU is + * invalidin the sense of 4.2.2.3.2, that is, it is invalid in the sense that + * its validity cannot be established. + * - If present, explicit is a critical information field as defined in + * 5.2.6. An implementation that does not support the number of PsidSspRange + * in explicit when verifying a signed SPDU shall indicate that the signed + * SPDU is invalid in the sense of 4.2.2.3.2, that is, it is invalid in the + * sense that its validity cannot be established. A conformant implementation + * shall support explicit fields containing at least eight entries. + */ +SubjectPermissions ::= CHOICE { + explicit SequenceOfPsidSspRange, + all NULL, + ... +} + +/** + * @brief The contents of this field depend on whether the certificate is an + * implicit or an explicit certificate. + * + * @param verificationKey: is included in explicit certificates. It contains + * the public key to be used to verify signatures generated by the holder of + * the Certificate. + * + * @param reconstructionValue: is included in implicit certificates. It + * contains the reconstruction value, which is used to recover the public key + * as specified in SEC 4 and 5.3.2. + * + * @note Critical information fields: If present, this is a critical + * information field as defined in 5.2.5. An implementation that does not + * recognize the indicated CHOICE for this type when verifying a signed SPDU + * shall indicate that the signed SPDU is invalid indicate that the signed + * SPDU is invalid in the sense of 4.2.2.3.2, that is, it is invalid in the + * sense that its validity cannot be established. + * + * @note Canonicalization: This data structure is subject to canonicalization + * for the relevant operations specified in 6.1.2. The canonicalization + * applies to the PublicVerificationKey and to the EccP256CurvePoint. The + * EccP256CurvePoint is encoded in compressed form, i.e., such that the + * choice indicated within the EccP256CurvePoint is compressed-y-0 or + * compressed-y-1. + */ +VerificationKeyIndicator ::= CHOICE { + verificationKey PublicVerificationKey, + reconstructionValue ReconstructionValue, + ... +} + +ReconstructionValue ::= EccP256CurvePoint + +/** + * @brief This structure uses the parameterized type Extension to define an + * Ieee1609ContributedHeaderInfoExtension as an open Extension Content field + * identified by an extension identifier. The extension identifier value is + * unique to extensions defined by ETSI and need not be unique among all + * extension identifier values defined by all contributing organizations. + */ +Ieee1609ContributedHeaderInfoExtension ::= + Extension{{Ieee1609HeaderInfoExtensions}} + +/** + * @brief This is an integer used to identify an + * Ieee1609ContributedHeaderInfoExtension. + */ +Ieee1609HeaderInfoExtensionId ::= ExtId + +p2pcd8ByteLearningRequestId Ieee1609HeaderInfoExtensionId ::= 1 + +/** + * @brief This is the ASN.1 Information Object Class that associates IEEE + * 1609 HeaderInfo contributed extensions with the appropriate + * Ieee1609HeaderInfoExtensionId value. + */ +Ieee1609HeaderInfoExtensions EXT-TYPE ::= { + {HashedId8 IDENTIFIED BY p2pcd8ByteLearningRequestId}, + ... +} + +/** + * @brief This structure contains any AppExtensions that apply to the + * certificate holder. As specified in 5.2.4.2.3, each individual + * AppExtension type is associated with consistency conditions, specific to + * that extension, that govern its consistency with SPDUs signed by the + * certificate holder and with the CertIssueExtensions in the CA certificates + * in that certificate holder’s chain. Those consistency conditions are + * specified for each individual AppExtension below. + */ +SequenceOfAppExtensions ::= SEQUENCE (SIZE(1..MAX)) OF AppExtension + +/** + * @brief This structure contains an individual AppExtension. AppExtensions + * specified in this standard are drawn from the ASN.1 Information Object Set + * SetCertExtensions. This set, and its use in the AppExtension type, is + * structured so that each AppExtension is associated with a + * CertIssueExtension and a CertRequestExtension and all are identified by + * the same id value. In this structure: + * + * @param id: identifies the extension type. + * + * @param content: provides the content of the extension. + */ +AppExtension ::= SEQUENCE { + id CERT-EXT-TYPE.&id({SetCertExtensions}), + content CERT-EXT-TYPE.&App({SetCertExtensions}{@.id}) +} + +/** + * @brief This field contains any CertIssueExtensions that apply to the + * certificate holder. As specified in 5.2.4.2.3, each individual + * CertIssueExtension type is associated with consistency conditions, + * specific to that extension, that govern its consistency with + * AppExtensions in certificates issued by the certificate holder and with + * the CertIssueExtensions in the CA certificates in that certificate + * holder’s chain. Those consistency conditions are specified for each + * individual CertIssueExtension below. + */ +SequenceOfCertIssueExtensions ::= + SEQUENCE (SIZE(1..MAX)) OF CertIssueExtension + +/** + * @brief This field contains an individual CertIssueExtension. + * CertIssueExtensions specified in this standard are drawn from the ASN.1 + * Information Object Set SetCertExtensions. This set, and its use in the + * CertIssueExtension type, is structured so that each CertIssueExtension + * is associated with a AppExtension and a CertRequestExtension and all are + * identified by the same id value. In this structure: + * + * @param id: identifies the extension type. + * + * @param permissions: indicates the permissions. Within this field. + * - all indicates that the certificate is entitled to issue all values of + * the extension. + * - specific is used to specify which values of the extension may be + * issued in the case where all does not apply. + */ +CertIssueExtension ::= SEQUENCE { + id CERT-EXT-TYPE.&id({SetCertExtensions}), + permissions CHOICE { + specific CERT-EXT-TYPE.&Issue({SetCertExtensions}{@.id}), + all NULL + } +} + +/** + * @brief This field contains any CertRequestExtensions that apply to the + * certificate holder. As specified in 5.2.4.2.3, each individual + * CertRequestExtension type is associated with consistency conditions, + * specific to that extension, that govern its consistency with + * AppExtensions in certificates issued by the certificate holder and with + * the CertRequestExtensions in the CA certificates in that certificate + * holder’s chain. Those consistency conditions are specified for each + * individual CertRequestExtension below. + */ +SequenceOfCertRequestExtensions ::= SEQUENCE (SIZE(1..MAX)) OF CertRequestExtension + +/** + * @brief This field contains an individual CertRequestExtension. + * CertRequestExtensions specified in this standard are drawn from the + * ASN.1 Information Object Set SetCertExtensions. This set, and its use in + * the CertRequestExtension type, is structured so that each + * CertRequestExtension is associated with a AppExtension and a + * CertRequestExtension and all are identified by the same id value. In this + * structure: + * + * @param id: identifies the extension type. + * + * @param permissions: indicates the permissions. Within this field. + * - all indicates that the certificate is entitled to issue all values of + * the extension. + * - specific is used to specify which values of the extension may be + * issued in the case where all does not apply. + */ +CertRequestExtension ::= SEQUENCE { + id CERT-EXT-TYPE.&id({SetCertExtensions}), + permissions CHOICE { + content CERT-EXT-TYPE.&Req({SetCertExtensions}{@.id}), + all NULL + } +} + +/** + * @brief This type is the AppExtension used to identify an operating + * organization. The associated CertIssueExtension and CertRequestExtension + * are both of type OperatingOrganizationId. + * To determine consistency between this type and an SPDU, the SDEE + * specification for that SPDU is required to specify how the SPDU can be + * used to determine an OBJECT IDENTIFIER (for example, by including the + * full OBJECT IDENTIFIER in the SPDU, or by including a RELATIVE-OID with + * clear instructions about how a full OBJECT IDENTIFIER can be obtained from + * the RELATIVE-OID). The SPDU is then consistent with this type if the + * OBJECT IDENTIFIER determined from the SPDU is identical to the OBJECT + * IDENTIFIER contained in this field. + * This AppExtension does not have consistency conditions with a + * corresponding CertIssueExtension. It can appear in a certificate issued + * by any CA. + */ +OperatingOrganizationId ::= OBJECT IDENTIFIER + +certExtId-OperatingOrganization ExtId ::= 1 + +/** + * @brief This Information Object is an instance of the Information Object + * Class CERT-EXT-TYPE. It is defined to bind together the AppExtension, + * CertIssueExtension, and CertRequestExtension types associated with the + * use of an operating organization identifier, and to assocaute them all + * with the extension identifier value certExtId-OperatingOrganization. + */ +instanceOperatingOrganizationCertExtensions CERT-EXT-TYPE ::= { + ID certExtId-OperatingOrganization + APP OperatingOrganizationId + ISSUE NULL + REQUEST NULL +} + +/** + * @brief This Information Object Set is a collection of Information Objects + * used to contain the AppExtension, CertIssueExtension, and + * CertRequestExtension types associated with a specific use of certificate + * extensions. In this version of this standard it only has a single entry + * instanceOperatingOrganizationCertExtensions. + */ +SetCertExtensions CERT-EXT-TYPE ::= { + instanceOperatingOrganizationCertExtensions, + ... +} + +END diff --git a/certgen/asncodec/asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn b/certgen/asncodec/asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn index 4fac05eac9a9d88fbb380674ea0c70b2f9a5cc26..0274949f87575f0c15a0e23ac59e1b4923306497 100644 --- a/certgen/asncodec/asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn +++ b/certgen/asncodec/asn1/ieee1609.2/Ieee1609Dot2BaseTypes.asn @@ -1,1413 +1,1413 @@ ---***************************************************************************-- --- IEEE Std 1609.2: Base Data Types -- ---***************************************************************************-- - -/** - * @note Section references in this file are to clauses in IEEE Std - * 1609.2 unless indicated otherwise. Full forms of acronyms and - * abbreviations used in this file are specified in 3.2. - */ - -Ieee1609Dot2BaseTypes {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) - base(1) base-types(2) major-version-2(2) minor-version-4(4)} - -DEFINITIONS AUTOMATIC TAGS ::= BEGIN - ---***************************************************************************-- --- Integer Types -- ---***************************************************************************-- - -/** - * @brief This atomic type is used in the definition of other data structures. - * It is for non-negative integers up to 7, i.e., (hex)07. - */ -Uint3 ::= INTEGER (0..7) - -/** - * @brief This atomic type is used in the definition of other data structures. - * It is for non-negative integers up to 255, i.e., (hex)ff. - */ -Uint8 ::= INTEGER (0..255) - -/** - * @brief This atomic type is used in the definition of other data structures. - * It is for non-negative integers up to 65,535, i.e., (hex)ff ff. - */ -Uint16 ::= INTEGER (0..65535) - -/** - * @brief This atomic type is used in the definition of other data structures. - * It is for non-negative integers up to 4,294,967,295, i.e., - * (hex)ff ff ff ff. - */ -Uint32 ::= INTEGER (0..4294967295) - -/** - * @brief This atomic type is used in the definition of other data structures. - * It is for non-negative integers up to 18,446,744,073,709,551,615, i.e., - * (hex)ff ff ff ff ff ff ff ff. - */ -Uint64 ::= INTEGER (0..18446744073709551615) - -/** - * @brief This type is used for clarity of definitions. - */ -SequenceOfUint8 ::= SEQUENCE OF Uint8 - -/** - * @brief This type is used for clarity of definitions. - */ -SequenceOfUint16 ::= SEQUENCE OF Uint16 - - ---***************************************************************************-- --- OCTET STRING Types -- ---***************************************************************************-- - -/** - * @brief This is a synonym for ASN.1 OCTET STRING, and is used in the - * definition of other data structures. - */ -Opaque ::= OCTET STRING - -/** - * @brief This type contains the truncated hash of another data structure. - * The HashedId3 for a given data structure is calculated by calculating the - * hash of the encoded data structure and taking the low-order three bytes of - * the hash output. The low-order three bytes are the last three bytes of the - * 32-byte hash when represented in network byte order. If the data structure - * is subject to canonicalization it is canonicalized before hashing. See - * Example below. - * - * The hash algorithm to be used to calculate a HashedId3 within a - * structure depends on the context. In this standard, for each structure - * that includes a HashedId3 field, the corresponding text indicates how the - * hash algorithm is determined. See also the discussion in 5.3.9. - * - * Example: Consider the SHA-256 hash of the empty string: - * - * SHA-256("") = - * e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 - * - * The HashedId3 derived from this hash corresponds to the following: - * - * HashedId3 = 52b855. - */ -HashedId3 ::= OCTET STRING (SIZE(3)) - -/** - * @brief This type is used for clarity of definitions. - */ -SequenceOfHashedId3 ::= SEQUENCE OF HashedId3 - -/** - * @brief This type contains the truncated hash of another data structure. - * The HashedId8 for a given data structure is calculated by calculating the - * hash of the encoded data structure and taking the low-order eight bytes of - * the hash output. The low-order eight bytes are the last eight bytes of the - * hash when represented in network byte order. If the data structure - * is subject to canonicalization it is canonicalized before hashing. See - * Example below. - * - * The hash algorithm to be used to calculate a HashedId8 within a - * structure depends on the context. In this standard, for each structure - * that includes a HashedId8 field, the corresponding text indicates how the - * hash algorithm is determined. See also the discussion in 5.3.9. - * - * Example: Consider the SHA-256 hash of the empty string: - * - * SHA-256("") = - * e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 - * - * The HashedId8 derived from this hash corresponds to the following: - * - * HashedId8 = a495991b7852b855. - */ -HashedId8 ::= OCTET STRING (SIZE(8)) - -/** - * @brief This type contains the truncated hash of another data structure. - * The HashedId10 for a given data structure is calculated by calculating the - * hash of the encoded data structure and taking the low-order ten bytes of - * the hash output. The low-order ten bytes are the last ten bytes of the - * hash when represented in network byte order. If the data structure - * is subject to canonicalization it is canonicalized before hashing. See - * Example below. - * - * The hash algorithm to be used to calculate a HashedId10 within a - * structure depends on the context. In this standard, for each structure - * that includes a HashedId10 field, the corresponding text indicates how the - * hash algorithm is determined. See also the discussion in 5.3.9. - * - * Example: Consider the SHA-256 hash of the empty string: - * - * SHA-256("") = - * e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 - * - * The HashedId10 derived from this hash corresponds to the following: - * - * HashedId10 = 934ca495991b7852b855. - */ -HashedId10 ::= OCTET STRING (SIZE(10)) - -/** - * @brief This data structure contains the truncated hash of another data - * structure. The HashedId32 for a given data structure is calculated by - * calculating the hash of the encoded data structure and taking the - * low-order 32 bytes of the hash output. The low-order 32 bytes are the last - * 32 bytes of the hash when represented in network byte order. If the data - * structure is subject to canonicalization it is canonicalized before - * hashing. See Example below. - * - * The hash algorithm to be used to calculate a HashedId32 within a - * structure depends on the context. In this standard, for each structure - * that includes a HashedId32 field, the corresponding text indicates how the - * hash algorithm is determined. See also the discussion in 5.3.9. - * - * Example: Consider the SHA-256 hash of the empty string: - * - * SHA-256("") = - * e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 - * - * The HashedId32 derived from this hash corresponds to the following: - * - * HashedId32 = e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b8 - * 55. - */ -HashedId32 ::= OCTET STRING (SIZE(32)) - -/** - * @brief This data structure contains the truncated hash of another data - * structure. The HashedId48 for a given data structure is calculated by - * calculating the hash of the encoded data structure and taking the - * low-order 48 bytes of the hash output. The low-order 48 bytes are the last - * 48 bytes of the hash when represented in network byte order. If the data - * structure is subject to canonicalization it is canonicalized before - * hashing. See Example below. - * - * The hash algorithm to be used to calculate a HashedId48 within a - * structure depends on the context. In this standard, for each structure - * that includes a HashedId48 field, the corresponding text indicates how the - * hash algorithm is determined. See also the discussion in 5.3.9. - * - * Example: Consider the SHA-384 hash of the empty string: - * - * SHA-384("") = 38b060a751ac96384cd9327eb1b1e36a21fdb71114be07434c0cc7bf63f6 - * e1da274edebfe76f65fbd51ad2f14898b95b - * - * The HashedId48 derived from this hash corresponds to the following: - * - * HashedId48 = 38b060a751ac96384cd9327eb1b1e36a21fdb71114be07434c0cc7bf63f6e - * 1da274edebfe76f65fbd51ad2f14898b95b. - */ -HashedId48 ::= OCTET STRING(SIZE(48)) - - ---***************************************************************************-- --- Time Structures -- ---***************************************************************************-- - -/** - * @brief This type gives the number of (TAI) seconds since 00:00:00 UTC, 1 - * January, 2004. - */ -Time32 ::= Uint32 - -/** - * @brief This data structure is a 64-bit integer giving an estimate of the - * number of (TAI) microseconds since 00:00:00 UTC, 1 January, 2004. - */ -Time64 ::= Uint64 - -/** - * @brief This type gives the validity period of a certificate. The start of - * the validity period is given by start and the end is given by - * start + duration. - */ -ValidityPeriod ::= SEQUENCE { - start Time32, - duration Duration -} - -/** - * @brief This structure represents the duration of validity of a - * certificate. The Uint16 value is the duration, given in the units denoted - * by the indicated choice. A year is considered to be 31556952 seconds, - * which is the average number of seconds in a year. - * - * @note Years can be mapped more closely to wall-clock days using the hours - * choice for up to 7 years and the sixtyHours choice for up to 448 years. - */ -Duration ::= CHOICE { - microseconds Uint16, - milliseconds Uint16, - seconds Uint16, - minutes Uint16, - hours Uint16, - sixtyHours Uint16, - years Uint16 -} - - ---***************************************************************************-- --- Location Structures -- ---***************************************************************************-- - -/** - * @brief This structure represents a geographic region of a specified form. - * A certificate is not valid if any part of the region indicated in its - * scope field lies outside the region indicated in the scope of its issuer. - * - * @param circularRegion: contains a single instance of the CircularRegion - * structure. - * - * @param rectangularRegion: is an array of RectangularRegion structures - * containing at least one entry. This field is interpreted as a series of - * rectangles, which may overlap or be disjoint. The permitted region is any - * point within any of the rectangles. - * - * @param polygonalRegion: contains a single instance of the PolygonalRegion - * structure. - * - * @param identifiedRegion: is an array of IdentifiedRegion structures - * containing at least one entry. The permitted region is any point within - * any of the identified regions. - * - * @note Critical information fields: - * - If present, this is a critical information field as defined in 5.2.6. - * An implementation that does not recognize the indicated CHOICE when - * verifying a signed SPDU shall indicate that the signed SPDU is invalid in - * the sense of 4.2.2.3.2, that is, it is invalid in the sense that its - * validity cannot be established. - * - If selected, rectangularRegion is a critical information field as - * defined in 5.2.6. An implementation that does not support the number of - * RectangularRegion in rectangularRegions when verifying a signed SPDU shall - * indicate that the signed SPDU is invalid in the sense of 4.2.2.3.2, that - * is, it is invalid in the sense that its validity cannot be established. - * A conformant implementation shall support rectangularRegions fields - * containing at least eight entries. - * - If selected, identifiedRegion is a critical information field as - * defined in 5.2.6. An implementation that does not support the number of - * IdentifiedRegion in identifiedRegion shall reject the signed SPDU as - * invalid in the sense of 4.2.2.3.2, that is, it is invalid in the sense - * that its validity cannot be established. A conformant implementation shall - * support identifiedRegion fields containing at least eight entries. - */ -GeographicRegion ::= CHOICE { - circularRegion CircularRegion, - rectangularRegion SequenceOfRectangularRegion, - polygonalRegion PolygonalRegion, - identifiedRegion SequenceOfIdentifiedRegion, - ... -} - -/** - * @brief This structure specifies a circle with its center at center, its - * radius given in meters, and located tangential to the reference ellipsoid. - * The indicated region is all the points on the surface of the reference - * ellipsoid whose distance to the center point over the reference ellipsoid - * is less than or equal to the radius. A point which contains an elevation - * component is considered to be within the circular region if its horizontal - * projection onto the reference ellipsoid lies within the region. - */ -CircularRegion ::= SEQUENCE { - center TwoDLocation, - radius Uint16 -} - -/** - * @brief This structure specifies a “rectangle” on the surface of the WGS84 ellipsoid where the - * sides are given by lines of constant latitude or longitude. - * A point which contains an elevation component is considered to be within the rectangular region - * if its horizontal projection onto the reference ellipsoid lies within the region. - * A RectangularRegion is invalid if the northWest value is south of the southEast value, or if the - * latitude values in the two points are equal, or if the longitude values in the two points are - * equal; otherwise it is valid. A certificate that contains an invalid RectangularRegion is invalid. - * - * @param northWest: is the north-west corner of the rectangle. - * - * @param southEast is the south-east corner of the rectangle. - */ -RectangularRegion ::= SEQUENCE { - northWest TwoDLocation, - southEast TwoDLocation -} - -/** - * @brief This type is used for clarity of definitions. - */ -SequenceOfRectangularRegion ::= SEQUENCE OF RectangularRegion - -/** - * @brief This structure defines a region using a series of distinct - * geographic points, defined on the surface of the reference ellipsoid. The - * region is specified by connecting the points in the order they appear, - * with each pair of points connected by the geodesic on the reference - * ellipsoid. The polygon is completed by connecting the final point to the - * first point. The allowed region is the interior of the polygon and its - * boundary. - * - * A point which contains an elevation component is considered to be - * within the polygonal region if its horizontal projection onto the - * reference ellipsoid lies within the region. - * - * A valid PolygonalRegion contains at least three points. In a valid - * PolygonalRegion, the implied lines that make up the sides of the polygon - * do not intersect. - * - * @note This type does not support enclaves / exclaves. This might be - * addressed in a future version of this standard. - * - * @note Critical information fields: If present, this is a critical - * information field as defined in 5.2.6. An implementation that does not - * support the number of TwoDLocation in the PolygonalRegion when verifying a - * signed SPDU shall indicate that the signed SPDU is invalid. A compliant - * implementation shall support PolygonalRegions containing at least eight - * TwoDLocation entries. - */ -PolygonalRegion ::= SEQUENCE SIZE (3..MAX) OF TwoDLocation - -/** - * @brief This structure is used to define validity regions for use in - * certificates. The latitude and longitude fields contain the latitude and - * longitude as defined above. - * - * @note This data structure is consistent with the location encoding - * used in SAE J2735, except that values 900 000 001 for latitude (used to - * indicate that the latitude was not available) and 1 800 000 001 for - * longitude (used to indicate that the longitude was not available) are not - * valid. - */ -TwoDLocation ::= SEQUENCE { - latitude Latitude, - longitude Longitude -} - -/** - * @brief This structure indicates the region of validity of a certificate - * using region identifiers. - * A conformant implementation that supports this type shall support at least - * one of the possible CHOICE values. The Protocol Implementation Conformance - * Statement (PICS) provided in Annex A allows an implementation to state - * which CountryOnly values it recognizes. - * - * @param countryOnly: indicates that only a country (or a geographic entity - * included in a country list) is given. - * - * @param countryAndRegions: indicates that one or more top-level regions - * within a country (as defined by the region listing associated with that - * country) is given. - * - * @param countryAndSubregions: indicates that one or more regions smaller - * than the top-level regions within a country (as defined by the region - * listing associated with that country) is given. - * - * Critical information fields: If present, this is a critical - * information field as defined in 5.2.6. An implementation that does not - * recognize the indicated CHOICE when verifying a signed SPDU shall indicate - * that the signed SPDU is invalid in the sense of 4.2.2.3.2, that is, it is - * invalid in the sense that its validity cannot be established. - */ -IdentifiedRegion ::= CHOICE { - countryOnly UnCountryId, - countryAndRegions CountryAndRegions, - countryAndSubregions CountryAndSubregions, - ... -} - - -/** - * @brief This type is used for clarity of definitions. - */ -SequenceOfIdentifiedRegion ::= SEQUENCE OF IdentifiedRegion - -/** - * @brief This type contains the integer representation of the country or - * area identifier as defined by the United Nations Statistics Division in - * October 2013 (see normative references in Clause 0). - * A conformant implementation that implements IdentifiedRegion shall - * recognize (in the sense of “be able to determine whether a two dimensional - * location lies inside or outside the borders identified by”) at least one - * value of UnCountryId. The Protocol Implementation Conformance Statement - * (PICS) provided in Annex A allows an implementation to state which - * UnCountryId values it recognizes. - * Since 2013 and before the publication of this version of this standard, - * three changes have been made to the country code list, to define the - * region "sub-Saharan Africa" and remove the "developed regions", and - * "developing regions". A conformant implementation may recognize these - * region identifiers in the sense defined in the previous paragraph. - * If a verifying implementation is required to check that relevant - * geographic information in a signed SPDU is consistent with a certificate - * containing one or more instances of this type, then the SDS is permitted - * to indicate that the signed SPDU is valid even if some instances of this - * type are unrecognized in the sense defined above, so long as the - * recognized instances of this type completely contain the relevant - * geographic information. Informally, if the recognized values in the - * certificate allow the SDS to determine that the SPDU is valid, then it - * can make that determination even if there are also unrecognized values in - * the certificate. This field is therefore not a "critical information - * field" as defined in 5.2.6, because unrecognized values are permitted so - * long as the validity of the SPDU can be established with the recognized - * values. However, as discussed in 5.2.6, the presence of an unrecognized - * value in a certificate can make it impossible to determine whether the - * certificate and the SPDU are valid. - */ -UnCountryId ::= Uint16 - -/** - * @brief This type is defined only for backwards compatibility. - */ -CountryOnly ::= UnCountryId - -/** - * @brief A conformant implementation that supports CountryAndRegions shall - * support a regions field containing at least eight entries. - * A conformant implementation that implements this type shall recognize - * (in the sense of "be able to determine whether a two dimensional location - * lies inside or outside the borders identified by") at least one value of - * UnCountryId and at least one value for a region within the country - * indicated by that recognized UnCountryId value. In this version of this - * standard, the only means to satisfy this is for a conformant - * implementation to recognize the value of UnCountryId indicating USA and - * at least one of the FIPS state codes for US states. The Protocol - * Implementation Conformance Statement (PICS) provided in Annex A allows - * an implementation to state which UnCountryId values it recognizes and - * which region values are recognized within that country. - * If a verifying implementation is required to check that an relevant - * geographic information in a signed SPDU is consistent with a certificate - * containing one or more instances of this type, then the SDS is permitted - * to indicate that the signed SPDU is valid even if some values of country - * or within regions are unrecognized in the sense defined above, so long - * as the recognized instances of this type completely contain the relevant - * geographic information. Informally, if the recognized values in the - * certificate allow the SDS to determine that the SPDU is valid, then it - * can make that determination even if there are also unrecognized values - * in the certificate. This field is therefore not a "critical information - * field" as defined in 5.2.6, because unrecognized values are permitted so - * long as the validity of the SPDU can be established with the recognized - * values. However, as discussed in 5.2.6, the presence of an unrecognized - * value in a certificate can make it impossible to determine whether the - * certificate is valid and so whether the SPDU is valid. - * In this type: - * - * @param countryOnly: is a UnCountryId as defined above. - * - * @param regions: identifies one or more regions within the country. If - * country indicates the United States of America, the values in this field - * identify the state or statistically equivalent entity using the integer - * version of the 2010 FIPS codes as provided by the U.S. Census Bureau - * (see normative references in Clause 0). For other values of country, the - * meaning of region is not defined in this version of this standard. - */ -CountryAndRegions ::= SEQUENCE { - countryOnly UnCountryId, - regions SequenceOfUint8 -} - -/** - * @brief A conformant implementation that supports CountryAndSubregions - * shall support a regionAndSubregions field containing at least eight - * entries. - * A conformant implementation that implements this type shall recognize - * (in the sense of “be able to determine whether a two dimensional location - * lies inside or outside the borders identified by”) at least one value of - * country and at least one value for a region within the country indicated - * by that recognized country value. In this version of this standard, the - * only means to satisfy this is for a conformant implementation to recognize - * the value of UnCountryId indicating USA and at least one of the FIPS state - * codes for US states. The Protocol Implementation Conformance Statement - * (PICS) provided in Annex A allows an implementation to state which - * UnCountryId values it recognizes and which region values are recognized - * within that country. - * If a verifying implementation is required to check that an relevant - * geographic information in a signed SPDU is consistent with a certificate - * containing one or more instances of this type, then the SDS is permitted - * to indicate that the signed SPDU is valid even if some values of country - * or within regionAndSubregions are unrecognized in the sense defined above, - * so long as the recognized instances of this type completely contain the - * relevant geographic information. Informally, if the recognized values in - * the certificate allow the SDS to determine that the SPDU is valid, then - * it can make that determination even if there are also unrecognized values - * in the certificate. This field is therefore not a "critical information - * field" as defined in 5.2.6, because unrecognized values are permitted so - * long as the validity of the SPDU can be established with the recognized - * values. However, as discussed in 5.2.6, the presence of an unrecognized - * value in a certificate can make it impossible to determine whether the - * certificate is valid and so whether the SPDU is valid. - * In this structure: - * - * @param countryOnly: is a UnCountryId as defined above. - * - * @param regionAndSubregions: identifies one or more subregions within - * country. - */ -CountryAndSubregions ::= SEQUENCE { - countryOnly UnCountryId, - regionAndSubregions SequenceOfRegionAndSubregions -} - -/** - * @brief The meanings of the fields in this structure are to be interpreted - * in the context of a country within which the region is located, referred - * to as the "enclosing country". If this structure is used in a - * CountryAndSubregions structure, the enclosing country is the one indicated - * by the country field in the CountryAndSubregions structure. If other uses - * are defined for this structure in future, it is expected that that - * definition will include a specification of how the enclosing country can - * be determined. - * If the enclosing country is the United States of America: - * - The region field identifies the state or statistically equivalent - * entity using the integer version of the 2010 FIPS codes as provided by the - * U.S. Census Bureau (see normative references in Clause 0). - * - The values in the subregions field identify the county or county - * equivalent entity using the integer version of the 2010 FIPS codes as - * provided by the U.S. Census Bureau. - * If the enclosing country is a different country from the USA, the meaning - * of regionAndSubregions is not defined in this version of this standard. - * A conformant implementation that implements this type shall recognize (in - * the sense of "be able to determine whether a two-dimensional location lies - * inside or outside the borders identified by"), for at least one enclosing - * country, at least one value for a region within that country and at least - * one subregion for the indicated region. In this version of this standard, - * the only means to satisfy this is for a conformant implementation to - * recognize, for the USA, at least one of the FIPS state codes for US - * states, and at least one of the county codes in at least one of the - * recognized states. The Protocol Implementation Conformance Statement - * (PICS) provided in Annex A allows an implementation to state which - * UnCountryId values it recognizes and which region values are recognized - * within that country. - * If a verifying implementation is required to check that an relevant - * geographic information in a signed SPDU is consistent with a certificate - * containing one or more instances of this type, then the SDS is permitted - * to indicate that the signed SPDU is valid even if some values within - * subregions are unrecognized in the sense defined above, so long as the - * recognized instances of this type completely contain the relevant - * geographic information. Informally, if the recognized values in the - * certificate allow the SDS to determine that the SPDU is valid, then it - * can make that determination even if there are also unrecognized values - * in the certificate. This field is therefore not not a "critical - * information field" as defined in 5.2.6, because unrecognized values are - * permitted so long as the validity of the SPDU can be established with the - * recognized values. However, as discussed in 5.2.6, the presence of an - * unrecognized value in a certificate can make it impossible to determine - * whether the certificate is valid and so whether the SPDU is valid. - * In this structure: - * - * @param region: identifies a region within a country. - * - * @param subregions: identifies one or more subregions within region. A - * conformant implementation that supports RegionAndSubregions shall support - * a subregions field containing at least eight entries. - */ -RegionAndSubregions ::= SEQUENCE { - region Uint8, - subregions SequenceOfUint16 -} - -/** - * @brief This type is used for clarity of definitions. - */ -SequenceOfRegionAndSubregions ::= SEQUENCE OF RegionAndSubregions - -/** - * @brief This structure contains an estimate of 3D location. The details of - * the structure are given in the definitions of the individual fields below. - * - * @note The units used in this data structure are consistent with the - * location data structures used in SAE J2735 [B26], though the encoding is - * incompatible. - */ -ThreeDLocation ::= SEQUENCE { - latitude Latitude, - longitude Longitude, - elevation Elevation -} - -/** - * @brief This type contains an INTEGER encoding an estimate of the latitude - * with precision 1/10th microdegree relative to the World Geodetic System - * (WGS)-84 datum as defined in NIMA Technical Report TR8350.2. - * The integer in the latitude field is no more than 900 000 000 and no less - * than ?900 000 000, except that the value 900 000 001 is used to indicate - * the latitude was not available to the sender. - */ -Latitude ::= NinetyDegreeInt - -/** - * @brief This type contains an INTEGER encoding an estimate of the longitude - * with precision 1/10th microdegree relative to the World Geodetic System - * (WGS)-84 datum as defined in NIMA Technical Report TR8350.2. - * The integer in the longitude field is no more than 1 800 000 000 and no - * less than ?1 799 999 999, except that the value 1 800 000 001 is used to - * indicate that the longitude was not available to the sender. - */ -Longitude ::= OneEightyDegreeInt - -/** - * @brief This structure contains an estimate of the geodetic altitude above - * or below the WGS84 ellipsoid. The 16-bit value is interpreted as an - * integer number of decimeters representing the height above a minimum - * height of -409.5 m, with the maximum height being 6143.9 m. - */ -Elevation ::= Uint16 - -/** - * @brief The integer in the latitude field is no more than 900,000,000 and - * no less than -900,000,000, except that the value 900,000,001 is used to - * indicate the latitude was not available to the sender. - */ -NinetyDegreeInt ::= INTEGER { - min (-900000000), - max (900000000), - unknown (900000001) -} (-900000000..900000001) - -/** - * @brief The known latitudes are from -900,000,000 to +900,000,000 in 0.1 - * microdegree intervals. - */ -KnownLatitude ::= NinetyDegreeInt (min..max) - -/** - * @brief The value 900,000,001 indicates that the latitude was not - * available to the sender. - */ -UnknownLatitude ::= NinetyDegreeInt (unknown) - -/** - * @brief The integer in the longitude field is no more than 1,800,000,000 - * and no less than -1,799,999,999, except that the value 1,800,000,001 is - * used to indicate that the longitude was not available to the sender. - */ -OneEightyDegreeInt ::= INTEGER { - min (-1799999999), - max (1800000000), - unknown (1800000001) -} (-1799999999..1800000001) - -/** - * @brief The known longitudes are from -1,799,999,999 to +1,800,000,000 in - * 0.1 microdegree intervals. - */ -KnownLongitude ::= OneEightyDegreeInt (min..max) - -/** - * @brief The value 1,800,000,001 indicates that the longitude was not - * available to the sender. - */ -UnknownLongitude ::= OneEightyDegreeInt (unknown) - - ---***************************************************************************-- --- Crypto Structures -- ---***************************************************************************-- - -/** - * @brief This structure represents a signature for a supported public key - * algorithm. It may be contained within SignedData or Certificate. - * - * @note Critical information fields: If present, this is a critical - * information field as defined in 5.2.5. An implementation that does not - * recognize the indicated CHOICE for this type when verifying a signed SPDU - * shall indicate that the signed SPDU is invalid in the sense of 4.2.2.3.2, - * that is, it is invalid in the sense that its validity cannot be - * established. - * - * @note Canonicalization: This data structure is subject to canonicalization - * for the relevant operations specified in 6.1.2. The canonicalization - * applies to instances of this data structure of form EcdsaP256Signature - * and EcdsaP384Signature. - */ -Signature ::= CHOICE { - ecdsaNistP256Signature EcdsaP256Signature, - ecdsaBrainpoolP256r1Signature EcdsaP256Signature, - ..., - ecdsaBrainpoolP384r1Signature EcdsaP384Signature, - ecdsaNistP384Signature EcdsaP384Signature, - sm2Signature EcsigP256Signature -} - -/** - * @brief This structure represents an ECDSA signature. The signature is - * generated as specified in 5.3.1. - * - * If the signature process followed the specification of FIPS 186-4 - * and output the integer r, r is represented as an EccP256CurvePoint - * indicating the selection x-only. - * - * If the signature process followed the specification of SEC 1 and - * output the elliptic curve point R to allow for fast verification, R is - * represented as an EccP256CurvePoint indicating the choice compressed-y-0, - * compressed-y-1, or uncompressed at the sender's discretion. - * - * @note Canonicalization: This data structure is subject to canonicalization - * for the relevant operations specified in 6.1.2. When this data structure - * is canonicalized, the EccP256CurvePoint in rSig is represented in the - * form x-only. - * - * @note When the signature is of form x-only, the x-value in rSig is - * an integer mod n, the order of the group; when the signature is of form - * compressed-y-\*, the x-value in rSig is an integer mod p, the underlying - * prime defining the finite field. In principle this means that to convert a - * signature from form compressed-y-\* to form x-only, the converter checks - * the x-value to see if it lies between n and p and reduces it mod n if so. - * In practice this check is unnecessary: Haase's Theorem states that - * difference between n and p is always less than 2*square-root(p), and so the - * chance that an integer lies between n and p, for a 256-bit curve, is - * bounded above by approximately square-root(p)/p or 2^(-128). For the - * 256-bit curves in this standard, the exact values of n and p in hexadecimal - * are: - * - * NISTp256: - * - p = FFFFFFFF00000001000000000000000000000000FFFFFFFFFFFFFFFFFFFFFFFF - * - n = FFFFFFFF00000000FFFFFFFFFFFFFFFFBCE6FAADA7179E84F3B9CAC2FC632551 - * - * Brainpoolp256: - * - p = A9FB57DBA1EEA9BC3E660A909D838D726E3BF623D52620282013481D1F6E5377 - * - n = A9FB57DBA1EEA9BC3E660A909D838D718C397AA3B561A6F7901E0E82974856A7 - */ -EcdsaP256Signature ::= SEQUENCE { - rSig EccP256CurvePoint, - sSig OCTET STRING (SIZE (32)) -} - -/** - * @brief This structure represents an ECDSA signature. The signature is - * generated as specified in 5.3.1. - * - * If the signature process followed the specification of FIPS 186-4 - * and output the integer r, r is represented as an EccP384CurvePoint - * indicating the selection x-only. - * - * If the signature process followed the specification of SEC 1 and - * output the elliptic curve point R to allow for fast verification, R is - * represented as an EccP384CurvePoint indicating the choice compressed-y-0, - * compressed-y-1, or uncompressed at the sender's discretion. - * - * @note Canonicalization: This data structure is subject to canonicalization - * for the relevant operations specified in 6.1.2. When this data structure - * is canonicalized, the EccP384CurvePoint in rSig is represented in the - * form x-only. - * - * @note When the signature is of form x-only, the x-value in rSig is - * an integer mod n, the order of the group; when the signature is of form - * compressed-y-\*, the x-value in rSig is an integer mod p, the underlying - * prime defining the finite field. In principle this means that to convert a - * signature from form compressed-y-* to form x-only, the converter checks the - * x-value to see if it lies between n and p and reduces it mod n if so. In - * practice this check is unnecessary: Haase's Theorem states that difference - * between n and p is always less than 2*square-root(p), and so the chance - * that an integer lies between n and p, for a 384-bit curve, is bounded - * above by approximately square-root(p)/p or 2^(-192). For the 384-bit curve - * in this standard, the exact values of n and p in hexadecimal are: - * - p = 8CB91E82A3386D280F5D6F7E50E641DF152F7109ED5456B412B1DA197FB71123 - * ACD3A729901D1A71874700133107EC53 - * - n = 8CB91E82A3386D280F5D6F7E50E641DF152F7109ED5456B31F166E6CAC0425A7 - * CF3AB6AF6B7FC3103B883202E9046565 - */ -EcdsaP384Signature ::= SEQUENCE { - rSig EccP384CurvePoint, - sSig OCTET STRING (SIZE (48)) -} - -/** - * @brief This structure represents a elliptic curve signature where the - * component r is constrained to be an integer. This structure supports SM2 - * signatures as specified in 5.3.1.3. - */ -EcsigP256Signature ::= SEQUENCE { - rSig OCTET STRING (SIZE (32)), - sSig OCTET STRING (SIZE (32)) -} - -/** - * @brief This structure specifies a point on an elliptic curve in Weierstrass - * form defined over a 256-bit prime number. The curves supported in this - * standard are NIST p256 as defined in FIPS 186-4, Brainpool p256r1 as - * defined in RFC 5639, and the SM2 curve as defined in GB/T 32918.5-2017. - * The fields in this structure are OCTET STRINGS produced with the elliptic - * curve point encoding and decoding methods defined in subclause 5.5.6 of - * IEEE Std 1363-2000. The x-coordinate is encoded as an unsigned integer of - * length 32 octets in network byte order for all values of the CHOICE; the - * encoding of the y-coordinate y depends on whether the point is x-only, - * compressed, or uncompressed. If the point is x-only, y is omitted. If the - * point is compressed, the value of type depends on the least significant - * bit of y: if the least significant bit of y is 0, type takes the value - * compressed-y-0, and if the least significant bit of y is 1, type takes the - * value compressed-y-1. If the point is uncompressed, y is encoded explicitly - * as an unsigned integer of length 32 octets in network byte order. - * - * @note Canonicalization: This data structure is subject to canonicalization - * for the relevant operations specified in 6.1.2 if it appears in a - * HeaderInfo or in a ToBeSignedCertificate. See the definitions of HeaderInfo - * and ToBeSignedCertificate for a specification of the canonicalization - * operations. - */ -EccP256CurvePoint::= CHOICE { - x-only OCTET STRING (SIZE (32)), - fill NULL, - compressed-y-0 OCTET STRING (SIZE (32)), - compressed-y-1 OCTET STRING (SIZE (32)), - uncompressedP256 SEQUENCE { - x OCTET STRING (SIZE (32)), - y OCTET STRING (SIZE (32)) - } -} - -/** - * @brief This structure specifies a point on an elliptic curve in - * Weierstrass form defined over a 384-bit prime number. The only supported - * such curve in this standard is Brainpool p384r1 as defined in RFC 5639. - * The fields in this structure are octet strings produced with the elliptic - * curve point encoding and decoding methods defined in subclause 5.5.6 of - * IEEE Std 1363-2000. The x-coordinate is encoded as an unsigned integer of - * length 48 octets in network byte order for all values of the CHOICE; the - * encoding of the y-coordinate y depends on whether the point is x-only, - * compressed, or uncompressed. If the point is x-only, y is omitted. If the - * point is compressed, the value of type depends on the least significant - * bit of y: if the least significant bit of y is 0, type takes the value - * compressed-y-0, and if the least significant bit of y is 1, type takes the - * value compressed-y-1. If the point is uncompressed, y is encoded - * explicitly as an unsigned integer of length 48 octets in network byte order. - * - * @note Canonicalization: This data structure is subject to canonicalization - * for the relevant operations specified in 6.1.2 if it appears in a - * HeaderInfo or in a ToBeSignedCertificate. See the definitions of HeaderInfo - * and ToBeSignedCertificate for a specification of the canonicalization - * operations. - */ -EccP384CurvePoint::= CHOICE { - x-only OCTET STRING (SIZE (48)), - fill NULL, - compressed-y-0 OCTET STRING (SIZE (48)), - compressed-y-1 OCTET STRING (SIZE (48)), - uncompressedP384 SEQUENCE { - x OCTET STRING (SIZE (48)), - y OCTET STRING (SIZE (48)) - } -} - -/** - * @brief This enumerated value indicates supported symmetric algorithms. The - * algorithm identifier identifies both the algorithm itself and a specific - * mode of operation. The symmetric algorithms supported in this version of - * this standard are AES-128 and SM4. The only mode of operation supported is - * Counter Mode Encryption With Cipher Block Chaining Message Authentication - * Code (CCM). Full details are given in 5.3.8. - */ -SymmAlgorithm ::= ENUMERATED { - aes128Ccm, - ..., - sm4Ccm -} - -/** - * @brief This structure identifies a hash algorithm. The value sha256, - * indicates SHA-256. The value sha384 indicates SHA-384. The value sm3 - * indicates SM3. See 5.3.3 for more details. - * - * @note Critical information fields: This is a critical information field as - * defined in 5.2.6. An implementation that does not recognize the enumerated - * value of this type in a signed SPDU when verifying a signed SPDU shall - * indicate that the signed SPDU is invalid in the sense of 4.2.2.3.2, that - * is, it is invalid in the sense that its validity cannot be established. - */ -HashAlgorithm ::= ENUMERATED { - sha256, - ..., - sha384, - sm3 -} - -/** - * @brief This data structure is used to transfer a 16-byte symmetric key - * encrypted using ECIES as specified in IEEE Std 1363a-2004. The symmetric - * key is input to the key encryption process with no headers, encapsulation, - * or length indication. Encryption and decryption are carried out as - * specified in 5.3.5.1. - * - * @param v: is the sender's ephemeral public key, which is the output V from - * encryption as specified in 5.3.5.1. - * - * @param c: is the encrypted symmetric key, which is the output C from - * encryption as specified in 5.3.5.1. The algorithm for the symmetric key - * is identified by the CHOICE indicated in the following SymmetricCiphertext. - * For ECIES this shall be AES-128. - * - * @param t: is the authentication tag, which is the output tag from - * encryption as specified in 5.3.5.1. - */ -EciesP256EncryptedKey ::= SEQUENCE { - v EccP256CurvePoint, - c OCTET STRING (SIZE (16)), - t OCTET STRING (SIZE (16)) -} - -/** - * @brief This data structure is used to transfer a 16-byte symmetric key - * encrypted using SM2 encryption as specified in 5.3.3. The symmetric key is - * input to the key encryption process with no headers, encapsulation, or - * length indication. Encryption and decryption are carried out as specified - * in 5.3.5.2. - * - * @param v: is the sender's ephemeral public key, which is the output V from - * encryption as specified in 5.3.5.2. - * - * @param c: is the encrypted symmetric key, which is the output C from - * encryption as specified in 5.3.5.2. The algorithm for the symmetric key - * is identified by the CHOICE indicated in the following SymmetricCiphertext. - * For SM2 this algorithm shall be SM4. - * - * @param t: is the authentication tag, which is the output tag from - * encryption as specified in 5.3.5.2. - */ -EcencP256EncryptedKey ::= SEQUENCE { - v EccP256CurvePoint, - c OCTET STRING (SIZE (16)), - t OCTET STRING (SIZE (32)) -} - - -/** - * @brief This structure contains an encryption key, which may be a public or - * a symmetric key. - * - * @note Canonicalization: This data structure is subject to canonicalization - * for the relevant operations specified in 6.1.2 if it appears in a - * HeaderInfo or in a ToBeSignedCertificate. The canonicalization applies to - * the PublicEncryptionKey. See the definitions of HeaderInfo and - * ToBeSignedCertificate for a specification of the canonicalization - * operations. - */ -EncryptionKey ::= CHOICE { - public PublicEncryptionKey, - symmetric SymmetricEncryptionKey -} - -/** - * @brief This structure specifies a public encryption key and the associated - * symmetric algorithm which is used for bulk data encryption when encrypting - * for that public key. - * - * @note Canonicalization: This data structure is subject to canonicalization - * for the relevant operations specified in 6.1.2 if it appears in a - * HeaderInfo or in a ToBeSignedCertificate. The canonicalization applies to - * the BasePublicEncryptionKey. See the definitions of HeaderInfo and - * ToBeSignedCertificate for a specification of the canonicalization - * operations. - */ -PublicEncryptionKey ::= SEQUENCE { - supportedSymmAlg SymmAlgorithm, - publicKey BasePublicEncryptionKey -} - -/** - * @brief This structure specifies the bytes of a public encryption key for - * a particular algorithm. Supported public key encryption algorithms are - * defined in 5.3.5. - * - * @note Canonicalization: This data structure is subject to canonicalization - * for the relevant operations specified in 6.1.2 if it appears in a - * HeaderInfo or in a ToBeSignedCertificate. See the definitions of HeaderInfo - * and ToBeSignedCertificate for a specification of the canonicalization - * operations. - */ -BasePublicEncryptionKey ::= CHOICE { - eciesNistP256 EccP256CurvePoint, - eciesBrainpoolP256r1 EccP256CurvePoint, - ..., - ecencSm2 EccP256CurvePoint -} - -/** - * @brief This structure represents a public key and states with what - * algorithm the public key is to be used. Cryptographic mechanisms are - * defined in 5.3. - * An EccP256CurvePoint or EccP384CurvePoint within a PublicVerificationKey - * structure is invalid if it indicates the choice x-only. - * - * @note Critical information fields: If present, this is a critical - * information field as defined in 5.2.6. An implementation that does not - * recognize the indicated CHOICE when verifying a signed SPDU shall indicate - * that the signed SPDU is invalid indicate that the signed SPDU is invalid - * in the sense of 4.2.2.3.2, that is, it is invalid in the sense that its - * validity cannot be established. - * - * @note Canonicalization: This data structure is subject to canonicalization - * for the relevant operations specified in 6.1.2. The canonicalization - * applies to the EccP256CurvePoint and the Ecc384CurvePoint. Both forms of - * point are encoded in compressed form, i.e., such that the choice indicated - * within the Ecc*CurvePoint is compressed-y-0 or compressed-y-1. - */ -PublicVerificationKey ::= CHOICE { - ecdsaNistP256 EccP256CurvePoint, - ecdsaBrainpoolP256r1 EccP256CurvePoint, - ... , - ecdsaBrainpoolP384r1 EccP384CurvePoint, - ecdsaNistP384 EccP384CurvePoint, - ecsigSm2 EccP256CurvePoint -} - -/** - * @brief This structure provides the key bytes for use with an identified - * symmetric algorithm. The supported symmetric algorithms are AES-128 and - * SM4 in CCM mode as specified in 5.3.8. - */ -SymmetricEncryptionKey ::= CHOICE { - aes128Ccm OCTET STRING(SIZE(16)), - ..., - sm4Ccm OCTET STRING(SIZE(16)) -} - - ---***************************************************************************-- --- PSID / ITS-AID -- ---***************************************************************************-- - -/** - * @brief This structure represents the permissions that the certificate - * holder has with respect to activities for a single application area, - * identified by a Psid. - * - * @note The determination as to whether the activities are consistent with - * the permissions indicated by the PSID and ServiceSpecificPermissions is - * made by the SDEE and not by the SDS; the SDS provides the PSID and SSP - * information to the SDEE to enable the SDEE to make that determination. - * See 5.2.4.3.3 for more information. - * - * @note The SDEE specification is expected to specify what application - * activities are permitted by particular ServiceSpecificPermissions values. - * The SDEE specification is also expected EITHER to specify application - * activities that are permitted if the ServiceSpecificPermissions is - * omitted, OR to state that the ServiceSpecificPermissions need to always be - * present. - * - * @note Consistency with signed SPDU: As noted in 5.1.1, - * consistency between the SSP and the signed SPDU is defined by rules - * specific to the given PSID and is out of scope for this standard. - * - * @note Consistency with issuing certificate: If a certificate has an - * appPermissions entry A for which the ssp field is omitted, A is consistent - * with the issuing certificate if the issuing certificate contains a - * PsidSspRange P for which the following holds: - * - The psid field in P is equal to the psid field in A and one of the - * following is true: - * - The sspRange field in P indicates all. - * - The sspRange field in P indicates opaque and one of the entries in - * opaque is an OCTET STRING of length 0. - * - * For consistency rules for other forms of the ssp field, see the - * following subclauses. - */ -PsidSsp ::= SEQUENCE { - psid Psid, - ssp ServiceSpecificPermissions OPTIONAL -} - -/** - * @brief This type is used for clarity of definitions. - */ -SequenceOfPsidSsp ::= SEQUENCE OF PsidSsp - -/** - * @brief This type represents the PSID defined in IEEE Std 1609.12. - */ -Psid ::= INTEGER (0..MAX) - -/** - * @brief This type is used for clarity of definitions. - */ -SequenceOfPsid ::= SEQUENCE OF Psid - -/** - * @brief This structure represents the Service Specific Permissions (SSP) - * relevant to a given entry in a PsidSsp. The meaning of the SSP is specific - * to the associated Psid. SSPs may be PSID-specific octet strings or - * bitmap-based. See Annex C for further discussion of how application - * specifiers may choose which SSP form to use. - * - * @note Consistency with issuing certificate: If a certificate has an - * appPermissions entry A for which the ssp field is opaque, A is consistent - * with the issuing certificate if the issuing certificate contains one of - * the following: - * - (OPTION 1) A SubjectPermissions field indicating the choice all and - * no PsidSspRange field containing the psid field in A; - * - (OPTION 2) A PsidSspRange P for which the following holds: - * - The psid field in P is equal to the psid field in A and one of the - * following is true: - * - The sspRange field in P indicates all. - * - The sspRange field in P indicates opaque and one of the entries in - * the opaque field in P is an OCTET STRING identical to the opaque field in - * A. - * - * For consistency rules for other types of ServiceSpecificPermissions, - * see the following subclauses. - */ -ServiceSpecificPermissions ::= CHOICE { - opaque OCTET STRING (SIZE(0..MAX)), - ..., - bitmapSsp BitmapSsp -} - -/** - * @brief This structure represents a bitmap representation of a SSP. The - * mapping of the bits of the bitmap to constraints on the signed SPDU is - * PSID-specific. - * - * @note Consistency with issuing certificate: If a certificate has an - * appPermissions entry A for which the ssp field is bitmapSsp, A is - * consistent with the issuing certificate if the certificate contains one - * of the following: - * - (OPTION 1) A SubjectPermissions field indicating the choice all and - * no PsidSspRange field containing the psid field in A; - * - (OPTION 2) A PsidSspRange P for which the following holds: - * - The psid field in P is equal to the psid field in A and one of the - * following is true: - * - EITHER The sspRange field in P indicates all - * - OR The sspRange field in P indicates bitmapSspRange and for every - * bit set to 1 in the sspBitmask in P, the bit in the identical position in - * the sspValue in A is set equal to the bit in that position in the - * sspValue in P. - * - * @note A BitmapSsp B is consistent with a BitmapSspRange R if for every - * bit set to 1 in the sspBitmask in R, the bit in the identical position in - * B is set equal to the bit in that position in the sspValue in R. For each - * bit set to 0 in the sspBitmask in R, the corresponding bit in the - * identical position in B may be freely set to 0 or 1, i.e., if a bit is - * set to 0 in the sspBitmask in R, the value of corresponding bit in the - * identical position in B has no bearing on whether B and R are consistent. - */ -BitmapSsp ::= OCTET STRING (SIZE(0..31)) - -/** - * @brief This structure represents the certificate issuing or requesting - * permissions of the certificate holder with respect to one particular set - * of application permissions. - * - * @param psid: identifies the application area. - * - * @param sspRange: identifies the SSPs associated with that PSID for which - * the holder may issue or request certificates. If sspRange is omitted, the - * holder may issue or request certificates for any SSP for that PSID. - */ -PsidSspRange ::= SEQUENCE { - psid Psid, - sspRange SspRange OPTIONAL -} - -/** - * @brief This type is used for clarity of definitions. - */ -SequenceOfPsidSspRange ::= SEQUENCE OF PsidSspRange - -/** - * @brief This structure identifies the SSPs associated with a PSID for - * which the holder may issue or request certificates. - * - * @note Consistency with issuing certificate: If a certificate has a - * PsidSspRange A for which the ssp field is opaque, A is consistent with - * the issuing certificate if the issuing certificate contains one of the - * following: - * - (OPTION 1) A SubjectPermissions field indicating the choice all and - * no PsidSspRange field containing the psid field in A; - * - (OPTION 2) A PsidSspRange P for which the following holds: - * - The psid field in P is equal to the psid field in A and one of the - * following is true: - * - The sspRange field in P indicates all. - * - The sspRange field in P indicates opaque, and the sspRange field in - * A indicates opaque, and every OCTET STRING within the opaque in A is a - * duplicate of an OCTET STRING within the opaque in P. - * - * If a certificate has a PsidSspRange A for which the ssp field is all, - * A is consistent with the issuing certificate if the issuing certificate - * contains a PsidSspRange P for which the following holds: - * - (OPTION 1) A SubjectPermissions field indicating the choice all and - * no PsidSspRange field containing the psid field in A; - * - (OPTION 2) A PsidSspRange P for which the psid field in P is equal to - * the psid field in A and the sspRange field in P indicates all. - * - * For consistency rules for other types of SspRange, see the following - * subclauses. - * - * @note The choice "all" may also be indicated by omitting the - * SspRange in the enclosing PsidSspRange structure. Omitting the SspRange is - * preferred to explicitly indicating "all". - */ -SspRange ::= CHOICE { - opaque SequenceOfOctetString, - all NULL, - ..., - bitmapSspRange BitmapSspRange -} - -/** - * @brief This structure represents a bitmap representation of a SSP. The - * sspValue indicates permissions. The sspBitmask contains an octet string - * used to permit or constrain sspValue fields in issued certificates. The - * sspValue and sspBitmask fields shall be of the same length. - * - * @note Consistency with issuing certificate: If a certificate has an - * PsidSspRange value P for which the sspRange field is bitmapSspRange, - * P is consistent with the issuing certificate if the issuing certificate - * contains one of the following: - * - (OPTION 1) A SubjectPermissions field indicating the choice all and - * no PsidSspRange field containing the psid field in P; - * - (OPTION 2) A PsidSspRange R for which the following holds: - * - The psid field in R is equal to the psid field in P and one of the - * following is true: - * - EITHER The sspRange field in R indicates all - * - OR The sspRange field in R indicates bitmapSspRange and for every - * bit set to 1 in the sspBitmask in R: - * - The bit in the identical position in the sspBitmask in P is set - * equal to 1, AND - * - The bit in the identical position in the sspValue in P is set equal - * to the bit in that position in the sspValue in R. - * - * Reference ETSI TS 103 097 for more information on bitmask SSPs. - */ -BitmapSspRange ::= SEQUENCE { - sspValue OCTET STRING (SIZE(1..32)), - sspBitmask OCTET STRING (SIZE(1..32)) -} - -/** - * @brief This type is used for clarity of definitions. - */ -SequenceOfOctetString ::= - SEQUENCE (SIZE (0..MAX)) OF OCTET STRING (SIZE(0..MAX)) - - ---***************************************************************************-- --- Certificate Components -- ---***************************************************************************-- - -/** - * @brief This field contains the certificate holder's assurance level, which - * indicates the security of both the platform and storage of secret keys as - * well as the confidence in this assessment. - * - * This field is encoded as defined in Table 1, where "A" denotes bit - * fields specifying an assurance level, "R" reserved bit fields, and "C" bit - * fields specifying the confidence. - * - * Table 1: Bitwise encoding of subject assurance - * - * | Bit number | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 | - * | -------------- | --- | --- | --- | --- | --- | --- | --- | --- | - * | Interpretation | A | A | A | R | R | R | C | C | - * - * In Table 1, bit number 0 denotes the least significant bit. Bit 7 - * to bit 5 denote the device's assurance levels, bit 4 to bit 2 are reserved - * for future use, and bit 1 and bit 0 denote the confidence. - * - * The specification of these assurance levels as well as the - * encoding of the confidence levels is outside the scope of the present - * standard. It can be assumed that a higher assurance value indicates that - * the holder is more trusted than the holder of a certificate with lower - * assurance value and the same confidence value. - * - * @note This field was originally specified in ETSI TS 103 097 and - * future uses of this field are anticipated to be consistent with future - * versions of that standard. - */ -SubjectAssurance ::= OCTET STRING (SIZE(1)) - -/** - * @brief This integer identifies a series of CRLs issued under the authority - * of a particular CRACA. - */ -CrlSeries ::= Uint16 - - ---***************************************************************************-- --- Pseudonym Linkage -- ---***************************************************************************-- - -/** - * @brief This atomic type is used in the definition of other data structures. - */ -IValue ::= Uint16 - -/** - * @brief This is a UTF-8 string as defined in IETF RFC 3629. The contents - * are determined by policy. - */ -Hostname ::= UTF8String (SIZE(0..255)) - -/** - * @brief This is the individual linkage value. See 5.1.3 and 7.3 for details - * of use. - */ -LinkageValue ::= OCTET STRING (SIZE(9)) - -/** - * @brief This is the group linkage value. See 5.1.3 and 7.3 for details of - * use. - */ -GroupLinkageValue ::= SEQUENCE { - jValue OCTET STRING (SIZE(4)), - value OCTET STRING (SIZE(9)) -} - -/** - * @brief This structure contains a LA Identifier for use in the algorithms - * specified in 5.1.3.4. - */ -LaId ::= OCTET STRING (SIZE(2)) - -/** - * @brief This type is used for clarity of definitions. - */ -SequenceOfLinkageSeed ::= SEQUENCE OF LinkageSeed - -/** - * @brief This structure contains a linkage seed value for use in the - * algorithms specified in 5.1.3.4. - */ -LinkageSeed ::= OCTET STRING (SIZE(16)) - ---***************************************************************************-- --- Information Object Classes and Sets -- ---***************************************************************************-- - -/** - * @brief This structure is the Information Object Class used to contain - * information about a set of certificate extensions that are associated with - * each other: an AppExtension, a CertIssueExtension, and a - * CertRequestExtension. - */ -CERT-EXT-TYPE ::= CLASS { - &id ExtId, - &App, - &Issue, - &Req -} WITH SYNTAX {ID &id APP &App ISSUE &Issue REQUEST &Req} - -/** - * @brief This parameterized type represents a (id, content) pair drawn from - * the set ExtensionTypes, which is constrained to contain objects defined by - * the class EXT-TYPE. - */ -Extension {EXT-TYPE : ExtensionTypes} ::= SEQUENCE { - id EXT-TYPE.&extId({ExtensionTypes}), - content EXT-TYPE.&ExtContent({ExtensionTypes}{@.id}) -} - -/** - * @brief This class defines objects in a form suitable for import into the - * definition of HeaderInfo. - */ -EXT-TYPE ::= CLASS { - &extId ExtId, - &ExtContent -} WITH SYNTAX {&ExtContent IDENTIFIED BY &extId} - -/** - * @brief This type is used as an identifier for instances of ExtContent - * within an EXT-TYPE. - */ -ExtId ::= INTEGER(0..255) - - -END +--***************************************************************************-- +-- IEEE Std 1609.2: Base Data Types -- +--***************************************************************************-- + +/** + * @note Section references in this file are to clauses in IEEE Std + * 1609.2 unless indicated otherwise. Full forms of acronyms and + * abbreviations used in this file are specified in 3.2. + */ + +Ieee1609Dot2BaseTypes {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) + base(1) base-types(2) major-version-2(2) minor-version-4(4)} + +DEFINITIONS AUTOMATIC TAGS ::= BEGIN + +--***************************************************************************-- +-- Integer Types -- +--***************************************************************************-- + +/** + * @brief This atomic type is used in the definition of other data structures. + * It is for non-negative integers up to 7, i.e., (hex)07. + */ +Uint3 ::= INTEGER (0..7) + +/** + * @brief This atomic type is used in the definition of other data structures. + * It is for non-negative integers up to 255, i.e., (hex)ff. + */ +Uint8 ::= INTEGER (0..255) + +/** + * @brief This atomic type is used in the definition of other data structures. + * It is for non-negative integers up to 65,535, i.e., (hex)ff ff. + */ +Uint16 ::= INTEGER (0..65535) + +/** + * @brief This atomic type is used in the definition of other data structures. + * It is for non-negative integers up to 4,294,967,295, i.e., + * (hex)ff ff ff ff. + */ +Uint32 ::= INTEGER (0..4294967295) + +/** + * @brief This atomic type is used in the definition of other data structures. + * It is for non-negative integers up to 18,446,744,073,709,551,615, i.e., + * (hex)ff ff ff ff ff ff ff ff. + */ +Uint64 ::= INTEGER (0..18446744073709551615) + +/** + * @brief This type is used for clarity of definitions. + */ +SequenceOfUint8 ::= SEQUENCE OF Uint8 + +/** + * @brief This type is used for clarity of definitions. + */ +SequenceOfUint16 ::= SEQUENCE OF Uint16 + + +--***************************************************************************-- +-- OCTET STRING Types -- +--***************************************************************************-- + +/** + * @brief This is a synonym for ASN.1 OCTET STRING, and is used in the + * definition of other data structures. + */ +Opaque ::= OCTET STRING + +/** + * @brief This type contains the truncated hash of another data structure. + * The HashedId3 for a given data structure is calculated by calculating the + * hash of the encoded data structure and taking the low-order three bytes of + * the hash output. The low-order three bytes are the last three bytes of the + * 32-byte hash when represented in network byte order. If the data structure + * is subject to canonicalization it is canonicalized before hashing. See + * Example below. + * + * The hash algorithm to be used to calculate a HashedId3 within a + * structure depends on the context. In this standard, for each structure + * that includes a HashedId3 field, the corresponding text indicates how the + * hash algorithm is determined. See also the discussion in 5.3.9. + * + * Example: Consider the SHA-256 hash of the empty string: + * + * SHA-256("") = + * e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 + * + * The HashedId3 derived from this hash corresponds to the following: + * + * HashedId3 = 52b855. + */ +HashedId3 ::= OCTET STRING (SIZE(3)) + +/** + * @brief This type is used for clarity of definitions. + */ +SequenceOfHashedId3 ::= SEQUENCE OF HashedId3 + +/** + * @brief This type contains the truncated hash of another data structure. + * The HashedId8 for a given data structure is calculated by calculating the + * hash of the encoded data structure and taking the low-order eight bytes of + * the hash output. The low-order eight bytes are the last eight bytes of the + * hash when represented in network byte order. If the data structure + * is subject to canonicalization it is canonicalized before hashing. See + * Example below. + * + * The hash algorithm to be used to calculate a HashedId8 within a + * structure depends on the context. In this standard, for each structure + * that includes a HashedId8 field, the corresponding text indicates how the + * hash algorithm is determined. See also the discussion in 5.3.9. + * + * Example: Consider the SHA-256 hash of the empty string: + * + * SHA-256("") = + * e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 + * + * The HashedId8 derived from this hash corresponds to the following: + * + * HashedId8 = a495991b7852b855. + */ +HashedId8 ::= OCTET STRING (SIZE(8)) + +/** + * @brief This type contains the truncated hash of another data structure. + * The HashedId10 for a given data structure is calculated by calculating the + * hash of the encoded data structure and taking the low-order ten bytes of + * the hash output. The low-order ten bytes are the last ten bytes of the + * hash when represented in network byte order. If the data structure + * is subject to canonicalization it is canonicalized before hashing. See + * Example below. + * + * The hash algorithm to be used to calculate a HashedId10 within a + * structure depends on the context. In this standard, for each structure + * that includes a HashedId10 field, the corresponding text indicates how the + * hash algorithm is determined. See also the discussion in 5.3.9. + * + * Example: Consider the SHA-256 hash of the empty string: + * + * SHA-256("") = + * e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 + * + * The HashedId10 derived from this hash corresponds to the following: + * + * HashedId10 = 934ca495991b7852b855. + */ +HashedId10 ::= OCTET STRING (SIZE(10)) + +/** + * @brief This data structure contains the truncated hash of another data + * structure. The HashedId32 for a given data structure is calculated by + * calculating the hash of the encoded data structure and taking the + * low-order 32 bytes of the hash output. The low-order 32 bytes are the last + * 32 bytes of the hash when represented in network byte order. If the data + * structure is subject to canonicalization it is canonicalized before + * hashing. See Example below. + * + * The hash algorithm to be used to calculate a HashedId32 within a + * structure depends on the context. In this standard, for each structure + * that includes a HashedId32 field, the corresponding text indicates how the + * hash algorithm is determined. See also the discussion in 5.3.9. + * + * Example: Consider the SHA-256 hash of the empty string: + * + * SHA-256("") = + * e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 + * + * The HashedId32 derived from this hash corresponds to the following: + * + * HashedId32 = e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b8 + * 55. + */ +HashedId32 ::= OCTET STRING (SIZE(32)) + +/** + * @brief This data structure contains the truncated hash of another data + * structure. The HashedId48 for a given data structure is calculated by + * calculating the hash of the encoded data structure and taking the + * low-order 48 bytes of the hash output. The low-order 48 bytes are the last + * 48 bytes of the hash when represented in network byte order. If the data + * structure is subject to canonicalization it is canonicalized before + * hashing. See Example below. + * + * The hash algorithm to be used to calculate a HashedId48 within a + * structure depends on the context. In this standard, for each structure + * that includes a HashedId48 field, the corresponding text indicates how the + * hash algorithm is determined. See also the discussion in 5.3.9. + * + * Example: Consider the SHA-384 hash of the empty string: + * + * SHA-384("") = 38b060a751ac96384cd9327eb1b1e36a21fdb71114be07434c0cc7bf63f6 + * e1da274edebfe76f65fbd51ad2f14898b95b + * + * The HashedId48 derived from this hash corresponds to the following: + * + * HashedId48 = 38b060a751ac96384cd9327eb1b1e36a21fdb71114be07434c0cc7bf63f6e + * 1da274edebfe76f65fbd51ad2f14898b95b. + */ +HashedId48 ::= OCTET STRING(SIZE(48)) + + +--***************************************************************************-- +-- Time Structures -- +--***************************************************************************-- + +/** + * @brief This type gives the number of (TAI) seconds since 00:00:00 UTC, 1 + * January, 2004. + */ +Time32 ::= Uint32 + +/** + * @brief This data structure is a 64-bit integer giving an estimate of the + * number of (TAI) microseconds since 00:00:00 UTC, 1 January, 2004. + */ +Time64 ::= Uint64 + +/** + * @brief This type gives the validity period of a certificate. The start of + * the validity period is given by start and the end is given by + * start + duration. + */ +ValidityPeriod ::= SEQUENCE { + start Time32, + duration Duration +} + +/** + * @brief This structure represents the duration of validity of a + * certificate. The Uint16 value is the duration, given in the units denoted + * by the indicated choice. A year is considered to be 31556952 seconds, + * which is the average number of seconds in a year. + * + * @note Years can be mapped more closely to wall-clock days using the hours + * choice for up to 7 years and the sixtyHours choice for up to 448 years. + */ +Duration ::= CHOICE { + microseconds Uint16, + milliseconds Uint16, + seconds Uint16, + minutes Uint16, + hours Uint16, + sixtyHours Uint16, + years Uint16 +} + + +--***************************************************************************-- +-- Location Structures -- +--***************************************************************************-- + +/** + * @brief This structure represents a geographic region of a specified form. + * A certificate is not valid if any part of the region indicated in its + * scope field lies outside the region indicated in the scope of its issuer. + * + * @param circularRegion: contains a single instance of the CircularRegion + * structure. + * + * @param rectangularRegion: is an array of RectangularRegion structures + * containing at least one entry. This field is interpreted as a series of + * rectangles, which may overlap or be disjoint. The permitted region is any + * point within any of the rectangles. + * + * @param polygonalRegion: contains a single instance of the PolygonalRegion + * structure. + * + * @param identifiedRegion: is an array of IdentifiedRegion structures + * containing at least one entry. The permitted region is any point within + * any of the identified regions. + * + * @note Critical information fields: + * - If present, this is a critical information field as defined in 5.2.6. + * An implementation that does not recognize the indicated CHOICE when + * verifying a signed SPDU shall indicate that the signed SPDU is invalid in + * the sense of 4.2.2.3.2, that is, it is invalid in the sense that its + * validity cannot be established. + * - If selected, rectangularRegion is a critical information field as + * defined in 5.2.6. An implementation that does not support the number of + * RectangularRegion in rectangularRegions when verifying a signed SPDU shall + * indicate that the signed SPDU is invalid in the sense of 4.2.2.3.2, that + * is, it is invalid in the sense that its validity cannot be established. + * A conformant implementation shall support rectangularRegions fields + * containing at least eight entries. + * - If selected, identifiedRegion is a critical information field as + * defined in 5.2.6. An implementation that does not support the number of + * IdentifiedRegion in identifiedRegion shall reject the signed SPDU as + * invalid in the sense of 4.2.2.3.2, that is, it is invalid in the sense + * that its validity cannot be established. A conformant implementation shall + * support identifiedRegion fields containing at least eight entries. + */ +GeographicRegion ::= CHOICE { + circularRegion CircularRegion, + rectangularRegion SequenceOfRectangularRegion, + polygonalRegion PolygonalRegion, + identifiedRegion SequenceOfIdentifiedRegion, + ... +} + +/** + * @brief This structure specifies a circle with its center at center, its + * radius given in meters, and located tangential to the reference ellipsoid. + * The indicated region is all the points on the surface of the reference + * ellipsoid whose distance to the center point over the reference ellipsoid + * is less than or equal to the radius. A point which contains an elevation + * component is considered to be within the circular region if its horizontal + * projection onto the reference ellipsoid lies within the region. + */ +CircularRegion ::= SEQUENCE { + center TwoDLocation, + radius Uint16 +} + +/** + * @brief This structure specifies a “rectangle” on the surface of the WGS84 ellipsoid where the + * sides are given by lines of constant latitude or longitude. + * A point which contains an elevation component is considered to be within the rectangular region + * if its horizontal projection onto the reference ellipsoid lies within the region. + * A RectangularRegion is invalid if the northWest value is south of the southEast value, or if the + * latitude values in the two points are equal, or if the longitude values in the two points are + * equal; otherwise it is valid. A certificate that contains an invalid RectangularRegion is invalid. + * + * @param northWest: is the north-west corner of the rectangle. + * + * @param southEast is the south-east corner of the rectangle. + */ +RectangularRegion ::= SEQUENCE { + northWest TwoDLocation, + southEast TwoDLocation +} + +/** + * @brief This type is used for clarity of definitions. + */ +SequenceOfRectangularRegion ::= SEQUENCE OF RectangularRegion + +/** + * @brief This structure defines a region using a series of distinct + * geographic points, defined on the surface of the reference ellipsoid. The + * region is specified by connecting the points in the order they appear, + * with each pair of points connected by the geodesic on the reference + * ellipsoid. The polygon is completed by connecting the final point to the + * first point. The allowed region is the interior of the polygon and its + * boundary. + * + * A point which contains an elevation component is considered to be + * within the polygonal region if its horizontal projection onto the + * reference ellipsoid lies within the region. + * + * A valid PolygonalRegion contains at least three points. In a valid + * PolygonalRegion, the implied lines that make up the sides of the polygon + * do not intersect. + * + * @note This type does not support enclaves / exclaves. This might be + * addressed in a future version of this standard. + * + * @note Critical information fields: If present, this is a critical + * information field as defined in 5.2.6. An implementation that does not + * support the number of TwoDLocation in the PolygonalRegion when verifying a + * signed SPDU shall indicate that the signed SPDU is invalid. A compliant + * implementation shall support PolygonalRegions containing at least eight + * TwoDLocation entries. + */ +PolygonalRegion ::= SEQUENCE SIZE (3..MAX) OF TwoDLocation + +/** + * @brief This structure is used to define validity regions for use in + * certificates. The latitude and longitude fields contain the latitude and + * longitude as defined above. + * + * @note This data structure is consistent with the location encoding + * used in SAE J2735, except that values 900 000 001 for latitude (used to + * indicate that the latitude was not available) and 1 800 000 001 for + * longitude (used to indicate that the longitude was not available) are not + * valid. + */ +TwoDLocation ::= SEQUENCE { + latitude Latitude, + longitude Longitude +} + +/** + * @brief This structure indicates the region of validity of a certificate + * using region identifiers. + * A conformant implementation that supports this type shall support at least + * one of the possible CHOICE values. The Protocol Implementation Conformance + * Statement (PICS) provided in Annex A allows an implementation to state + * which CountryOnly values it recognizes. + * + * @param countryOnly: indicates that only a country (or a geographic entity + * included in a country list) is given. + * + * @param countryAndRegions: indicates that one or more top-level regions + * within a country (as defined by the region listing associated with that + * country) is given. + * + * @param countryAndSubregions: indicates that one or more regions smaller + * than the top-level regions within a country (as defined by the region + * listing associated with that country) is given. + * + * Critical information fields: If present, this is a critical + * information field as defined in 5.2.6. An implementation that does not + * recognize the indicated CHOICE when verifying a signed SPDU shall indicate + * that the signed SPDU is invalid in the sense of 4.2.2.3.2, that is, it is + * invalid in the sense that its validity cannot be established. + */ +IdentifiedRegion ::= CHOICE { + countryOnly UnCountryId, + countryAndRegions CountryAndRegions, + countryAndSubregions CountryAndSubregions, + ... +} + + +/** + * @brief This type is used for clarity of definitions. + */ +SequenceOfIdentifiedRegion ::= SEQUENCE OF IdentifiedRegion + +/** + * @brief This type contains the integer representation of the country or + * area identifier as defined by the United Nations Statistics Division in + * October 2013 (see normative references in Clause 0). + * A conformant implementation that implements IdentifiedRegion shall + * recognize (in the sense of “be able to determine whether a two dimensional + * location lies inside or outside the borders identified by”) at least one + * value of UnCountryId. The Protocol Implementation Conformance Statement + * (PICS) provided in Annex A allows an implementation to state which + * UnCountryId values it recognizes. + * Since 2013 and before the publication of this version of this standard, + * three changes have been made to the country code list, to define the + * region "sub-Saharan Africa" and remove the "developed regions", and + * "developing regions". A conformant implementation may recognize these + * region identifiers in the sense defined in the previous paragraph. + * If a verifying implementation is required to check that relevant + * geographic information in a signed SPDU is consistent with a certificate + * containing one or more instances of this type, then the SDS is permitted + * to indicate that the signed SPDU is valid even if some instances of this + * type are unrecognized in the sense defined above, so long as the + * recognized instances of this type completely contain the relevant + * geographic information. Informally, if the recognized values in the + * certificate allow the SDS to determine that the SPDU is valid, then it + * can make that determination even if there are also unrecognized values in + * the certificate. This field is therefore not a "critical information + * field" as defined in 5.2.6, because unrecognized values are permitted so + * long as the validity of the SPDU can be established with the recognized + * values. However, as discussed in 5.2.6, the presence of an unrecognized + * value in a certificate can make it impossible to determine whether the + * certificate and the SPDU are valid. + */ +UnCountryId ::= Uint16 + +/** + * @brief This type is defined only for backwards compatibility. + */ +CountryOnly ::= UnCountryId + +/** + * @brief A conformant implementation that supports CountryAndRegions shall + * support a regions field containing at least eight entries. + * A conformant implementation that implements this type shall recognize + * (in the sense of "be able to determine whether a two dimensional location + * lies inside or outside the borders identified by") at least one value of + * UnCountryId and at least one value for a region within the country + * indicated by that recognized UnCountryId value. In this version of this + * standard, the only means to satisfy this is for a conformant + * implementation to recognize the value of UnCountryId indicating USA and + * at least one of the FIPS state codes for US states. The Protocol + * Implementation Conformance Statement (PICS) provided in Annex A allows + * an implementation to state which UnCountryId values it recognizes and + * which region values are recognized within that country. + * If a verifying implementation is required to check that an relevant + * geographic information in a signed SPDU is consistent with a certificate + * containing one or more instances of this type, then the SDS is permitted + * to indicate that the signed SPDU is valid even if some values of country + * or within regions are unrecognized in the sense defined above, so long + * as the recognized instances of this type completely contain the relevant + * geographic information. Informally, if the recognized values in the + * certificate allow the SDS to determine that the SPDU is valid, then it + * can make that determination even if there are also unrecognized values + * in the certificate. This field is therefore not a "critical information + * field" as defined in 5.2.6, because unrecognized values are permitted so + * long as the validity of the SPDU can be established with the recognized + * values. However, as discussed in 5.2.6, the presence of an unrecognized + * value in a certificate can make it impossible to determine whether the + * certificate is valid and so whether the SPDU is valid. + * In this type: + * + * @param countryOnly: is a UnCountryId as defined above. + * + * @param regions: identifies one or more regions within the country. If + * country indicates the United States of America, the values in this field + * identify the state or statistically equivalent entity using the integer + * version of the 2010 FIPS codes as provided by the U.S. Census Bureau + * (see normative references in Clause 0). For other values of country, the + * meaning of region is not defined in this version of this standard. + */ +CountryAndRegions ::= SEQUENCE { + countryOnly UnCountryId, + regions SequenceOfUint8 +} + +/** + * @brief A conformant implementation that supports CountryAndSubregions + * shall support a regionAndSubregions field containing at least eight + * entries. + * A conformant implementation that implements this type shall recognize + * (in the sense of “be able to determine whether a two dimensional location + * lies inside or outside the borders identified by”) at least one value of + * country and at least one value for a region within the country indicated + * by that recognized country value. In this version of this standard, the + * only means to satisfy this is for a conformant implementation to recognize + * the value of UnCountryId indicating USA and at least one of the FIPS state + * codes for US states. The Protocol Implementation Conformance Statement + * (PICS) provided in Annex A allows an implementation to state which + * UnCountryId values it recognizes and which region values are recognized + * within that country. + * If a verifying implementation is required to check that an relevant + * geographic information in a signed SPDU is consistent with a certificate + * containing one or more instances of this type, then the SDS is permitted + * to indicate that the signed SPDU is valid even if some values of country + * or within regionAndSubregions are unrecognized in the sense defined above, + * so long as the recognized instances of this type completely contain the + * relevant geographic information. Informally, if the recognized values in + * the certificate allow the SDS to determine that the SPDU is valid, then + * it can make that determination even if there are also unrecognized values + * in the certificate. This field is therefore not a "critical information + * field" as defined in 5.2.6, because unrecognized values are permitted so + * long as the validity of the SPDU can be established with the recognized + * values. However, as discussed in 5.2.6, the presence of an unrecognized + * value in a certificate can make it impossible to determine whether the + * certificate is valid and so whether the SPDU is valid. + * In this structure: + * + * @param countryOnly: is a UnCountryId as defined above. + * + * @param regionAndSubregions: identifies one or more subregions within + * country. + */ +CountryAndSubregions ::= SEQUENCE { + countryOnly UnCountryId, + regionAndSubregions SequenceOfRegionAndSubregions +} + +/** + * @brief The meanings of the fields in this structure are to be interpreted + * in the context of a country within which the region is located, referred + * to as the "enclosing country". If this structure is used in a + * CountryAndSubregions structure, the enclosing country is the one indicated + * by the country field in the CountryAndSubregions structure. If other uses + * are defined for this structure in future, it is expected that that + * definition will include a specification of how the enclosing country can + * be determined. + * If the enclosing country is the United States of America: + * - The region field identifies the state or statistically equivalent + * entity using the integer version of the 2010 FIPS codes as provided by the + * U.S. Census Bureau (see normative references in Clause 0). + * - The values in the subregions field identify the county or county + * equivalent entity using the integer version of the 2010 FIPS codes as + * provided by the U.S. Census Bureau. + * If the enclosing country is a different country from the USA, the meaning + * of regionAndSubregions is not defined in this version of this standard. + * A conformant implementation that implements this type shall recognize (in + * the sense of "be able to determine whether a two-dimensional location lies + * inside or outside the borders identified by"), for at least one enclosing + * country, at least one value for a region within that country and at least + * one subregion for the indicated region. In this version of this standard, + * the only means to satisfy this is for a conformant implementation to + * recognize, for the USA, at least one of the FIPS state codes for US + * states, and at least one of the county codes in at least one of the + * recognized states. The Protocol Implementation Conformance Statement + * (PICS) provided in Annex A allows an implementation to state which + * UnCountryId values it recognizes and which region values are recognized + * within that country. + * If a verifying implementation is required to check that an relevant + * geographic information in a signed SPDU is consistent with a certificate + * containing one or more instances of this type, then the SDS is permitted + * to indicate that the signed SPDU is valid even if some values within + * subregions are unrecognized in the sense defined above, so long as the + * recognized instances of this type completely contain the relevant + * geographic information. Informally, if the recognized values in the + * certificate allow the SDS to determine that the SPDU is valid, then it + * can make that determination even if there are also unrecognized values + * in the certificate. This field is therefore not not a "critical + * information field" as defined in 5.2.6, because unrecognized values are + * permitted so long as the validity of the SPDU can be established with the + * recognized values. However, as discussed in 5.2.6, the presence of an + * unrecognized value in a certificate can make it impossible to determine + * whether the certificate is valid and so whether the SPDU is valid. + * In this structure: + * + * @param region: identifies a region within a country. + * + * @param subregions: identifies one or more subregions within region. A + * conformant implementation that supports RegionAndSubregions shall support + * a subregions field containing at least eight entries. + */ +RegionAndSubregions ::= SEQUENCE { + region Uint8, + subregions SequenceOfUint16 +} + +/** + * @brief This type is used for clarity of definitions. + */ +SequenceOfRegionAndSubregions ::= SEQUENCE OF RegionAndSubregions + +/** + * @brief This structure contains an estimate of 3D location. The details of + * the structure are given in the definitions of the individual fields below. + * + * @note The units used in this data structure are consistent with the + * location data structures used in SAE J2735 [B26], though the encoding is + * incompatible. + */ +ThreeDLocation ::= SEQUENCE { + latitude Latitude, + longitude Longitude, + elevation Elevation +} + +/** + * @brief This type contains an INTEGER encoding an estimate of the latitude + * with precision 1/10th microdegree relative to the World Geodetic System + * (WGS)-84 datum as defined in NIMA Technical Report TR8350.2. + * The integer in the latitude field is no more than 900 000 000 and no less + * than ?900 000 000, except that the value 900 000 001 is used to indicate + * the latitude was not available to the sender. + */ +Latitude ::= NinetyDegreeInt + +/** + * @brief This type contains an INTEGER encoding an estimate of the longitude + * with precision 1/10th microdegree relative to the World Geodetic System + * (WGS)-84 datum as defined in NIMA Technical Report TR8350.2. + * The integer in the longitude field is no more than 1 800 000 000 and no + * less than ?1 799 999 999, except that the value 1 800 000 001 is used to + * indicate that the longitude was not available to the sender. + */ +Longitude ::= OneEightyDegreeInt + +/** + * @brief This structure contains an estimate of the geodetic altitude above + * or below the WGS84 ellipsoid. The 16-bit value is interpreted as an + * integer number of decimeters representing the height above a minimum + * height of -409.5 m, with the maximum height being 6143.9 m. + */ +Elevation ::= Uint16 + +/** + * @brief The integer in the latitude field is no more than 900,000,000 and + * no less than -900,000,000, except that the value 900,000,001 is used to + * indicate the latitude was not available to the sender. + */ +NinetyDegreeInt ::= INTEGER { + min (-900000000), + max (900000000), + unknown (900000001) +} (-900000000..900000001) + +/** + * @brief The known latitudes are from -900,000,000 to +900,000,000 in 0.1 + * microdegree intervals. + */ +KnownLatitude ::= NinetyDegreeInt (min..max) + +/** + * @brief The value 900,000,001 indicates that the latitude was not + * available to the sender. + */ +UnknownLatitude ::= NinetyDegreeInt (unknown) + +/** + * @brief The integer in the longitude field is no more than 1,800,000,000 + * and no less than -1,799,999,999, except that the value 1,800,000,001 is + * used to indicate that the longitude was not available to the sender. + */ +OneEightyDegreeInt ::= INTEGER { + min (-1799999999), + max (1800000000), + unknown (1800000001) +} (-1799999999..1800000001) + +/** + * @brief The known longitudes are from -1,799,999,999 to +1,800,000,000 in + * 0.1 microdegree intervals. + */ +KnownLongitude ::= OneEightyDegreeInt (min..max) + +/** + * @brief The value 1,800,000,001 indicates that the longitude was not + * available to the sender. + */ +UnknownLongitude ::= OneEightyDegreeInt (unknown) + + +--***************************************************************************-- +-- Crypto Structures -- +--***************************************************************************-- + +/** + * @brief This structure represents a signature for a supported public key + * algorithm. It may be contained within SignedData or Certificate. + * + * @note Critical information fields: If present, this is a critical + * information field as defined in 5.2.5. An implementation that does not + * recognize the indicated CHOICE for this type when verifying a signed SPDU + * shall indicate that the signed SPDU is invalid in the sense of 4.2.2.3.2, + * that is, it is invalid in the sense that its validity cannot be + * established. + * + * @note Canonicalization: This data structure is subject to canonicalization + * for the relevant operations specified in 6.1.2. The canonicalization + * applies to instances of this data structure of form EcdsaP256Signature + * and EcdsaP384Signature. + */ +Signature ::= CHOICE { + ecdsaNistP256Signature EcdsaP256Signature, + ecdsaBrainpoolP256r1Signature EcdsaP256Signature, + ..., + ecdsaBrainpoolP384r1Signature EcdsaP384Signature, + ecdsaNistP384Signature EcdsaP384Signature, + sm2Signature EcsigP256Signature +} + +/** + * @brief This structure represents an ECDSA signature. The signature is + * generated as specified in 5.3.1. + * + * If the signature process followed the specification of FIPS 186-4 + * and output the integer r, r is represented as an EccP256CurvePoint + * indicating the selection x-only. + * + * If the signature process followed the specification of SEC 1 and + * output the elliptic curve point R to allow for fast verification, R is + * represented as an EccP256CurvePoint indicating the choice compressed-y-0, + * compressed-y-1, or uncompressed at the sender's discretion. + * + * @note Canonicalization: This data structure is subject to canonicalization + * for the relevant operations specified in 6.1.2. When this data structure + * is canonicalized, the EccP256CurvePoint in rSig is represented in the + * form x-only. + * + * @note When the signature is of form x-only, the x-value in rSig is + * an integer mod n, the order of the group; when the signature is of form + * compressed-y-\*, the x-value in rSig is an integer mod p, the underlying + * prime defining the finite field. In principle this means that to convert a + * signature from form compressed-y-\* to form x-only, the converter checks + * the x-value to see if it lies between n and p and reduces it mod n if so. + * In practice this check is unnecessary: Haase's Theorem states that + * difference between n and p is always less than 2*square-root(p), and so the + * chance that an integer lies between n and p, for a 256-bit curve, is + * bounded above by approximately square-root(p)/p or 2^(-128). For the + * 256-bit curves in this standard, the exact values of n and p in hexadecimal + * are: + * + * NISTp256: + * - p = FFFFFFFF00000001000000000000000000000000FFFFFFFFFFFFFFFFFFFFFFFF + * - n = FFFFFFFF00000000FFFFFFFFFFFFFFFFBCE6FAADA7179E84F3B9CAC2FC632551 + * + * Brainpoolp256: + * - p = A9FB57DBA1EEA9BC3E660A909D838D726E3BF623D52620282013481D1F6E5377 + * - n = A9FB57DBA1EEA9BC3E660A909D838D718C397AA3B561A6F7901E0E82974856A7 + */ +EcdsaP256Signature ::= SEQUENCE { + rSig EccP256CurvePoint, + sSig OCTET STRING (SIZE (32)) +} + +/** + * @brief This structure represents an ECDSA signature. The signature is + * generated as specified in 5.3.1. + * + * If the signature process followed the specification of FIPS 186-4 + * and output the integer r, r is represented as an EccP384CurvePoint + * indicating the selection x-only. + * + * If the signature process followed the specification of SEC 1 and + * output the elliptic curve point R to allow for fast verification, R is + * represented as an EccP384CurvePoint indicating the choice compressed-y-0, + * compressed-y-1, or uncompressed at the sender's discretion. + * + * @note Canonicalization: This data structure is subject to canonicalization + * for the relevant operations specified in 6.1.2. When this data structure + * is canonicalized, the EccP384CurvePoint in rSig is represented in the + * form x-only. + * + * @note When the signature is of form x-only, the x-value in rSig is + * an integer mod n, the order of the group; when the signature is of form + * compressed-y-\*, the x-value in rSig is an integer mod p, the underlying + * prime defining the finite field. In principle this means that to convert a + * signature from form compressed-y-* to form x-only, the converter checks the + * x-value to see if it lies between n and p and reduces it mod n if so. In + * practice this check is unnecessary: Haase's Theorem states that difference + * between n and p is always less than 2*square-root(p), and so the chance + * that an integer lies between n and p, for a 384-bit curve, is bounded + * above by approximately square-root(p)/p or 2^(-192). For the 384-bit curve + * in this standard, the exact values of n and p in hexadecimal are: + * - p = 8CB91E82A3386D280F5D6F7E50E641DF152F7109ED5456B412B1DA197FB71123 + * ACD3A729901D1A71874700133107EC53 + * - n = 8CB91E82A3386D280F5D6F7E50E641DF152F7109ED5456B31F166E6CAC0425A7 + * CF3AB6AF6B7FC3103B883202E9046565 + */ +EcdsaP384Signature ::= SEQUENCE { + rSig EccP384CurvePoint, + sSig OCTET STRING (SIZE (48)) +} + +/** + * @brief This structure represents a elliptic curve signature where the + * component r is constrained to be an integer. This structure supports SM2 + * signatures as specified in 5.3.1.3. + */ +EcsigP256Signature ::= SEQUENCE { + rSig OCTET STRING (SIZE (32)), + sSig OCTET STRING (SIZE (32)) +} + +/** + * @brief This structure specifies a point on an elliptic curve in Weierstrass + * form defined over a 256-bit prime number. The curves supported in this + * standard are NIST p256 as defined in FIPS 186-4, Brainpool p256r1 as + * defined in RFC 5639, and the SM2 curve as defined in GB/T 32918.5-2017. + * The fields in this structure are OCTET STRINGS produced with the elliptic + * curve point encoding and decoding methods defined in subclause 5.5.6 of + * IEEE Std 1363-2000. The x-coordinate is encoded as an unsigned integer of + * length 32 octets in network byte order for all values of the CHOICE; the + * encoding of the y-coordinate y depends on whether the point is x-only, + * compressed, or uncompressed. If the point is x-only, y is omitted. If the + * point is compressed, the value of type depends on the least significant + * bit of y: if the least significant bit of y is 0, type takes the value + * compressed-y-0, and if the least significant bit of y is 1, type takes the + * value compressed-y-1. If the point is uncompressed, y is encoded explicitly + * as an unsigned integer of length 32 octets in network byte order. + * + * @note Canonicalization: This data structure is subject to canonicalization + * for the relevant operations specified in 6.1.2 if it appears in a + * HeaderInfo or in a ToBeSignedCertificate. See the definitions of HeaderInfo + * and ToBeSignedCertificate for a specification of the canonicalization + * operations. + */ +EccP256CurvePoint::= CHOICE { + x-only OCTET STRING (SIZE (32)), + fill NULL, + compressed-y-0 OCTET STRING (SIZE (32)), + compressed-y-1 OCTET STRING (SIZE (32)), + uncompressedP256 SEQUENCE { + x OCTET STRING (SIZE (32)), + y OCTET STRING (SIZE (32)) + } +} + +/** + * @brief This structure specifies a point on an elliptic curve in + * Weierstrass form defined over a 384-bit prime number. The only supported + * such curve in this standard is Brainpool p384r1 as defined in RFC 5639. + * The fields in this structure are octet strings produced with the elliptic + * curve point encoding and decoding methods defined in subclause 5.5.6 of + * IEEE Std 1363-2000. The x-coordinate is encoded as an unsigned integer of + * length 48 octets in network byte order for all values of the CHOICE; the + * encoding of the y-coordinate y depends on whether the point is x-only, + * compressed, or uncompressed. If the point is x-only, y is omitted. If the + * point is compressed, the value of type depends on the least significant + * bit of y: if the least significant bit of y is 0, type takes the value + * compressed-y-0, and if the least significant bit of y is 1, type takes the + * value compressed-y-1. If the point is uncompressed, y is encoded + * explicitly as an unsigned integer of length 48 octets in network byte order. + * + * @note Canonicalization: This data structure is subject to canonicalization + * for the relevant operations specified in 6.1.2 if it appears in a + * HeaderInfo or in a ToBeSignedCertificate. See the definitions of HeaderInfo + * and ToBeSignedCertificate for a specification of the canonicalization + * operations. + */ +EccP384CurvePoint::= CHOICE { + x-only OCTET STRING (SIZE (48)), + fill NULL, + compressed-y-0 OCTET STRING (SIZE (48)), + compressed-y-1 OCTET STRING (SIZE (48)), + uncompressedP384 SEQUENCE { + x OCTET STRING (SIZE (48)), + y OCTET STRING (SIZE (48)) + } +} + +/** + * @brief This enumerated value indicates supported symmetric algorithms. The + * algorithm identifier identifies both the algorithm itself and a specific + * mode of operation. The symmetric algorithms supported in this version of + * this standard are AES-128 and SM4. The only mode of operation supported is + * Counter Mode Encryption With Cipher Block Chaining Message Authentication + * Code (CCM). Full details are given in 5.3.8. + */ +SymmAlgorithm ::= ENUMERATED { + aes128Ccm, + ..., + sm4Ccm +} + +/** + * @brief This structure identifies a hash algorithm. The value sha256, + * indicates SHA-256. The value sha384 indicates SHA-384. The value sm3 + * indicates SM3. See 5.3.3 for more details. + * + * @note Critical information fields: This is a critical information field as + * defined in 5.2.6. An implementation that does not recognize the enumerated + * value of this type in a signed SPDU when verifying a signed SPDU shall + * indicate that the signed SPDU is invalid in the sense of 4.2.2.3.2, that + * is, it is invalid in the sense that its validity cannot be established. + */ +HashAlgorithm ::= ENUMERATED { + sha256, + ..., + sha384, + sm3 +} + +/** + * @brief This data structure is used to transfer a 16-byte symmetric key + * encrypted using ECIES as specified in IEEE Std 1363a-2004. The symmetric + * key is input to the key encryption process with no headers, encapsulation, + * or length indication. Encryption and decryption are carried out as + * specified in 5.3.5.1. + * + * @param v: is the sender's ephemeral public key, which is the output V from + * encryption as specified in 5.3.5.1. + * + * @param c: is the encrypted symmetric key, which is the output C from + * encryption as specified in 5.3.5.1. The algorithm for the symmetric key + * is identified by the CHOICE indicated in the following SymmetricCiphertext. + * For ECIES this shall be AES-128. + * + * @param t: is the authentication tag, which is the output tag from + * encryption as specified in 5.3.5.1. + */ +EciesP256EncryptedKey ::= SEQUENCE { + v EccP256CurvePoint, + c OCTET STRING (SIZE (16)), + t OCTET STRING (SIZE (16)) +} + +/** + * @brief This data structure is used to transfer a 16-byte symmetric key + * encrypted using SM2 encryption as specified in 5.3.3. The symmetric key is + * input to the key encryption process with no headers, encapsulation, or + * length indication. Encryption and decryption are carried out as specified + * in 5.3.5.2. + * + * @param v: is the sender's ephemeral public key, which is the output V from + * encryption as specified in 5.3.5.2. + * + * @param c: is the encrypted symmetric key, which is the output C from + * encryption as specified in 5.3.5.2. The algorithm for the symmetric key + * is identified by the CHOICE indicated in the following SymmetricCiphertext. + * For SM2 this algorithm shall be SM4. + * + * @param t: is the authentication tag, which is the output tag from + * encryption as specified in 5.3.5.2. + */ +EcencP256EncryptedKey ::= SEQUENCE { + v EccP256CurvePoint, + c OCTET STRING (SIZE (16)), + t OCTET STRING (SIZE (32)) +} + + +/** + * @brief This structure contains an encryption key, which may be a public or + * a symmetric key. + * + * @note Canonicalization: This data structure is subject to canonicalization + * for the relevant operations specified in 6.1.2 if it appears in a + * HeaderInfo or in a ToBeSignedCertificate. The canonicalization applies to + * the PublicEncryptionKey. See the definitions of HeaderInfo and + * ToBeSignedCertificate for a specification of the canonicalization + * operations. + */ +EncryptionKey ::= CHOICE { + public PublicEncryptionKey, + symmetric SymmetricEncryptionKey +} + +/** + * @brief This structure specifies a public encryption key and the associated + * symmetric algorithm which is used for bulk data encryption when encrypting + * for that public key. + * + * @note Canonicalization: This data structure is subject to canonicalization + * for the relevant operations specified in 6.1.2 if it appears in a + * HeaderInfo or in a ToBeSignedCertificate. The canonicalization applies to + * the BasePublicEncryptionKey. See the definitions of HeaderInfo and + * ToBeSignedCertificate for a specification of the canonicalization + * operations. + */ +PublicEncryptionKey ::= SEQUENCE { + supportedSymmAlg SymmAlgorithm, + publicKey BasePublicEncryptionKey +} + +/** + * @brief This structure specifies the bytes of a public encryption key for + * a particular algorithm. Supported public key encryption algorithms are + * defined in 5.3.5. + * + * @note Canonicalization: This data structure is subject to canonicalization + * for the relevant operations specified in 6.1.2 if it appears in a + * HeaderInfo or in a ToBeSignedCertificate. See the definitions of HeaderInfo + * and ToBeSignedCertificate for a specification of the canonicalization + * operations. + */ +BasePublicEncryptionKey ::= CHOICE { + eciesNistP256 EccP256CurvePoint, + eciesBrainpoolP256r1 EccP256CurvePoint, + ..., + ecencSm2 EccP256CurvePoint +} + +/** + * @brief This structure represents a public key and states with what + * algorithm the public key is to be used. Cryptographic mechanisms are + * defined in 5.3. + * An EccP256CurvePoint or EccP384CurvePoint within a PublicVerificationKey + * structure is invalid if it indicates the choice x-only. + * + * @note Critical information fields: If present, this is a critical + * information field as defined in 5.2.6. An implementation that does not + * recognize the indicated CHOICE when verifying a signed SPDU shall indicate + * that the signed SPDU is invalid indicate that the signed SPDU is invalid + * in the sense of 4.2.2.3.2, that is, it is invalid in the sense that its + * validity cannot be established. + * + * @note Canonicalization: This data structure is subject to canonicalization + * for the relevant operations specified in 6.1.2. The canonicalization + * applies to the EccP256CurvePoint and the Ecc384CurvePoint. Both forms of + * point are encoded in compressed form, i.e., such that the choice indicated + * within the Ecc*CurvePoint is compressed-y-0 or compressed-y-1. + */ +PublicVerificationKey ::= CHOICE { + ecdsaNistP256 EccP256CurvePoint, + ecdsaBrainpoolP256r1 EccP256CurvePoint, + ... , + ecdsaBrainpoolP384r1 EccP384CurvePoint, + ecdsaNistP384 EccP384CurvePoint, + ecsigSm2 EccP256CurvePoint +} + +/** + * @brief This structure provides the key bytes for use with an identified + * symmetric algorithm. The supported symmetric algorithms are AES-128 and + * SM4 in CCM mode as specified in 5.3.8. + */ +SymmetricEncryptionKey ::= CHOICE { + aes128Ccm OCTET STRING(SIZE(16)), + ..., + sm4Ccm OCTET STRING(SIZE(16)) +} + + +--***************************************************************************-- +-- PSID / ITS-AID -- +--***************************************************************************-- + +/** + * @brief This structure represents the permissions that the certificate + * holder has with respect to activities for a single application area, + * identified by a Psid. + * + * @note The determination as to whether the activities are consistent with + * the permissions indicated by the PSID and ServiceSpecificPermissions is + * made by the SDEE and not by the SDS; the SDS provides the PSID and SSP + * information to the SDEE to enable the SDEE to make that determination. + * See 5.2.4.3.3 for more information. + * + * @note The SDEE specification is expected to specify what application + * activities are permitted by particular ServiceSpecificPermissions values. + * The SDEE specification is also expected EITHER to specify application + * activities that are permitted if the ServiceSpecificPermissions is + * omitted, OR to state that the ServiceSpecificPermissions need to always be + * present. + * + * @note Consistency with signed SPDU: As noted in 5.1.1, + * consistency between the SSP and the signed SPDU is defined by rules + * specific to the given PSID and is out of scope for this standard. + * + * @note Consistency with issuing certificate: If a certificate has an + * appPermissions entry A for which the ssp field is omitted, A is consistent + * with the issuing certificate if the issuing certificate contains a + * PsidSspRange P for which the following holds: + * - The psid field in P is equal to the psid field in A and one of the + * following is true: + * - The sspRange field in P indicates all. + * - The sspRange field in P indicates opaque and one of the entries in + * opaque is an OCTET STRING of length 0. + * + * For consistency rules for other forms of the ssp field, see the + * following subclauses. + */ +PsidSsp ::= SEQUENCE { + psid Psid, + ssp ServiceSpecificPermissions OPTIONAL +} + +/** + * @brief This type is used for clarity of definitions. + */ +SequenceOfPsidSsp ::= SEQUENCE OF PsidSsp + +/** + * @brief This type represents the PSID defined in IEEE Std 1609.12. + */ +Psid ::= INTEGER (0..MAX) + +/** + * @brief This type is used for clarity of definitions. + */ +SequenceOfPsid ::= SEQUENCE OF Psid + +/** + * @brief This structure represents the Service Specific Permissions (SSP) + * relevant to a given entry in a PsidSsp. The meaning of the SSP is specific + * to the associated Psid. SSPs may be PSID-specific octet strings or + * bitmap-based. See Annex C for further discussion of how application + * specifiers may choose which SSP form to use. + * + * @note Consistency with issuing certificate: If a certificate has an + * appPermissions entry A for which the ssp field is opaque, A is consistent + * with the issuing certificate if the issuing certificate contains one of + * the following: + * - (OPTION 1) A SubjectPermissions field indicating the choice all and + * no PsidSspRange field containing the psid field in A; + * - (OPTION 2) A PsidSspRange P for which the following holds: + * - The psid field in P is equal to the psid field in A and one of the + * following is true: + * - The sspRange field in P indicates all. + * - The sspRange field in P indicates opaque and one of the entries in + * the opaque field in P is an OCTET STRING identical to the opaque field in + * A. + * + * For consistency rules for other types of ServiceSpecificPermissions, + * see the following subclauses. + */ +ServiceSpecificPermissions ::= CHOICE { + opaque OCTET STRING (SIZE(0..MAX)), + ..., + bitmapSsp BitmapSsp +} + +/** + * @brief This structure represents a bitmap representation of a SSP. The + * mapping of the bits of the bitmap to constraints on the signed SPDU is + * PSID-specific. + * + * @note Consistency with issuing certificate: If a certificate has an + * appPermissions entry A for which the ssp field is bitmapSsp, A is + * consistent with the issuing certificate if the certificate contains one + * of the following: + * - (OPTION 1) A SubjectPermissions field indicating the choice all and + * no PsidSspRange field containing the psid field in A; + * - (OPTION 2) A PsidSspRange P for which the following holds: + * - The psid field in P is equal to the psid field in A and one of the + * following is true: + * - EITHER The sspRange field in P indicates all + * - OR The sspRange field in P indicates bitmapSspRange and for every + * bit set to 1 in the sspBitmask in P, the bit in the identical position in + * the sspValue in A is set equal to the bit in that position in the + * sspValue in P. + * + * @note A BitmapSsp B is consistent with a BitmapSspRange R if for every + * bit set to 1 in the sspBitmask in R, the bit in the identical position in + * B is set equal to the bit in that position in the sspValue in R. For each + * bit set to 0 in the sspBitmask in R, the corresponding bit in the + * identical position in B may be freely set to 0 or 1, i.e., if a bit is + * set to 0 in the sspBitmask in R, the value of corresponding bit in the + * identical position in B has no bearing on whether B and R are consistent. + */ +BitmapSsp ::= OCTET STRING (SIZE(0..31)) + +/** + * @brief This structure represents the certificate issuing or requesting + * permissions of the certificate holder with respect to one particular set + * of application permissions. + * + * @param psid: identifies the application area. + * + * @param sspRange: identifies the SSPs associated with that PSID for which + * the holder may issue or request certificates. If sspRange is omitted, the + * holder may issue or request certificates for any SSP for that PSID. + */ +PsidSspRange ::= SEQUENCE { + psid Psid, + sspRange SspRange OPTIONAL +} + +/** + * @brief This type is used for clarity of definitions. + */ +SequenceOfPsidSspRange ::= SEQUENCE OF PsidSspRange + +/** + * @brief This structure identifies the SSPs associated with a PSID for + * which the holder may issue or request certificates. + * + * @note Consistency with issuing certificate: If a certificate has a + * PsidSspRange A for which the ssp field is opaque, A is consistent with + * the issuing certificate if the issuing certificate contains one of the + * following: + * - (OPTION 1) A SubjectPermissions field indicating the choice all and + * no PsidSspRange field containing the psid field in A; + * - (OPTION 2) A PsidSspRange P for which the following holds: + * - The psid field in P is equal to the psid field in A and one of the + * following is true: + * - The sspRange field in P indicates all. + * - The sspRange field in P indicates opaque, and the sspRange field in + * A indicates opaque, and every OCTET STRING within the opaque in A is a + * duplicate of an OCTET STRING within the opaque in P. + * + * If a certificate has a PsidSspRange A for which the ssp field is all, + * A is consistent with the issuing certificate if the issuing certificate + * contains a PsidSspRange P for which the following holds: + * - (OPTION 1) A SubjectPermissions field indicating the choice all and + * no PsidSspRange field containing the psid field in A; + * - (OPTION 2) A PsidSspRange P for which the psid field in P is equal to + * the psid field in A and the sspRange field in P indicates all. + * + * For consistency rules for other types of SspRange, see the following + * subclauses. + * + * @note The choice "all" may also be indicated by omitting the + * SspRange in the enclosing PsidSspRange structure. Omitting the SspRange is + * preferred to explicitly indicating "all". + */ +SspRange ::= CHOICE { + opaque SequenceOfOctetString, + all NULL, + ..., + bitmapSspRange BitmapSspRange +} + +/** + * @brief This structure represents a bitmap representation of a SSP. The + * sspValue indicates permissions. The sspBitmask contains an octet string + * used to permit or constrain sspValue fields in issued certificates. The + * sspValue and sspBitmask fields shall be of the same length. + * + * @note Consistency with issuing certificate: If a certificate has an + * PsidSspRange value P for which the sspRange field is bitmapSspRange, + * P is consistent with the issuing certificate if the issuing certificate + * contains one of the following: + * - (OPTION 1) A SubjectPermissions field indicating the choice all and + * no PsidSspRange field containing the psid field in P; + * - (OPTION 2) A PsidSspRange R for which the following holds: + * - The psid field in R is equal to the psid field in P and one of the + * following is true: + * - EITHER The sspRange field in R indicates all + * - OR The sspRange field in R indicates bitmapSspRange and for every + * bit set to 1 in the sspBitmask in R: + * - The bit in the identical position in the sspBitmask in P is set + * equal to 1, AND + * - The bit in the identical position in the sspValue in P is set equal + * to the bit in that position in the sspValue in R. + * + * Reference ETSI TS 103 097 for more information on bitmask SSPs. + */ +BitmapSspRange ::= SEQUENCE { + sspValue OCTET STRING (SIZE(1..32)), + sspBitmask OCTET STRING (SIZE(1..32)) +} + +/** + * @brief This type is used for clarity of definitions. + */ +SequenceOfOctetString ::= + SEQUENCE (SIZE (0..MAX)) OF OCTET STRING (SIZE(0..MAX)) + + +--***************************************************************************-- +-- Certificate Components -- +--***************************************************************************-- + +/** + * @brief This field contains the certificate holder's assurance level, which + * indicates the security of both the platform and storage of secret keys as + * well as the confidence in this assessment. + * + * This field is encoded as defined in Table 1, where "A" denotes bit + * fields specifying an assurance level, "R" reserved bit fields, and "C" bit + * fields specifying the confidence. + * + * Table 1: Bitwise encoding of subject assurance + * + * | Bit number | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 | + * | -------------- | --- | --- | --- | --- | --- | --- | --- | --- | + * | Interpretation | A | A | A | R | R | R | C | C | + * + * In Table 1, bit number 0 denotes the least significant bit. Bit 7 + * to bit 5 denote the device's assurance levels, bit 4 to bit 2 are reserved + * for future use, and bit 1 and bit 0 denote the confidence. + * + * The specification of these assurance levels as well as the + * encoding of the confidence levels is outside the scope of the present + * standard. It can be assumed that a higher assurance value indicates that + * the holder is more trusted than the holder of a certificate with lower + * assurance value and the same confidence value. + * + * @note This field was originally specified in ETSI TS 103 097 and + * future uses of this field are anticipated to be consistent with future + * versions of that standard. + */ +SubjectAssurance ::= OCTET STRING (SIZE(1)) + +/** + * @brief This integer identifies a series of CRLs issued under the authority + * of a particular CRACA. + */ +CrlSeries ::= Uint16 + + +--***************************************************************************-- +-- Pseudonym Linkage -- +--***************************************************************************-- + +/** + * @brief This atomic type is used in the definition of other data structures. + */ +IValue ::= Uint16 + +/** + * @brief This is a UTF-8 string as defined in IETF RFC 3629. The contents + * are determined by policy. + */ +Hostname ::= UTF8String (SIZE(0..255)) + +/** + * @brief This is the individual linkage value. See 5.1.3 and 7.3 for details + * of use. + */ +LinkageValue ::= OCTET STRING (SIZE(9)) + +/** + * @brief This is the group linkage value. See 5.1.3 and 7.3 for details of + * use. + */ +GroupLinkageValue ::= SEQUENCE { + jValue OCTET STRING (SIZE(4)), + value OCTET STRING (SIZE(9)) +} + +/** + * @brief This structure contains a LA Identifier for use in the algorithms + * specified in 5.1.3.4. + */ +LaId ::= OCTET STRING (SIZE(2)) + +/** + * @brief This type is used for clarity of definitions. + */ +SequenceOfLinkageSeed ::= SEQUENCE OF LinkageSeed + +/** + * @brief This structure contains a linkage seed value for use in the + * algorithms specified in 5.1.3.4. + */ +LinkageSeed ::= OCTET STRING (SIZE(16)) + +--***************************************************************************-- +-- Information Object Classes and Sets -- +--***************************************************************************-- + +/** + * @brief This structure is the Information Object Class used to contain + * information about a set of certificate extensions that are associated with + * each other: an AppExtension, a CertIssueExtension, and a + * CertRequestExtension. + */ +CERT-EXT-TYPE ::= CLASS { + &id ExtId, + &App, + &Issue, + &Req +} WITH SYNTAX {ID &id APP &App ISSUE &Issue REQUEST &Req} + +/** + * @brief This parameterized type represents a (id, content) pair drawn from + * the set ExtensionTypes, which is constrained to contain objects defined by + * the class EXT-TYPE. + */ +Extension {EXT-TYPE : ExtensionTypes} ::= SEQUENCE { + id EXT-TYPE.&extId({ExtensionTypes}), + content EXT-TYPE.&ExtContent({ExtensionTypes}{@.id}) +} + +/** + * @brief This class defines objects in a form suitable for import into the + * definition of HeaderInfo. + */ +EXT-TYPE ::= CLASS { + &extId ExtId, + &ExtContent +} WITH SYNTAX {&ExtContent IDENTIFIED BY &extId} + +/** + * @brief This type is used as an identifier for instances of ExtContent + * within an EXT-TYPE. + */ +ExtId ::= INTEGER(0..255) + + +END diff --git a/certgen/asncodec/asn1/ieee1609.2/Ieee1609Dot2Crl.asn b/certgen/asncodec/asn1/ieee1609.2/Ieee1609Dot2Crl.asn index 92e97388ed7248c284f9d85b22752c0bcebba905..875edd82107b0e756a1ea9948d9b46ee631916e9 100644 --- a/certgen/asncodec/asn1/ieee1609.2/Ieee1609Dot2Crl.asn +++ b/certgen/asncodec/asn1/ieee1609.2/Ieee1609Dot2Crl.asn @@ -1,72 +1,72 @@ ---***************************************************************************-- --- IEEE Std 1609.2: CRL Data Types -- ---***************************************************************************-- - -/** - * @note Section references in this file are to clauses in IEEE Std - * 1609.2 unless indicated otherwise. Full forms of acronyms and - * abbreviations used in this file are specified in 3.2. - */ - -Ieee1609Dot2Crl {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) - crl(3) major-version-3(3) minor-version-2(2)} - -DEFINITIONS AUTOMATIC TAGS ::= BEGIN - -IMPORTS - Ieee1609Dot2Data -FROM Ieee1609Dot2 {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) - dot2(2) base(1) schema(1) major-version-2(2) minor-version-6(6)} -WITH SUCCESSORS - - Opaque, - Psid -FROM Ieee1609Dot2BaseTypes {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) - base(1) base-types(2) major-version-2(2) minor-version-4(4)} -WITH SUCCESSORS - - CrlContents -FROM Ieee1609Dot2CrlBaseTypes {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) - crl(3) base-types(2) major-version-3(3) minor-version-2(2)} -WITH SUCCESSORS -; - -/** - * @brief This is the PSID for the CRL application. - */ -CrlPsid ::= Psid(256) - -/** - * @brief This structure is the SPDU used to contain a signed CRL. A valid - * signed CRL meets the validity criteria of 7.4. - */ -SecuredCrl ::= Ieee1609Dot2Data (WITH COMPONENTS {..., - content (WITH COMPONENTS { - signedData (WITH COMPONENTS {..., - tbsData (WITH COMPONENTS { - payload (WITH COMPONENTS {..., - data (WITH COMPONENTS {..., - content (WITH COMPONENTS { - unsecuredData (CONTAINING CrlContents) - }) - }) - }), - headerInfo (WITH COMPONENTS {..., - psid (CrlPsid), - generationTime ABSENT, - expiryTime ABSENT, - generationLocation ABSENT, - p2pcdLearningRequest ABSENT, - missingCrlIdentifier ABSENT, - encryptionKey ABSENT - }) - }) - }) - }) -}) - -END +--***************************************************************************-- +-- IEEE Std 1609.2: CRL Data Types -- +--***************************************************************************-- + +/** + * @note Section references in this file are to clauses in IEEE Std + * 1609.2 unless indicated otherwise. Full forms of acronyms and + * abbreviations used in this file are specified in 3.2. + */ + +Ieee1609Dot2Crl {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) + crl(3) major-version-3(3) minor-version-2(2)} + +DEFINITIONS AUTOMATIC TAGS ::= BEGIN + +IMPORTS + Ieee1609Dot2Data +FROM Ieee1609Dot2 {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) + dot2(2) base(1) schema(1) major-version-2(2) minor-version-6(6)} +WITH SUCCESSORS + + Opaque, + Psid +FROM Ieee1609Dot2BaseTypes {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) + base(1) base-types(2) major-version-2(2) minor-version-4(4)} +WITH SUCCESSORS + + CrlContents +FROM Ieee1609Dot2CrlBaseTypes {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) + crl(3) base-types(2) major-version-3(3) minor-version-2(2)} +WITH SUCCESSORS +; + +/** + * @brief This is the PSID for the CRL application. + */ +CrlPsid ::= Psid(256) + +/** + * @brief This structure is the SPDU used to contain a signed CRL. A valid + * signed CRL meets the validity criteria of 7.4. + */ +SecuredCrl ::= Ieee1609Dot2Data (WITH COMPONENTS {..., + content (WITH COMPONENTS { + signedData (WITH COMPONENTS {..., + tbsData (WITH COMPONENTS { + payload (WITH COMPONENTS {..., + data (WITH COMPONENTS {..., + content (WITH COMPONENTS { + unsecuredData (CONTAINING CrlContents) + }) + }) + }), + headerInfo (WITH COMPONENTS {..., + psid (CrlPsid), + generationTime ABSENT, + expiryTime ABSENT, + generationLocation ABSENT, + p2pcdLearningRequest ABSENT, + missingCrlIdentifier ABSENT, + encryptionKey ABSENT + }) + }) + }) + }) +}) + +END diff --git a/certgen/asncodec/asn1/ieee1609.2/Ieee1609Dot2CrlBaseTypes.asn b/certgen/asncodec/asn1/ieee1609.2/Ieee1609Dot2CrlBaseTypes.asn index a45aeec6d8504a6015fe68bb107ed4518049a902..d70b46f80e78bab58609a0e99223570067ca2938 100644 --- a/certgen/asncodec/asn1/ieee1609.2/Ieee1609Dot2CrlBaseTypes.asn +++ b/certgen/asncodec/asn1/ieee1609.2/Ieee1609Dot2CrlBaseTypes.asn @@ -1,468 +1,468 @@ ---***************************************************************************-- --- IEEE Std 1609.2: CRL Base Data Types -- ---***************************************************************************-- - -/** - * @note Section references in this file are to clauses in IEEE Std - * 1609.2 unless indicated otherwise. Full forms of acronyms and - * abbreviations used in this file are specified in 3.2. - */ - -Ieee1609Dot2CrlBaseTypes {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) - crl(3) base-types(2) major-version-3(3) minor-version-2(2)} - -DEFINITIONS AUTOMATIC TAGS ::= BEGIN - -IMPORTS - CrlSeries, - Duration, - GeographicRegion, - HashedId8, - HashedId10, - IValue, - LaId, - LinkageSeed, - Opaque, - Psid, - SequenceOfLinkageSeed, - Signature, - Time32, - Uint3, - Uint8, - Uint16, - Uint32, - ValidityPeriod -FROM Ieee1609Dot2BaseTypes {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) - base(1) base-types(2) major-version-2(2) minor-version-4(4)} -WITH SUCCESSORS -; - -/** - * @brief The fields in this structure have the following meaning: - * - * @param version: is the version number of the CRL. For this version of this - * standard it is 1. - * - * @param crlSeries: represents the CRL series to which this CRL belongs. This - * is used to determine whether the revocation information in a CRL is relevant - * to a particular certificate as specified in 5.1.3.2. - * - * @param crlCraca: contains the low-order eight octets of the hash of the - * certificate of the Certificate Revocation Authorization CA (CRACA) that - * ultimately authorized the issuance of this CRL. This is used to determine - * whether the revocation information in a CRL is relevant to a particular - * certificate as specified in 5.1.3.2. In a valid signed CRL as specified in - * 7.4 the crlCraca is consistent with the associatedCraca field in the - * Service Specific Permissions as defined in 7.4.3.3. The HashedId8 is - * calculated with the whole-certificate hash algorithm, determined as - * described in 6.4.3, applied to the COER-encoded certificate, canonicalized - * as defined in the definition of Certificate. - * - * @param issueDate: specifies the time when the CRL was issued. - * - * @param nextCrl: contains the time when the next CRL with the same crlSeries - * and cracaId is expected to be issued. The CRL is invalid unless nextCrl is - * strictly after issueDate. This field is used to set the expected update time - * for revocation information associated with the (crlCraca, crlSeries) pair as - * specified in 5.1.3.6. - * - * @param priorityInfo: contains information that assists devices with limited - * storage space in determining which revocation information to retain and - * which to discard. - * - * @param typeSpecific: contains the CRL body. - */ -CrlContents ::= SEQUENCE { - version Uint8 (1), - crlSeries CrlSeries, - crlCraca HashedId8, - issueDate Time32, - nextCrl Time32, - priorityInfo CrlPriorityInfo, - typeSpecific TypeSpecificCrlContents -} - -/** - * @brief This data structure contains information that assists devices with - * limited storage space in determining which revocation information to retain - * and which to discard. - * - * @param priority: indicates the priority of the revocation information - * relative to other CRLs issued for certificates with the same cracaId and - * crlSeries values. A higher value for this field indicates higher importance - * of this revocation information. - * - * @note This mechanism is for future use; details are not specified in this - * version of the standard. - */ -CrlPriorityInfo ::= SEQUENCE { - priority Uint8 OPTIONAL, - ... -} - -/** - * @brief This structure contains type-specific CRL contents. - * - * @param fullHashCrl: contains a full hash-based CRL, i.e., a listing of the - * hashes of all certificates that: - * - contain the indicated cracaId and crlSeries values, and - * - are revoked by hash, and - * - have been revoked, and - * - have not expired. - * - * @param deltaHashCrl: contains a delta hash-based CRL, i.e., a listing of - * the hashes of all certificates that: - * - contain the indicated cracaId and crlSeries values, and - * - are revoked by hash, and - * - have been revoked since the previous CRL that contained the indicated - * cracaId and crlSeries values. - * - * @param fullLinkedCrl and fullLinkedCrlWithAlg: contain a full linkage - * ID-based CRL, i.e., a listing of the individual and/or group linkage data - * for all certificates that: - * - contain the indicated cracaId and crlSeries values, and - * - are revoked by linkage value, and - * - have been revoked, and - * - have not expired. - * The difference between fullLinkedCrl and fullLinkedCrlWithAlg is in how - * the cryptographic algorithms to be used in the seed evolution function and - * linkage value generation function of 5.1.3.4 are communicated to the - * receiver of the CRL. See below in this subclause for details. - * - * @param deltaLinkedCrl and deltaLinkedCrlWithAlg: contain a delta linkage - * ID-based CRL, i.e., a listing of the individual and/or group linkage data - * for all certificates that: - * - contain the specified cracaId and crlSeries values, and - * - are revoked by linkage data, and - * - have been revoked since the previous CRL that contained the indicated - * cracaId and crlSeries values. - * The difference between deltaLinkedCrl and deltaLinkedCrlWithAlg is in how - * the cryptographic algorithms to be used in the seed evolution function - * and linkage value generation function of 5.1.3.4 are communicated to the - * receiver of the CRL. See below in this subclause for details. - * - * @note It is the intent of this standard that once a certificate is revoked, - * it remains revoked for the rest of its lifetime. CRL signers are expected - * to include a revoked certificate on all CRLs issued between the - * certificate's revocation and its expiry. - * - * @note Seed evolution function and linkage value generation function - * identification. In order to derive linkage values per the mechanisms given - * in 5.1.3.4, a receiver needs to know the seed evolution function and the - * linkage value generation function. - * - * If the contents of this structure is a - * ToBeSignedLinkageValueCrlWithAlgIdentifier, then the seed evolution function - * and linkage value generation function are given explicitly as specified in - * the specification of ToBeSignedLinkageValueCrlWithAlgIdentifier. - * - * If the contents of this structure is a ToBeSignedLinkageValueCrl, then the - * seed evolution function and linkage value generation function are obtained - * based on the crlCraca field in the CrlContents: - * - If crlCraca was obtained with SHA-256 or SHA-384, then - * seedEvolutionFunctionIdentifier is seedEvoFn1-sha256 and - * linkageValueGenerationFunctionIdentifier is lvGenFn1-aes128. - * - If crlCraca was obtained with SM3, then seedEvolutionFunctionIdentifier - * is seedEvoFn1-sm3 and linkageValueGenerationFunctionIdentifier is - * lvGenFn1-sm4. - */ -TypeSpecificCrlContents ::= CHOICE { - fullHashCrl ToBeSignedHashIdCrl, - deltaHashCrl ToBeSignedHashIdCrl, - fullLinkedCrl ToBeSignedLinkageValueCrl, - deltaLinkedCrl ToBeSignedLinkageValueCrl, - ..., - fullLinkedCrlWithAlg ToBeSignedLinkageValueCrlWithAlgIdentifier, - deltaLinkedCrlWithAlg ToBeSignedLinkageValueCrlWithAlgIdentifier -} - -/** - * @brief This data structure represents information about a revoked - * certificate. - * - * @param crlSerial: is a counter that increments by 1 every time a new full - * or delta CRL is issued for the indicated crlCraca and crlSeries values. - * - * @param entries: contains the individual revocation information items. - * - * @note To indicate that a hash-based CRL contains no individual revocation - * information items, the recommended approach is for the SEQUENCE OF in the - * SequenceOfHashBasedRevocationInfo in this field to indicate zero entries. - */ -ToBeSignedHashIdCrl ::= SEQUENCE { - crlSerial Uint32, - entries SequenceOfHashBasedRevocationInfo, - ... -} - -/** - * @brief This type is used for clarity of definitions. - */ -SequenceOfHashBasedRevocationInfo ::= - SEQUENCE OF HashBasedRevocationInfo - -/** - * @brief In this structure: - * - * @param id: is the HashedId10 identifying the revoked certificate. The - * HashedId10 is calculated with the whole-certificate hash algorithm, - * determined as described in 6.4.3, applied to the COER-encoded certificate, - * canonicalized as defined in the definition of Certificate. - * - * @param expiry: is the value computed from the validity period's start and - * duration values in that certificate. - */ -HashBasedRevocationInfo ::= SEQUENCE { - id HashedId10, - expiry Time32, - ... -} - -/** - * @brief In this structure: - * - * @param iRev: is the value iRev used in the algorithm given in 5.1.3.4. This - * value applies to all linkage-based revocation information included within - * either indvidual or groups. - * - * @param indexWithinI: is a counter that is set to 0 for the first CRL issued - * for the indicated combination of crlCraca, crlSeries, and iRev, and - * increments by 1 every time a new full or delta CRL is issued for the - * indicated crlCraca and crlSeries values without changing iRev. - * - * @param individual: contains individual linkage data. - * - * @note To indicate that a linkage ID-based CRL contains no individual - * linkage data, the recommended approach is for the SEQUENCE OF in the - * SequenceOfJMaxGroup in this field to indicate zero entries. - * - * @param groups: contains group linkage data. - * - * @note To indicate that a linkage ID-based CRL contains no group linkage - * data, the recommended approach is for the SEQUENCE OF in the - * SequenceOfGroupCrlEntry in this field to indicate zero entries. - * - * @param groupsSingleSeed: contains group linkage data generated with a single - * seed. - */ -ToBeSignedLinkageValueCrl ::= SEQUENCE { - iRev IValue, - indexWithinI Uint8, - individual SequenceOfJMaxGroup OPTIONAL, - groups SequenceOfGroupCrlEntry OPTIONAL, - ..., - groupsSingleSeed SequenceOfGroupSingleSeedCrlEntry OPTIONAL -} (WITH COMPONENTS {..., individual PRESENT} | - WITH COMPONENTS {..., groups PRESENT} | - WITH COMPONENTS {..., groupsSingleSeed PRESENT}) - -/** - * @brief This type is used for clarity of definitions. - */ -SequenceOfJMaxGroup ::= SEQUENCE OF JMaxGroup - -/** - * @brief In this structure: - * - * @param jMax: is the value jMax used in the algorithm given in 5.1.3.4. This - * value applies to all linkage-based revocation information included within - * contents. - * - * @param contents: contains individual linkage data. - */ -JMaxGroup ::= SEQUENCE { - jmax Uint8, - contents SequenceOfLAGroup, - ... -} - -/** - * @brief This type is used for clarity of definitions. - */ -SequenceOfLAGroup ::= SEQUENCE OF LAGroup - -/** - * @brief In this structure: - * - * @param la1Id: is the value LinkageAuthorityIdentifier1 used in the - * algorithm given in 5.1.3.4. This value applies to all linkage-based - * revocation information included within contents. - * - * @param la2Id: is the value LinkageAuthorityIdentifier2 used in the - * algorithm given in 5.1.3.4. This value applies to all linkage-based - * revocation information included within contents. - * - * @param contents: contains individual linkage data. - */ -LAGroup ::= SEQUENCE { - la1Id LaId, - la2Id LaId, - contents SequenceOfIMaxGroup, - ... -} - -/** - * @brief This type is used for clarity of definitions. - */ -SequenceOfIMaxGroup ::= SEQUENCE OF IMaxGroup - -/** - * @brief In this structure: - * - * @param iMax indicates that for the entries in contents, revocation - * information need no longer be calculated once iCert > iMax as the holder - * is known to have no more valid certs at that point. iMax is not directly - * used in the calculation of the linkage values, it is used to determine - * when revocation information can safely be deleted. - * - * @param contents contains individual linkage data for certificates that are - * revoked using two seeds, per the algorithm given in per the mechanisms - * given in 5.1.3.4 and with seedEvolutionFunctionIdentifier and - * linkageValueGenerationFunctionIdentifier obtained as specified in 7.3.3. - * - * @param singleSeed contains individual linkage data for certificates that - * are revoked using a single seed, per the algorithm given in per the - * mechanisms given in 5.1.3.4 and with seedEvolutionFunctionIdentifier and - * linkageValueGenerationFunctionIdentifier obtained as specified in 7.3.3. - */ -IMaxGroup ::= SEQUENCE { - iMax Uint16, - contents SequenceOfIndividualRevocation, - ..., - singleSeed SequenceOfLinkageSeed OPTIONAL -} - -/** - * @brief This type is used for clarity of definitions. - */ -SequenceOfIndividualRevocation ::= - SEQUENCE (SIZE(0..MAX)) OF IndividualRevocation - -/** - * @brief In this structure: - * - * @param linkageSeed1 is the value LinkageSeed1 used in the algorithm given - * in 5.1.3.4. - * - * @param linkageSeed2 is the value LinkageSeed2 used in the algorithm given - * in 5.1.3.4. - */ -IndividualRevocation ::= SEQUENCE { - linkageSeed1 LinkageSeed, - linkageSeed2 LinkageSeed, - ... -} - -/** - * @brief This type is used for clarity of definitions. - */ -SequenceOfGroupCrlEntry ::= SEQUENCE OF GroupCrlEntry - -/** - * @brief In this structure: - * - * @param iMax: indicates that for these certificates, revocation information - * need no longer be calculated once iCert > iMax as the holders are known - * to have no more valid certs for that (crlCraca, crlSeries) at that point. - * - * @param la1Id: is the value LinkageAuthorityIdentifier1 used in the - * algorithm given in 5.1.3.4. This value applies to all linkage-based - * revocation information included within contents. - * - * @param linkageSeed1: is the value LinkageSeed1 used in the algorithm given - * in 5.1.3.4. - * - * @param la2Id: is the value LinkageAuthorityIdentifier2 used in the - * algorithm given in 5.1.3.4. This value applies to all linkage-based - * revocation information included within contents. - * - * @param linkageSeed2: is the value LinkageSeed2 used in the algorithm given - * in 5.1.3.4. - */ -GroupCrlEntry ::= SEQUENCE { - iMax Uint16, - la1Id LaId, - linkageSeed1 LinkageSeed, - la2Id LaId, - linkageSeed2 LinkageSeed, - ... -} - -/** - * @brief In this structure: - * - * @param iRev is the value iRev used in the algorithm given in 5.1.3.4. This - * value applies to all linkage-based revocation information included within - * either indvidual or groups. - * - * @param indexWithinI is a counter that is set to 0 for the first CRL issued - * for the indicated combination of crlCraca, crlSeries, and iRev, and increments by 1 every time a new full or delta CRL is issued for the indicated crlCraca and crlSeries values without changing iRev. - * - * @param seedEvolution contains an identifier for the seed evolution - * function, used as specified in 5.1.3.4. - * - * @param lvGeneration contains an identifier for the linkage value - * generation function, used as specified in 5.1.3.4. - * - * @param individual contains individual linkage data. - * - * @param groups contains group linkage data for linkage value generation - * with two seeds. - * - * @param groupsSingleSeed contains group linkage data for linkage value - * generation with one seed. - */ -ToBeSignedLinkageValueCrlWithAlgIdentifier ::= SEQUENCE { - iRev IValue, - indexWithinI Uint8, - seedEvolution SeedEvolutionFunctionIdentifier, - lvGeneration LvGenerationFunctionIdentifier, - individual SequenceOfJMaxGroup OPTIONAL, - groups SequenceOfGroupCrlEntry OPTIONAL, - groupsSingleSeed SequenceOfGroupSingleSeedCrlEntry OPTIONAL, - ... -} (WITH COMPONENTS {..., individual PRESENT} | - WITH COMPONENTS {..., groups PRESENT} | - WITH COMPONENTS {..., groupsSingleSeed PRESENT}) - -/** - * @brief This type is used for clarity of definitions. - */ -SequenceOfGroupSingleSeedCrlEntry ::= - SEQUENCE OF GroupSingleSeedCrlEntry - -/** - * @brief This structure contains the linkage seed for group revocation with - * a single seed. The seed is used as specified in the algorithms in 5.1.3.4. - */ -GroupSingleSeedCrlEntry ::= SEQUENCE { - iMax Uint16, - laId LaId, - linkageSeed LinkageSeed -} - -/** - * @brief This structure contains an identifier for the algorithms specified - * in 5.1.3.4. - */ -ExpansionAlgorithmIdentifier ::= ENUMERATED { - sha256ForI-aesForJ, - sm3ForI-sm4ForJ, - ... -} - -/** - * @brief This is the identifier for the seed evolution function. See 5.1.3 - * for details of use. - */ -SeedEvolutionFunctionIdentifier ::= NULL - -/** - * @brief This is the identifier for the linkage value generation function. - * See 5.1.3 for details of use. - */ -LvGenerationFunctionIdentifier ::= NULL - -END +--***************************************************************************-- +-- IEEE Std 1609.2: CRL Base Data Types -- +--***************************************************************************-- + +/** + * @note Section references in this file are to clauses in IEEE Std + * 1609.2 unless indicated otherwise. Full forms of acronyms and + * abbreviations used in this file are specified in 3.2. + */ + +Ieee1609Dot2CrlBaseTypes {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) + crl(3) base-types(2) major-version-3(3) minor-version-2(2)} + +DEFINITIONS AUTOMATIC TAGS ::= BEGIN + +IMPORTS + CrlSeries, + Duration, + GeographicRegion, + HashedId8, + HashedId10, + IValue, + LaId, + LinkageSeed, + Opaque, + Psid, + SequenceOfLinkageSeed, + Signature, + Time32, + Uint3, + Uint8, + Uint16, + Uint32, + ValidityPeriod +FROM Ieee1609Dot2BaseTypes {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) dot2(2) + base(1) base-types(2) major-version-2(2) minor-version-4(4)} +WITH SUCCESSORS +; + +/** + * @brief The fields in this structure have the following meaning: + * + * @param version: is the version number of the CRL. For this version of this + * standard it is 1. + * + * @param crlSeries: represents the CRL series to which this CRL belongs. This + * is used to determine whether the revocation information in a CRL is relevant + * to a particular certificate as specified in 5.1.3.2. + * + * @param crlCraca: contains the low-order eight octets of the hash of the + * certificate of the Certificate Revocation Authorization CA (CRACA) that + * ultimately authorized the issuance of this CRL. This is used to determine + * whether the revocation information in a CRL is relevant to a particular + * certificate as specified in 5.1.3.2. In a valid signed CRL as specified in + * 7.4 the crlCraca is consistent with the associatedCraca field in the + * Service Specific Permissions as defined in 7.4.3.3. The HashedId8 is + * calculated with the whole-certificate hash algorithm, determined as + * described in 6.4.3, applied to the COER-encoded certificate, canonicalized + * as defined in the definition of Certificate. + * + * @param issueDate: specifies the time when the CRL was issued. + * + * @param nextCrl: contains the time when the next CRL with the same crlSeries + * and cracaId is expected to be issued. The CRL is invalid unless nextCrl is + * strictly after issueDate. This field is used to set the expected update time + * for revocation information associated with the (crlCraca, crlSeries) pair as + * specified in 5.1.3.6. + * + * @param priorityInfo: contains information that assists devices with limited + * storage space in determining which revocation information to retain and + * which to discard. + * + * @param typeSpecific: contains the CRL body. + */ +CrlContents ::= SEQUENCE { + version Uint8 (1), + crlSeries CrlSeries, + crlCraca HashedId8, + issueDate Time32, + nextCrl Time32, + priorityInfo CrlPriorityInfo, + typeSpecific TypeSpecificCrlContents +} + +/** + * @brief This data structure contains information that assists devices with + * limited storage space in determining which revocation information to retain + * and which to discard. + * + * @param priority: indicates the priority of the revocation information + * relative to other CRLs issued for certificates with the same cracaId and + * crlSeries values. A higher value for this field indicates higher importance + * of this revocation information. + * + * @note This mechanism is for future use; details are not specified in this + * version of the standard. + */ +CrlPriorityInfo ::= SEQUENCE { + priority Uint8 OPTIONAL, + ... +} + +/** + * @brief This structure contains type-specific CRL contents. + * + * @param fullHashCrl: contains a full hash-based CRL, i.e., a listing of the + * hashes of all certificates that: + * - contain the indicated cracaId and crlSeries values, and + * - are revoked by hash, and + * - have been revoked, and + * - have not expired. + * + * @param deltaHashCrl: contains a delta hash-based CRL, i.e., a listing of + * the hashes of all certificates that: + * - contain the indicated cracaId and crlSeries values, and + * - are revoked by hash, and + * - have been revoked since the previous CRL that contained the indicated + * cracaId and crlSeries values. + * + * @param fullLinkedCrl and fullLinkedCrlWithAlg: contain a full linkage + * ID-based CRL, i.e., a listing of the individual and/or group linkage data + * for all certificates that: + * - contain the indicated cracaId and crlSeries values, and + * - are revoked by linkage value, and + * - have been revoked, and + * - have not expired. + * The difference between fullLinkedCrl and fullLinkedCrlWithAlg is in how + * the cryptographic algorithms to be used in the seed evolution function and + * linkage value generation function of 5.1.3.4 are communicated to the + * receiver of the CRL. See below in this subclause for details. + * + * @param deltaLinkedCrl and deltaLinkedCrlWithAlg: contain a delta linkage + * ID-based CRL, i.e., a listing of the individual and/or group linkage data + * for all certificates that: + * - contain the specified cracaId and crlSeries values, and + * - are revoked by linkage data, and + * - have been revoked since the previous CRL that contained the indicated + * cracaId and crlSeries values. + * The difference between deltaLinkedCrl and deltaLinkedCrlWithAlg is in how + * the cryptographic algorithms to be used in the seed evolution function + * and linkage value generation function of 5.1.3.4 are communicated to the + * receiver of the CRL. See below in this subclause for details. + * + * @note It is the intent of this standard that once a certificate is revoked, + * it remains revoked for the rest of its lifetime. CRL signers are expected + * to include a revoked certificate on all CRLs issued between the + * certificate's revocation and its expiry. + * + * @note Seed evolution function and linkage value generation function + * identification. In order to derive linkage values per the mechanisms given + * in 5.1.3.4, a receiver needs to know the seed evolution function and the + * linkage value generation function. + * + * If the contents of this structure is a + * ToBeSignedLinkageValueCrlWithAlgIdentifier, then the seed evolution function + * and linkage value generation function are given explicitly as specified in + * the specification of ToBeSignedLinkageValueCrlWithAlgIdentifier. + * + * If the contents of this structure is a ToBeSignedLinkageValueCrl, then the + * seed evolution function and linkage value generation function are obtained + * based on the crlCraca field in the CrlContents: + * - If crlCraca was obtained with SHA-256 or SHA-384, then + * seedEvolutionFunctionIdentifier is seedEvoFn1-sha256 and + * linkageValueGenerationFunctionIdentifier is lvGenFn1-aes128. + * - If crlCraca was obtained with SM3, then seedEvolutionFunctionIdentifier + * is seedEvoFn1-sm3 and linkageValueGenerationFunctionIdentifier is + * lvGenFn1-sm4. + */ +TypeSpecificCrlContents ::= CHOICE { + fullHashCrl ToBeSignedHashIdCrl, + deltaHashCrl ToBeSignedHashIdCrl, + fullLinkedCrl ToBeSignedLinkageValueCrl, + deltaLinkedCrl ToBeSignedLinkageValueCrl, + ..., + fullLinkedCrlWithAlg ToBeSignedLinkageValueCrlWithAlgIdentifier, + deltaLinkedCrlWithAlg ToBeSignedLinkageValueCrlWithAlgIdentifier +} + +/** + * @brief This data structure represents information about a revoked + * certificate. + * + * @param crlSerial: is a counter that increments by 1 every time a new full + * or delta CRL is issued for the indicated crlCraca and crlSeries values. + * + * @param entries: contains the individual revocation information items. + * + * @note To indicate that a hash-based CRL contains no individual revocation + * information items, the recommended approach is for the SEQUENCE OF in the + * SequenceOfHashBasedRevocationInfo in this field to indicate zero entries. + */ +ToBeSignedHashIdCrl ::= SEQUENCE { + crlSerial Uint32, + entries SequenceOfHashBasedRevocationInfo, + ... +} + +/** + * @brief This type is used for clarity of definitions. + */ +SequenceOfHashBasedRevocationInfo ::= + SEQUENCE OF HashBasedRevocationInfo + +/** + * @brief In this structure: + * + * @param id: is the HashedId10 identifying the revoked certificate. The + * HashedId10 is calculated with the whole-certificate hash algorithm, + * determined as described in 6.4.3, applied to the COER-encoded certificate, + * canonicalized as defined in the definition of Certificate. + * + * @param expiry: is the value computed from the validity period's start and + * duration values in that certificate. + */ +HashBasedRevocationInfo ::= SEQUENCE { + id HashedId10, + expiry Time32, + ... +} + +/** + * @brief In this structure: + * + * @param iRev: is the value iRev used in the algorithm given in 5.1.3.4. This + * value applies to all linkage-based revocation information included within + * either indvidual or groups. + * + * @param indexWithinI: is a counter that is set to 0 for the first CRL issued + * for the indicated combination of crlCraca, crlSeries, and iRev, and + * increments by 1 every time a new full or delta CRL is issued for the + * indicated crlCraca and crlSeries values without changing iRev. + * + * @param individual: contains individual linkage data. + * + * @note To indicate that a linkage ID-based CRL contains no individual + * linkage data, the recommended approach is for the SEQUENCE OF in the + * SequenceOfJMaxGroup in this field to indicate zero entries. + * + * @param groups: contains group linkage data. + * + * @note To indicate that a linkage ID-based CRL contains no group linkage + * data, the recommended approach is for the SEQUENCE OF in the + * SequenceOfGroupCrlEntry in this field to indicate zero entries. + * + * @param groupsSingleSeed: contains group linkage data generated with a single + * seed. + */ +ToBeSignedLinkageValueCrl ::= SEQUENCE { + iRev IValue, + indexWithinI Uint8, + individual SequenceOfJMaxGroup OPTIONAL, + groups SequenceOfGroupCrlEntry OPTIONAL, + ..., + groupsSingleSeed SequenceOfGroupSingleSeedCrlEntry OPTIONAL +} (WITH COMPONENTS {..., individual PRESENT} | + WITH COMPONENTS {..., groups PRESENT} | + WITH COMPONENTS {..., groupsSingleSeed PRESENT}) + +/** + * @brief This type is used for clarity of definitions. + */ +SequenceOfJMaxGroup ::= SEQUENCE OF JMaxGroup + +/** + * @brief In this structure: + * + * @param jMax: is the value jMax used in the algorithm given in 5.1.3.4. This + * value applies to all linkage-based revocation information included within + * contents. + * + * @param contents: contains individual linkage data. + */ +JMaxGroup ::= SEQUENCE { + jmax Uint8, + contents SequenceOfLAGroup, + ... +} + +/** + * @brief This type is used for clarity of definitions. + */ +SequenceOfLAGroup ::= SEQUENCE OF LAGroup + +/** + * @brief In this structure: + * + * @param la1Id: is the value LinkageAuthorityIdentifier1 used in the + * algorithm given in 5.1.3.4. This value applies to all linkage-based + * revocation information included within contents. + * + * @param la2Id: is the value LinkageAuthorityIdentifier2 used in the + * algorithm given in 5.1.3.4. This value applies to all linkage-based + * revocation information included within contents. + * + * @param contents: contains individual linkage data. + */ +LAGroup ::= SEQUENCE { + la1Id LaId, + la2Id LaId, + contents SequenceOfIMaxGroup, + ... +} + +/** + * @brief This type is used for clarity of definitions. + */ +SequenceOfIMaxGroup ::= SEQUENCE OF IMaxGroup + +/** + * @brief In this structure: + * + * @param iMax indicates that for the entries in contents, revocation + * information need no longer be calculated once iCert > iMax as the holder + * is known to have no more valid certs at that point. iMax is not directly + * used in the calculation of the linkage values, it is used to determine + * when revocation information can safely be deleted. + * + * @param contents contains individual linkage data for certificates that are + * revoked using two seeds, per the algorithm given in per the mechanisms + * given in 5.1.3.4 and with seedEvolutionFunctionIdentifier and + * linkageValueGenerationFunctionIdentifier obtained as specified in 7.3.3. + * + * @param singleSeed contains individual linkage data for certificates that + * are revoked using a single seed, per the algorithm given in per the + * mechanisms given in 5.1.3.4 and with seedEvolutionFunctionIdentifier and + * linkageValueGenerationFunctionIdentifier obtained as specified in 7.3.3. + */ +IMaxGroup ::= SEQUENCE { + iMax Uint16, + contents SequenceOfIndividualRevocation, + ..., + singleSeed SequenceOfLinkageSeed OPTIONAL +} + +/** + * @brief This type is used for clarity of definitions. + */ +SequenceOfIndividualRevocation ::= + SEQUENCE (SIZE(0..MAX)) OF IndividualRevocation + +/** + * @brief In this structure: + * + * @param linkageSeed1 is the value LinkageSeed1 used in the algorithm given + * in 5.1.3.4. + * + * @param linkageSeed2 is the value LinkageSeed2 used in the algorithm given + * in 5.1.3.4. + */ +IndividualRevocation ::= SEQUENCE { + linkageSeed1 LinkageSeed, + linkageSeed2 LinkageSeed, + ... +} + +/** + * @brief This type is used for clarity of definitions. + */ +SequenceOfGroupCrlEntry ::= SEQUENCE OF GroupCrlEntry + +/** + * @brief In this structure: + * + * @param iMax: indicates that for these certificates, revocation information + * need no longer be calculated once iCert > iMax as the holders are known + * to have no more valid certs for that (crlCraca, crlSeries) at that point. + * + * @param la1Id: is the value LinkageAuthorityIdentifier1 used in the + * algorithm given in 5.1.3.4. This value applies to all linkage-based + * revocation information included within contents. + * + * @param linkageSeed1: is the value LinkageSeed1 used in the algorithm given + * in 5.1.3.4. + * + * @param la2Id: is the value LinkageAuthorityIdentifier2 used in the + * algorithm given in 5.1.3.4. This value applies to all linkage-based + * revocation information included within contents. + * + * @param linkageSeed2: is the value LinkageSeed2 used in the algorithm given + * in 5.1.3.4. + */ +GroupCrlEntry ::= SEQUENCE { + iMax Uint16, + la1Id LaId, + linkageSeed1 LinkageSeed, + la2Id LaId, + linkageSeed2 LinkageSeed, + ... +} + +/** + * @brief In this structure: + * + * @param iRev is the value iRev used in the algorithm given in 5.1.3.4. This + * value applies to all linkage-based revocation information included within + * either indvidual or groups. + * + * @param indexWithinI is a counter that is set to 0 for the first CRL issued + * for the indicated combination of crlCraca, crlSeries, and iRev, and increments by 1 every time a new full or delta CRL is issued for the indicated crlCraca and crlSeries values without changing iRev. + * + * @param seedEvolution contains an identifier for the seed evolution + * function, used as specified in 5.1.3.4. + * + * @param lvGeneration contains an identifier for the linkage value + * generation function, used as specified in 5.1.3.4. + * + * @param individual contains individual linkage data. + * + * @param groups contains group linkage data for linkage value generation + * with two seeds. + * + * @param groupsSingleSeed contains group linkage data for linkage value + * generation with one seed. + */ +ToBeSignedLinkageValueCrlWithAlgIdentifier ::= SEQUENCE { + iRev IValue, + indexWithinI Uint8, + seedEvolution SeedEvolutionFunctionIdentifier, + lvGeneration LvGenerationFunctionIdentifier, + individual SequenceOfJMaxGroup OPTIONAL, + groups SequenceOfGroupCrlEntry OPTIONAL, + groupsSingleSeed SequenceOfGroupSingleSeedCrlEntry OPTIONAL, + ... +} (WITH COMPONENTS {..., individual PRESENT} | + WITH COMPONENTS {..., groups PRESENT} | + WITH COMPONENTS {..., groupsSingleSeed PRESENT}) + +/** + * @brief This type is used for clarity of definitions. + */ +SequenceOfGroupSingleSeedCrlEntry ::= + SEQUENCE OF GroupSingleSeedCrlEntry + +/** + * @brief This structure contains the linkage seed for group revocation with + * a single seed. The seed is used as specified in the algorithms in 5.1.3.4. + */ +GroupSingleSeedCrlEntry ::= SEQUENCE { + iMax Uint16, + laId LaId, + linkageSeed LinkageSeed +} + +/** + * @brief This structure contains an identifier for the algorithms specified + * in 5.1.3.4. + */ +ExpansionAlgorithmIdentifier ::= ENUMERATED { + sha256ForI-aesForJ, + sm3ForI-sm4ForJ, + ... +} + +/** + * @brief This is the identifier for the seed evolution function. See 5.1.3 + * for details of use. + */ +SeedEvolutionFunctionIdentifier ::= NULL + +/** + * @brief This is the identifier for the linkage value generation function. + * See 5.1.3 for details of use. + */ +LvGenerationFunctionIdentifier ::= NULL + +END diff --git a/certgen/asncodec/asn1/ieee1609.2/README.md b/certgen/asncodec/asn1/ieee1609.2/README.md index 48292fad1de9e3d9889024d35a34814ebfcce8df..cc59b9aed6a7a754be1577dff8059daf7b529989 100644 --- a/certgen/asncodec/asn1/ieee1609.2/README.md +++ b/certgen/asncodec/asn1/ieee1609.2/README.md @@ -1,5 +1,5 @@ -# ASN.1 module for IEEE 1609.2 - -The module was published as a part of delivery **[ETSI TS 103 097 v2.1.1](http://www.etsi.org/deliver/etsi_ts/103000_103099/103097/02.01.01_60/ts_103097v020101p.pdf)** - -The module contains extensions published with IEEE 1609.2.1 +# ASN.1 module for IEEE 1609.2 + +The module was published as a part of delivery **[ETSI TS 103 097 v2.1.1](http://www.etsi.org/deliver/etsi_ts/103000_103099/103097/02.01.01_60/ts_103097v020101p.pdf)** + +The module contains extensions published with IEEE 1609.2.1 diff --git a/certgen/asncodec/asn1/sec_ts103097/EtsiTs103097ExtensionModule.asn b/certgen/asncodec/asn1/sec_ts103097/EtsiTs103097ExtensionModule.asn index 9876814fce5d258ade8ffcc2fd01ba170a402f3d..7352e8ea9a8a73f6e667ccaa1eaaeb594df91c9a 100644 --- a/certgen/asncodec/asn1/sec_ts103097/EtsiTs103097ExtensionModule.asn +++ b/certgen/asncodec/asn1/sec_ts103097/EtsiTs103097ExtensionModule.asn @@ -1,43 +1,43 @@ -EtsiTs103097ExtensionModule -{itu-t(0) identified-organization(4) etsi(0) itsDomain(5) wg5(5) secHeaders(103097) extension(2) major-version-1(1) minor-version-1(1)} -DEFINITIONS AUTOMATIC TAGS ::= BEGIN - -IMPORTS - HashedId8, - Time32, - Extension, - EXT-TYPE, - ExtId -FROM Ieee1609Dot2BaseTypes {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) - dot2(2) base(1) base-types(2) major-version-2 (2) minor-version-4 (4)} -WITH SUCCESSORS -; - -ExtensionModuleVersion::= INTEGER(1) - -EtsiOriginatingHeaderInfoExtension ::= Extension{{EtsiTs103097HeaderInfoExtensions}} - -EtsiTs103097HeaderInfoExtensionId ::= ExtId - etsiTs102941CrlRequestId EtsiTs103097HeaderInfoExtensionId ::= 1 --'01'H - etsiTs102941DeltaCtlRequestId EtsiTs103097HeaderInfoExtensionId ::= 2 --'02'H - -EtsiTs103097HeaderInfoExtensions EXT-TYPE ::= { - { EtsiTs102941CrlRequest IDENTIFIED BY etsiTs102941CrlRequestId } | - { EtsiTs102941DeltaCtlRequest IDENTIFIED BY etsiTs102941DeltaCtlRequestId }, - ... -} - -EtsiTs102941CrlRequest::= SEQUENCE { - issuerId HashedId8, - lastKnownUpdate Time32 OPTIONAL -} - -EtsiTs102941CtlRequest::= SEQUENCE { - issuerId HashedId8, - lastKnownCtlSequence INTEGER (0..255) OPTIONAL -} - -EtsiTs102941DeltaCtlRequest::= EtsiTs102941CtlRequest - -END +EtsiTs103097ExtensionModule +{itu-t(0) identified-organization(4) etsi(0) itsDomain(5) wg5(5) secHeaders(103097) extension(2) major-version-1(1) minor-version-1(1)} +DEFINITIONS AUTOMATIC TAGS ::= BEGIN + +IMPORTS + HashedId8, + Time32, + Extension, + EXT-TYPE, + ExtId +FROM Ieee1609Dot2BaseTypes {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) + dot2(2) base(1) base-types(2) major-version-2 (2) minor-version-4 (4)} +WITH SUCCESSORS +; + +ExtensionModuleVersion::= INTEGER(1) + +EtsiOriginatingHeaderInfoExtension ::= Extension{{EtsiTs103097HeaderInfoExtensions}} + +EtsiTs103097HeaderInfoExtensionId ::= ExtId + etsiTs102941CrlRequestId EtsiTs103097HeaderInfoExtensionId ::= 1 --'01'H + etsiTs102941DeltaCtlRequestId EtsiTs103097HeaderInfoExtensionId ::= 2 --'02'H + +EtsiTs103097HeaderInfoExtensions EXT-TYPE ::= { + { EtsiTs102941CrlRequest IDENTIFIED BY etsiTs102941CrlRequestId } | + { EtsiTs102941DeltaCtlRequest IDENTIFIED BY etsiTs102941DeltaCtlRequestId }, + ... +} + +EtsiTs102941CrlRequest::= SEQUENCE { + issuerId HashedId8, + lastKnownUpdate Time32 OPTIONAL +} + +EtsiTs102941CtlRequest::= SEQUENCE { + issuerId HashedId8, + lastKnownCtlSequence INTEGER (0..255) OPTIONAL +} + +EtsiTs102941DeltaCtlRequest::= EtsiTs102941CtlRequest + +END diff --git a/certgen/asncodec/asn1/sec_ts103097/EtsiTs103097Module.asn b/certgen/asncodec/asn1/sec_ts103097/EtsiTs103097Module.asn index 83c94107cdeafd333fa7a0b0d14b4bcec2f85576..d97fc398cc1afc7fd664796cbca67d24514e63b9 100644 --- a/certgen/asncodec/asn1/sec_ts103097/EtsiTs103097Module.asn +++ b/certgen/asncodec/asn1/sec_ts103097/EtsiTs103097Module.asn @@ -1,123 +1,123 @@ -EtsiTs103097Module -{itu-t(0) identified-organization(4) etsi(0) itsDomain(5) wg5(5) secHeaders(103097) core(1) major-version-3(3) minor-version-1(1)} - -DEFINITIONS AUTOMATIC TAGS ::= BEGIN - -IMPORTS - -Ieee1609Dot2Data, Certificate -FROM Ieee1609Dot2 {iso(1) identified-organization(3) ieee(111) - standards-association-numbered-series-standards(2) wave-stds(1609) - dot2(2) base(1) schema(1) major-version-2(2) minor-version-4(4)} -WITH SUCCESSORS - -ExtensionModuleVersion -FROM EtsiTs103097ExtensionModule {itu-t(0) identified-organization(4) - etsi(0) itsDomain(5) wg5(5) secHeaders(103097) extension(2) major-version-1(1) minor-version-1(1)} -; - -EtsiTs103097Certificate::= Certificate (WITH COMPONENTS{..., - toBeSigned (WITH COMPONENTS{..., - id (WITH COMPONENTS{..., - linkageData ABSENT, - binaryId ABSENT - }), - certRequestPermissions ABSENT, - canRequestRollover ABSENT - }) -}) - -EtsiTs103097Data::=Ieee1609Dot2Data (WITH COMPONENTS {..., - content (WITH COMPONENTS {..., - signedData (WITH COMPONENTS {..., -- constraints on signed data headers - tbsData (WITH COMPONENTS { - headerInfo (WITH COMPONENTS {..., - generationTime PRESENT, - p2pcdLearningRequest ABSENT, - missingCrlIdentifier ABSENT - }) - }), - signer (WITH COMPONENTS {..., --constraints on the certificate - certificate ((WITH COMPONENT (EtsiTs103097Certificate))^(SIZE(1))) - }) - }), - encryptedData (WITH COMPONENTS {..., -- constraints on encrypted data headers - recipients (WITH COMPONENT ( - (WITH COMPONENTS {..., - pskRecipInfo ABSENT, - symmRecipInfo ABSENT, - rekRecipInfo ABSENT - }) - )) - }), - signedCertificateRequest ABSENT - }) -}) - -EtsiTs103097Data-Unsecured {ToBeSentDataContent} ::= EtsiTs103097Data (WITH COMPONENTS {..., - content (WITH COMPONENTS { - unsecuredData (CONTAINING ToBeSentDataContent) - }) -}) - -EtsiTs103097Data-Signed {ToBeSignedDataContent} ::= EtsiTs103097Data (WITH COMPONENTS {..., - content (WITH COMPONENTS { - signedData (WITH COMPONENTS {..., - tbsData (WITH COMPONENTS { - payload (WITH COMPONENTS { - data (WITH COMPONENTS {..., - content (WITH COMPONENTS { - unsecuredData (CONTAINING ToBeSignedDataContent) - }) - }) PRESENT - }) - }) - }) - }) -}) - -EtsiTs103097Data-SignedExternalPayload ::= EtsiTs103097Data (WITH COMPONENTS {..., - content (WITH COMPONENTS { - signedData (WITH COMPONENTS {..., - tbsData (WITH COMPONENTS { - payload (WITH COMPONENTS { - extDataHash (WITH COMPONENTS { - sha256HashedData PRESENT - }) PRESENT - }) - }) - }) - }) -}) - -EtsiTs103097Data-Encrypted {ToBeEncryptedDataContent} ::= EtsiTs103097Data (WITH COMPONENTS {..., - content (WITH COMPONENTS { - encryptedData (WITH COMPONENTS {..., - ciphertext (WITH COMPONENTS {..., - aes128ccm (WITH COMPONENTS {..., - ccmCiphertext (CONSTRAINED BY {-- ccm encryption of -- ToBeEncryptedDataContent}) - }) - }) - }) - }) -}) - -EtsiTs103097Data-SignedAndEncrypted {ToBesignedAndEncryptedDataContent} ::= EtsiTs103097Data-Encrypted {EtsiTs103097Data-Signed {ToBesignedAndEncryptedDataContent}} - -EtsiTs103097Data-Encrypted-Unicast {ToBeEncryptedDataContent} ::= EtsiTs103097Data-Encrypted { EtsiTs103097Data-Unsecured{ToBeEncryptedDataContent}} (WITH COMPONENTS {..., - content (WITH COMPONENTS { - encryptedData (WITH COMPONENTS {..., - recipients (SIZE(1)) - }) - }) -}) - -EtsiTs103097Data-SignedAndEncrypted-Unicast {ToBesignedAndEncryptedDataContent} ::= EtsiTs103097Data-Encrypted {EtsiTs103097Data-Signed {ToBesignedAndEncryptedDataContent}} (WITH COMPONENTS {..., - content (WITH COMPONENTS { - encryptedData (WITH COMPONENTS {..., - recipients (SIZE(1)) - }) - }) -}) - -END +EtsiTs103097Module +{itu-t(0) identified-organization(4) etsi(0) itsDomain(5) wg5(5) secHeaders(103097) core(1) major-version-3(3) minor-version-1(1)} + +DEFINITIONS AUTOMATIC TAGS ::= BEGIN + +IMPORTS + +Ieee1609Dot2Data, Certificate +FROM Ieee1609Dot2 {iso(1) identified-organization(3) ieee(111) + standards-association-numbered-series-standards(2) wave-stds(1609) + dot2(2) base(1) schema(1) major-version-2(2) minor-version-4(4)} +WITH SUCCESSORS + +ExtensionModuleVersion +FROM EtsiTs103097ExtensionModule {itu-t(0) identified-organization(4) + etsi(0) itsDomain(5) wg5(5) secHeaders(103097) extension(2) major-version-1(1) minor-version-1(1)} +; + +EtsiTs103097Certificate::= Certificate (WITH COMPONENTS{..., + toBeSigned (WITH COMPONENTS{..., + id (WITH COMPONENTS{..., + linkageData ABSENT, + binaryId ABSENT + }), + certRequestPermissions ABSENT, + canRequestRollover ABSENT + }) +}) + +EtsiTs103097Data::=Ieee1609Dot2Data (WITH COMPONENTS {..., + content (WITH COMPONENTS {..., + signedData (WITH COMPONENTS {..., -- constraints on signed data headers + tbsData (WITH COMPONENTS { + headerInfo (WITH COMPONENTS {..., + generationTime PRESENT, + p2pcdLearningRequest ABSENT, + missingCrlIdentifier ABSENT + }) + }), + signer (WITH COMPONENTS {..., --constraints on the certificate + certificate ((WITH COMPONENT (EtsiTs103097Certificate))^(SIZE(1))) + }) + }), + encryptedData (WITH COMPONENTS {..., -- constraints on encrypted data headers + recipients (WITH COMPONENT ( + (WITH COMPONENTS {..., + pskRecipInfo ABSENT, + symmRecipInfo ABSENT, + rekRecipInfo ABSENT + }) + )) + }), + signedCertificateRequest ABSENT + }) +}) + +EtsiTs103097Data-Unsecured {ToBeSentDataContent} ::= EtsiTs103097Data (WITH COMPONENTS {..., + content (WITH COMPONENTS { + unsecuredData (CONTAINING ToBeSentDataContent) + }) +}) + +EtsiTs103097Data-Signed {ToBeSignedDataContent} ::= EtsiTs103097Data (WITH COMPONENTS {..., + content (WITH COMPONENTS { + signedData (WITH COMPONENTS {..., + tbsData (WITH COMPONENTS { + payload (WITH COMPONENTS { + data (WITH COMPONENTS {..., + content (WITH COMPONENTS { + unsecuredData (CONTAINING ToBeSignedDataContent) + }) + }) PRESENT + }) + }) + }) + }) +}) + +EtsiTs103097Data-SignedExternalPayload ::= EtsiTs103097Data (WITH COMPONENTS {..., + content (WITH COMPONENTS { + signedData (WITH COMPONENTS {..., + tbsData (WITH COMPONENTS { + payload (WITH COMPONENTS { + extDataHash (WITH COMPONENTS { + sha256HashedData PRESENT + }) PRESENT + }) + }) + }) + }) +}) + +EtsiTs103097Data-Encrypted {ToBeEncryptedDataContent} ::= EtsiTs103097Data (WITH COMPONENTS {..., + content (WITH COMPONENTS { + encryptedData (WITH COMPONENTS {..., + ciphertext (WITH COMPONENTS {..., + aes128ccm (WITH COMPONENTS {..., + ccmCiphertext (CONSTRAINED BY {-- ccm encryption of -- ToBeEncryptedDataContent}) + }) + }) + }) + }) +}) + +EtsiTs103097Data-SignedAndEncrypted {ToBesignedAndEncryptedDataContent} ::= EtsiTs103097Data-Encrypted {EtsiTs103097Data-Signed {ToBesignedAndEncryptedDataContent}} + +EtsiTs103097Data-Encrypted-Unicast {ToBeEncryptedDataContent} ::= EtsiTs103097Data-Encrypted { EtsiTs103097Data-Unsecured{ToBeEncryptedDataContent}} (WITH COMPONENTS {..., + content (WITH COMPONENTS { + encryptedData (WITH COMPONENTS {..., + recipients (SIZE(1)) + }) + }) +}) + +EtsiTs103097Data-SignedAndEncrypted-Unicast {ToBesignedAndEncryptedDataContent} ::= EtsiTs103097Data-Encrypted {EtsiTs103097Data-Signed {ToBesignedAndEncryptedDataContent}} (WITH COMPONENTS {..., + content (WITH COMPONENTS { + encryptedData (WITH COMPONENTS {..., + recipients (SIZE(1)) + }) + }) +}) + +END diff --git a/certgen/asncodec/asn1/sec_ts103097/LICENSE b/certgen/asncodec/asn1/sec_ts103097/LICENSE index 28bd92249b666d027ab29f1257796a9a7376143f..7caa81bacb1fdb77560462563c73bdda330fcf47 100644 --- a/certgen/asncodec/asn1/sec_ts103097/LICENSE +++ b/certgen/asncodec/asn1/sec_ts103097/LICENSE @@ -1,23 +1,23 @@ -Copyright 2020 ETSI - -Redistribution and use in source and binary forms, with or without -modification, are permitted provided that the following conditions are met: -1. Redistributions of source code must retain the above copyright notice, - this list of conditions and the following disclaimer. -2. Redistributions in binary form must reproduce the above copyright notice, - this list of conditions and the following disclaimer in the documentation - and/or other materials provided with the distribution. -3. Neither the name of the copyright holder nor the names of its contributors - may be used to endorse or promote products derived from this software without - specific prior written permission. - -THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND -ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED -WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. -IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, -INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, -BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, -DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF -LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE -OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED +Copyright 2020 ETSI + +Redistribution and use in source and binary forms, with or without +modification, are permitted provided that the following conditions are met: +1. Redistributions of source code must retain the above copyright notice, + this list of conditions and the following disclaimer. +2. Redistributions in binary form must reproduce the above copyright notice, + this list of conditions and the following disclaimer in the documentation + and/or other materials provided with the distribution. +3. Neither the name of the copyright holder nor the names of its contributors + may be used to endorse or promote products derived from this software without + specific prior written permission. + +THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND +ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED +WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. +IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, +INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, +BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, +DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF +LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE +OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. \ No newline at end of file diff --git a/certgen/asncodec/asn1/sec_ts103097/README.md b/certgen/asncodec/asn1/sec_ts103097/README.md index 13edddb6b6e8c4bb298308ac6e0e5ba538f25bfa..6aab8fb773d153aac3255c4998ba300c2bb61430 100644 --- a/certgen/asncodec/asn1/sec_ts103097/README.md +++ b/certgen/asncodec/asn1/sec_ts103097/README.md @@ -1,17 +1,17 @@ -# ASN.1 module for ETSI TS 103 097 v2.1.1 - -The module was published as a part of delivery **[ETSI TS 103 097 v2.1.1](http://www.etsi.org/deliver/etsi_ts/103000_103099/103097/02.01.01_60/ts_103097v020101p.pdf)** - -## License - -The content of this repository and the files contained are released under the BSD-3-Clause license. - -See the attached LICENSE file or visit https://forge.etsi.org/legal-matters. - -## Dependencies - -The module dependens of the following external modules and repositories: - -* The **[IEEE1609dot2](https://forge.etsi.org/rep/ITS/asn1/ieee1609.2/)** module from the **IEEE Std 1609.2** - WAVE - Security Services for Applications and Management Messages - -*NOTE: Please use `--recurse-submodules` option in order to clone the module with all necessary dependencies.* +# ASN.1 module for ETSI TS 103 097 v2.1.1 + +The module was published as a part of delivery **[ETSI TS 103 097 v2.1.1](http://www.etsi.org/deliver/etsi_ts/103000_103099/103097/02.01.01_60/ts_103097v020101p.pdf)** + +## License + +The content of this repository and the files contained are released under the BSD-3-Clause license. + +See the attached LICENSE file or visit https://forge.etsi.org/legal-matters. + +## Dependencies + +The module dependens of the following external modules and repositories: + +* The **[IEEE1609dot2](https://forge.etsi.org/rep/ITS/asn1/ieee1609.2/)** module from the **IEEE Std 1609.2** - WAVE - Security Services for Applications and Management Messages + +*NOTE: Please use `--recurse-submodules` option in order to clone the module with all necessary dependencies.* diff --git a/certgen/asncodec/asn_SEQUENCE_OF.c b/certgen/asncodec/asn_SEQUENCE_OF.c index ec952fc99936ab1464d76ac75821fc19e47995cb..730c2277b319098622a91479f6e9b0a4e6202ce0 100644 --- a/certgen/asncodec/asn_SEQUENCE_OF.c +++ b/certgen/asncodec/asn_SEQUENCE_OF.c @@ -1,41 +1,41 @@ -/*- - * Copyright (c) 2003, 2004 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include - -typedef A_SEQUENCE_OF(void) asn_sequence; - -void -asn_sequence_del(void *asn_sequence_of_x, int number, int _do_free) { - asn_sequence *as = (asn_sequence *)asn_sequence_of_x; - - if(as) { - void *ptr; - int n; - - if(number < 0 || number >= as->count) - return; /* Nothing to delete */ - - if(_do_free && as->free) { - ptr = as->array[number]; - } else { - ptr = 0; - } - - /* - * Shift all elements to the left to hide the gap. - */ - --as->count; - for(n = number; n < as->count; n++) - as->array[n] = as->array[n+1]; - - /* - * Invoke the third-party function only when the state - * of the parent structure is consistent. - */ - if(ptr) as->free(ptr); - } -} - +/*- + * Copyright (c) 2003, 2004 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include + +typedef A_SEQUENCE_OF(void) asn_sequence; + +void +asn_sequence_del(void *asn_sequence_of_x, int number, int _do_free) { + asn_sequence *as = (asn_sequence *)asn_sequence_of_x; + + if(as) { + void *ptr; + int n; + + if(number < 0 || number >= as->count) + return; /* Nothing to delete */ + + if(_do_free && as->free) { + ptr = as->array[number]; + } else { + ptr = 0; + } + + /* + * Shift all elements to the left to hide the gap. + */ + --as->count; + for(n = number; n < as->count; n++) + as->array[n] = as->array[n+1]; + + /* + * Invoke the third-party function only when the state + * of the parent structure is consistent. + */ + if(ptr) as->free(ptr); + } +} + diff --git a/certgen/asncodec/asn_SEQUENCE_OF.h b/certgen/asncodec/asn_SEQUENCE_OF.h index e35bc447a26555c1186581949ec218a668df31aa..e1ef2b19e47bc9f32b57cda804b438cb719ad1e6 100644 --- a/certgen/asncodec/asn_SEQUENCE_OF.h +++ b/certgen/asncodec/asn_SEQUENCE_OF.h @@ -1,52 +1,52 @@ -/*- - * Copyright (c) 2003-2017 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#ifndef ASN_SEQUENCE_OF_H -#define ASN_SEQUENCE_OF_H - -#include - -#ifdef __cplusplus -extern "C" { -#endif - -/* - * SEQUENCE OF is the same as SET OF with a tiny difference: - * the delete operation preserves the initial order of elements - * and thus MAY operate in non-constant time. - */ -#define A_SEQUENCE_OF(type) A_SET_OF(type) - -#define ASN_SEQUENCE_ADD(headptr, ptr) \ - asn_sequence_add((headptr), (ptr)) - -/*********************************************** - * Implementation of the SEQUENCE OF structure. - */ - -#define asn_sequence_add asn_set_add -#define asn_sequence_empty asn_set_empty - -/* - * Delete the element from the set by its number (base 0). - * This is NOT a constant-time operation. - * The order of elements is preserved. - * If _do_free is given AND the (*free) is initialized, the element - * will be freed using the custom (*free) function as well. - */ -void asn_sequence_del(void *asn_sequence_of_x, int number, int _do_free); - -/* - * Cope with different conversions requirements to/from void in C and C++. - * This is mostly useful for support library. - */ -typedef A_SEQUENCE_OF(void) asn_anonymous_sequence_; -#define _A_SEQUENCE_FROM_VOID(ptr) ((asn_anonymous_sequence_ *)(ptr)) -#define _A_CSEQUENCE_FROM_VOID(ptr) ((const asn_anonymous_sequence_ *)(ptr)) - -#ifdef __cplusplus -} -#endif - -#endif /* ASN_SEQUENCE_OF_H */ +/*- + * Copyright (c) 2003-2017 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#ifndef ASN_SEQUENCE_OF_H +#define ASN_SEQUENCE_OF_H + +#include + +#ifdef __cplusplus +extern "C" { +#endif + +/* + * SEQUENCE OF is the same as SET OF with a tiny difference: + * the delete operation preserves the initial order of elements + * and thus MAY operate in non-constant time. + */ +#define A_SEQUENCE_OF(type) A_SET_OF(type) + +#define ASN_SEQUENCE_ADD(headptr, ptr) \ + asn_sequence_add((headptr), (ptr)) + +/*********************************************** + * Implementation of the SEQUENCE OF structure. + */ + +#define asn_sequence_add asn_set_add +#define asn_sequence_empty asn_set_empty + +/* + * Delete the element from the set by its number (base 0). + * This is NOT a constant-time operation. + * The order of elements is preserved. + * If _do_free is given AND the (*free) is initialized, the element + * will be freed using the custom (*free) function as well. + */ +void asn_sequence_del(void *asn_sequence_of_x, int number, int _do_free); + +/* + * Cope with different conversions requirements to/from void in C and C++. + * This is mostly useful for support library. + */ +typedef A_SEQUENCE_OF(void) asn_anonymous_sequence_; +#define _A_SEQUENCE_FROM_VOID(ptr) ((asn_anonymous_sequence_ *)(ptr)) +#define _A_CSEQUENCE_FROM_VOID(ptr) ((const asn_anonymous_sequence_ *)(ptr)) + +#ifdef __cplusplus +} +#endif + +#endif /* ASN_SEQUENCE_OF_H */ diff --git a/certgen/asncodec/asn_SET_OF.c b/certgen/asncodec/asn_SET_OF.c index 944f2cb8ad70a166e65dbb3536ef62fc34a8e74c..49650e2ce436c9d219c2dafc9f59638d864bb02c 100644 --- a/certgen/asncodec/asn_SET_OF.c +++ b/certgen/asncodec/asn_SET_OF.c @@ -1,88 +1,88 @@ -/*- - * Copyright (c) 2003, 2004 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include -#include - -/* - * Add another element into the set. - */ -int -asn_set_add(void *asn_set_of_x, void *ptr) { - asn_anonymous_set_ *as = _A_SET_FROM_VOID(asn_set_of_x); - - if(as == 0 || ptr == 0) { - errno = EINVAL; /* Invalid arguments */ - return -1; - } - - /* - * Make sure there's enough space to insert an element. - */ - if(as->count == as->size) { - int _newsize = as->size ? (as->size << 1) : 4; - void *_new_arr; - _new_arr = REALLOC(as->array, _newsize * sizeof(as->array[0])); - if(_new_arr) { - as->array = (void **)_new_arr; - as->size = _newsize; - } else { - /* ENOMEM */ - return -1; - } - } - - as->array[as->count++] = ptr; - - return 0; -} - -void -asn_set_del(void *asn_set_of_x, int number, int _do_free) { - asn_anonymous_set_ *as = _A_SET_FROM_VOID(asn_set_of_x); - - if(as) { - void *ptr; - if(number < 0 || number >= as->count) - return; - - if(_do_free && as->free) { - ptr = as->array[number]; - } else { - ptr = 0; - } - - as->array[number] = as->array[--as->count]; - - /* - * Invoke the third-party function only when the state - * of the parent structure is consistent. - */ - if(ptr) as->free(ptr); - } -} - -/* - * Free the contents of the set, do not free the set itself. - */ -void -asn_set_empty(void *asn_set_of_x) { - asn_anonymous_set_ *as = _A_SET_FROM_VOID(asn_set_of_x); - - if(as) { - if(as->array) { - if(as->free) { - while(as->count--) - as->free(as->array[as->count]); - } - FREEMEM(as->array); - as->array = 0; - } - as->count = 0; - as->size = 0; - } - -} - +/*- + * Copyright (c) 2003, 2004 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include +#include + +/* + * Add another element into the set. + */ +int +asn_set_add(void *asn_set_of_x, void *ptr) { + asn_anonymous_set_ *as = _A_SET_FROM_VOID(asn_set_of_x); + + if(as == 0 || ptr == 0) { + errno = EINVAL; /* Invalid arguments */ + return -1; + } + + /* + * Make sure there's enough space to insert an element. + */ + if(as->count == as->size) { + int _newsize = as->size ? (as->size << 1) : 4; + void *_new_arr; + _new_arr = REALLOC(as->array, _newsize * sizeof(as->array[0])); + if(_new_arr) { + as->array = (void **)_new_arr; + as->size = _newsize; + } else { + /* ENOMEM */ + return -1; + } + } + + as->array[as->count++] = ptr; + + return 0; +} + +void +asn_set_del(void *asn_set_of_x, int number, int _do_free) { + asn_anonymous_set_ *as = _A_SET_FROM_VOID(asn_set_of_x); + + if(as) { + void *ptr; + if(number < 0 || number >= as->count) + return; + + if(_do_free && as->free) { + ptr = as->array[number]; + } else { + ptr = 0; + } + + as->array[number] = as->array[--as->count]; + + /* + * Invoke the third-party function only when the state + * of the parent structure is consistent. + */ + if(ptr) as->free(ptr); + } +} + +/* + * Free the contents of the set, do not free the set itself. + */ +void +asn_set_empty(void *asn_set_of_x) { + asn_anonymous_set_ *as = _A_SET_FROM_VOID(asn_set_of_x); + + if(as) { + if(as->array) { + if(as->free) { + while(as->count--) + as->free(as->array[as->count]); + } + FREEMEM(as->array); + as->array = 0; + } + as->count = 0; + as->size = 0; + } + +} + diff --git a/certgen/asncodec/asn_SET_OF.h b/certgen/asncodec/asn_SET_OF.h index 882e1a47d4ad0b8cdfd359be63b8f577d158cd43..4a214093a2611a7f883ebecfa23dd6a154d99eeb 100644 --- a/certgen/asncodec/asn_SET_OF.h +++ b/certgen/asncodec/asn_SET_OF.h @@ -1,72 +1,72 @@ -/*- - * Copyright (c) 2003-2017 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#ifndef ASN_SET_OF_H -#define ASN_SET_OF_H - -#ifdef __cplusplus -#define A_SET_OF(type) \ - struct { \ - type **array; \ - int count; /* Meaningful size */ \ - int size; /* Allocated size */ \ - void (*free)(decltype(*array)); \ - } -#else /* C */ -#define A_SET_OF(type) \ - struct { \ - type **array; \ - int count; /* Meaningful size */ \ - int size; /* Allocated size */ \ - void (*free)(type *); \ - } -#endif - -#ifdef __cplusplus -extern "C" { -#endif - -#define ASN_SET_ADD(headptr, ptr) \ - asn_set_add((headptr), (ptr)) - -/******************************************* - * Implementation of the SET OF structure. - */ - -/* - * Add another structure into the set by its pointer. - * RETURN VALUES: - * 0 for success and -1/errno for failure. - */ -int asn_set_add(void *asn_set_of_x, void *ptr); - -/* - * Delete the element from the set by its number (base 0). - * This is a constant-time operation. The order of elements before the - * deleted ones is guaranteed, the order of elements after the deleted - * one is NOT guaranteed. - * If _do_free is given AND the (*free) is initialized, the element - * will be freed using the custom (*free) function as well. - */ -void asn_set_del(void *asn_set_of_x, int number, int _do_free); - -/* - * Empty the contents of the set. Will free the elements, if (*free) is given. - * Will NOT free the set itself. - */ -void asn_set_empty(void *asn_set_of_x); - -/* - * Cope with different conversions requirements to/from void in C and C++. - * This is mostly useful for support library. - */ -typedef A_SET_OF(void) asn_anonymous_set_; -#define _A_SET_FROM_VOID(ptr) ((asn_anonymous_set_ *)(ptr)) -#define _A_CSET_FROM_VOID(ptr) ((const asn_anonymous_set_ *)(ptr)) - -#ifdef __cplusplus -} -#endif - -#endif /* ASN_SET_OF_H */ +/*- + * Copyright (c) 2003-2017 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#ifndef ASN_SET_OF_H +#define ASN_SET_OF_H + +#ifdef __cplusplus +#define A_SET_OF(type) \ + struct { \ + type **array; \ + int count; /* Meaningful size */ \ + int size; /* Allocated size */ \ + void (*free)(decltype(*array)); \ + } +#else /* C */ +#define A_SET_OF(type) \ + struct { \ + type **array; \ + int count; /* Meaningful size */ \ + int size; /* Allocated size */ \ + void (*free)(type *); \ + } +#endif + +#ifdef __cplusplus +extern "C" { +#endif + +#define ASN_SET_ADD(headptr, ptr) \ + asn_set_add((headptr), (ptr)) + +/******************************************* + * Implementation of the SET OF structure. + */ + +/* + * Add another structure into the set by its pointer. + * RETURN VALUES: + * 0 for success and -1/errno for failure. + */ +int asn_set_add(void *asn_set_of_x, void *ptr); + +/* + * Delete the element from the set by its number (base 0). + * This is a constant-time operation. The order of elements before the + * deleted ones is guaranteed, the order of elements after the deleted + * one is NOT guaranteed. + * If _do_free is given AND the (*free) is initialized, the element + * will be freed using the custom (*free) function as well. + */ +void asn_set_del(void *asn_set_of_x, int number, int _do_free); + +/* + * Empty the contents of the set. Will free the elements, if (*free) is given. + * Will NOT free the set itself. + */ +void asn_set_empty(void *asn_set_of_x); + +/* + * Cope with different conversions requirements to/from void in C and C++. + * This is mostly useful for support library. + */ +typedef A_SET_OF(void) asn_anonymous_set_; +#define _A_SET_FROM_VOID(ptr) ((asn_anonymous_set_ *)(ptr)) +#define _A_CSET_FROM_VOID(ptr) ((const asn_anonymous_set_ *)(ptr)) + +#ifdef __cplusplus +} +#endif + +#endif /* ASN_SET_OF_H */ diff --git a/certgen/asncodec/asn_application.c b/certgen/asncodec/asn_application.c index 7992185b5f27fbf66f3ef175e633eee19fa626b5..55040255709ff76688758b4e21a789d315f3c5d0 100644 --- a/certgen/asncodec/asn_application.c +++ b/certgen/asncodec/asn_application.c @@ -1,538 +1,538 @@ -/* - * Copyright (c) 2017 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include -#include - -static asn_enc_rval_t asn_encode_internal(const asn_codec_ctx_t *opt_codec_ctx, - enum asn_transfer_syntax syntax, - const asn_TYPE_descriptor_t *td, - const void *sptr, - asn_app_consume_bytes_f *callback, - void *callback_key); - - -struct callback_count_bytes_key { - asn_app_consume_bytes_f *callback; - void *callback_key; - size_t computed_size; -}; - -/* - * Encoder which just counts bytes that come through it. - */ -static int -callback_count_bytes_cb(const void *data, size_t size, void *keyp) { - struct callback_count_bytes_key *key = keyp; - int ret; - - ret = key->callback(data, size, key->callback_key); - if(ret >= 0) { - key->computed_size += size; - } - - return ret; -} - -struct overrun_encoder_key { - void *buffer; - size_t buffer_size; - size_t computed_size; -}; - -struct dynamic_encoder_key { - void *buffer; - size_t buffer_size; - size_t computed_size; -}; - -struct callback_failure_catch_key { - asn_app_consume_bytes_f *callback; - void *callback_key; - int callback_failed; -}; - -/* - * Encoder which doesn't stop counting bytes - * even if it reaches the end of the buffer. - */ -static int -overrun_encoder_cb(const void *data, size_t size, void *keyp) { - struct overrun_encoder_key *key = keyp; - - if(key->computed_size + size > key->buffer_size) { - /* - * Avoid accident on the next call: - * stop adding bytes to the buffer. - */ - key->buffer_size = 0; - } else { - memcpy((char *)key->buffer + key->computed_size, data, size); - } - key->computed_size += size; - - return 0; -} - -/* - * Encoder which dynamically allocates output, and continues - * to count even if allocation failed. - */ -static int -dynamic_encoder_cb(const void *data, size_t size, void *keyp) { - struct dynamic_encoder_key *key = keyp; - - if(key->buffer) { - if(key->computed_size + size >= key->buffer_size) { - void *p; - size_t new_size = key->buffer_size; - - do { - new_size *= 2; - } while(new_size <= key->computed_size + size); - - p = REALLOC(key->buffer, new_size); - if(p) { - key->buffer = p; - key->buffer_size = new_size; - } else { - FREEMEM(key->buffer); - key->buffer = 0; - key->buffer_size = 0; - key->computed_size += size; - return 0; - } - } - memcpy((char *)key->buffer + key->computed_size, data, size); - } - - key->computed_size += size; - - return 0; -} - -/* - * Encoder which help convert the application level encoder failure into EIO. - */ -static int -callback_failure_catch_cb(const void *data, size_t size, void *keyp) { - struct callback_failure_catch_key *key = keyp; - int ret; - - ret = key->callback(data, size, key->callback_key); - if(ret < 0) { - key->callback_failed = 1; - } - - return ret; -} - -asn_enc_rval_t -asn_encode(const asn_codec_ctx_t *opt_codec_ctx, - enum asn_transfer_syntax syntax, const asn_TYPE_descriptor_t *td, - const void *sptr, asn_app_consume_bytes_f *callback, void *callback_key) { - struct callback_failure_catch_key cb_key; - asn_enc_rval_t er = {0,0,0}; - - if(!callback) { - errno = EINVAL; - ASN__ENCODE_FAILED; - } - - cb_key.callback = callback; - cb_key.callback_key = callback_key; - cb_key.callback_failed = 0; - - er = asn_encode_internal(opt_codec_ctx, syntax, td, sptr, - callback_failure_catch_cb, &cb_key); - if(cb_key.callback_failed) { - assert(er.encoded == -1); - assert(errno == EBADF); - errno = EIO; - } - - return er; -} - -asn_enc_rval_t -asn_encode_to_buffer(const asn_codec_ctx_t *opt_codec_ctx, - enum asn_transfer_syntax syntax, - const asn_TYPE_descriptor_t *td, const void *sptr, - void *buffer, size_t buffer_size) { - struct overrun_encoder_key buf_key; - asn_enc_rval_t er = {0,0,0}; - - if(buffer_size > 0 && !buffer) { - errno = EINVAL; - ASN__ENCODE_FAILED; - } - - buf_key.buffer = buffer; - buf_key.buffer_size = buffer_size; - buf_key.computed_size = 0; - - er = asn_encode_internal(opt_codec_ctx, syntax, td, sptr, - overrun_encoder_cb, &buf_key); - - if(er.encoded >= 0 && (size_t)er.encoded != buf_key.computed_size) { - ASN_DEBUG("asn_encode() returned %" ASN_PRI_SSIZE - " yet produced %" ASN_PRI_SIZE " bytes", - er.encoded, buf_key.computed_size); - assert(er.encoded < 0 || (size_t)er.encoded == buf_key.computed_size); - } - - return er; -} - -asn_encode_to_new_buffer_result_t -asn_encode_to_new_buffer(const asn_codec_ctx_t *opt_codec_ctx, - enum asn_transfer_syntax syntax, - const asn_TYPE_descriptor_t *td, const void *sptr) { - struct dynamic_encoder_key buf_key; - asn_encode_to_new_buffer_result_t res; - - buf_key.buffer_size = 16; - buf_key.buffer = MALLOC(buf_key.buffer_size); - buf_key.computed_size = 0; - - res.result = asn_encode_internal(opt_codec_ctx, syntax, td, sptr, - dynamic_encoder_cb, &buf_key); - - if(res.result.encoded >= 0 - && (size_t)res.result.encoded != buf_key.computed_size) { - ASN_DEBUG("asn_encode() returned %" ASN_PRI_SSIZE - " yet produced %" ASN_PRI_SIZE " bytes", - res.result.encoded, buf_key.computed_size); - assert(res.result.encoded < 0 - || (size_t)res.result.encoded == buf_key.computed_size); - } - - res.buffer = buf_key.buffer; - - /* 0-terminate just in case. */ - if(res.buffer) { - assert(buf_key.computed_size < buf_key.buffer_size); - ((char *)res.buffer)[buf_key.computed_size] = '\0'; - } - - return res; -} - -static asn_enc_rval_t -asn_encode_internal(const asn_codec_ctx_t *opt_codec_ctx, - enum asn_transfer_syntax syntax, - const asn_TYPE_descriptor_t *td, const void *sptr, - asn_app_consume_bytes_f *callback, void *callback_key) { - asn_enc_rval_t er = {0,0,0}; -#if !defined(ASN_DISABLE_XER_SUPPORT) - enum xer_encoder_flags_e xer_flags = XER_F_CANONICAL; -#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ - - (void)opt_codec_ctx; /* Parameters are not checked on encode yet. */ - - if(!td || !sptr) { - errno = EINVAL; - ASN__ENCODE_FAILED; - } - - switch(syntax) { - case ATS_NONSTANDARD_PLAINTEXT: - if(td->op->print_struct) { - struct callback_count_bytes_key cb_key; - cb_key.callback = callback; - cb_key.callback_key = callback_key; - cb_key.computed_size = 0; - if(td->op->print_struct(td, sptr, 1, callback_count_bytes_cb, - &cb_key) - < 0 - || callback_count_bytes_cb("\n", 1, &cb_key) < 0) { - errno = EBADF; /* Structure has incorrect form. */ - er.encoded = -1; - er.failed_type = td; - er.structure_ptr = sptr; - } else { - er.encoded = cb_key.computed_size; - er.failed_type = 0; - er.structure_ptr = 0; - } - } else { - errno = ENOENT; /* Transfer syntax is not defined for this type. */ - ASN__ENCODE_FAILED; - } - break; - - case ATS_RANDOM: - errno = ENOENT; /* Randomization doesn't make sense on output. */ - ASN__ENCODE_FAILED; - -#if !defined(ASN_DISABLE_BER_SUPPORT) - case ATS_BER: - /* BER is a superset of DER. */ - /* Fall through. */ - case ATS_DER: - if(td->op->der_encoder) { - er = der_encode(td, sptr, callback, callback_key); - if(er.encoded == -1) { - if(er.failed_type && er.failed_type->op->der_encoder) { - errno = EBADF; /* Structure has incorrect form. */ - } else { - errno = ENOENT; /* DER is not defined for this type. */ - } - } - } else { - errno = ENOENT; /* Transfer syntax is not defined for this type. */ - ASN__ENCODE_FAILED; - } - break; - case ATS_CER: - errno = ENOENT; /* Transfer syntax is not defined for any type. */ - ASN__ENCODE_FAILED; -#else - case ATS_BER: - case ATS_DER: - case ATS_CER: - errno = ENOENT; /* BER is not defined. */ - ASN__ENCODE_FAILED; - -#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ - -#if !defined(ASN_DISABLE_OER_SUPPORT) - case ATS_BASIC_OER: - /* CANONICAL-OER is a superset of BASIC-OER. */ - /* Fall through. */ - case ATS_CANONICAL_OER: - if(td->op->oer_encoder) { - er = oer_encode(td, sptr, callback, callback_key); - if(er.encoded == -1) { - if(er.failed_type && er.failed_type->op->oer_encoder) { - errno = EBADF; /* Structure has incorrect form. */ - } else { - errno = ENOENT; /* OER is not defined for this type. */ - } - } - } else { - errno = ENOENT; /* Transfer syntax is not defined for this type. */ - ASN__ENCODE_FAILED; - } - break; -#else - case ATS_BASIC_OER: - case ATS_CANONICAL_OER: - errno = ENOENT; /* OER is not defined. */ - ASN__ENCODE_FAILED; - break; -#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ - -#if !defined(ASN_DISABLE_UPER_SUPPORT) - case ATS_UNALIGNED_BASIC_PER: - /* CANONICAL-UPER is a superset of BASIC-UPER. */ - /* Fall through. */ - case ATS_UNALIGNED_CANONICAL_PER: - if(td->op->uper_encoder) { - er = uper_encode(td, 0, sptr, callback, callback_key); - if(er.encoded == -1) { - if(er.failed_type && er.failed_type->op->uper_encoder) { - errno = EBADF; /* Structure has incorrect form. */ - } else { - errno = ENOENT; /* UPER is not defined for this type. */ - } - } else { - ASN_DEBUG("Complete encoded in %ld bits", (long)er.encoded); - if(er.encoded == 0) { - /* Enforce "Complete Encoding" of X.691 #11.1 */ - if(callback("\0", 1, callback_key) < 0) { - errno = EBADF; - ASN__ENCODE_FAILED; - } - er.encoded = 8; /* Exactly 8 zero bits is added. */ - } - /* Convert bits into bytes */ - er.encoded = (er.encoded + 7) >> 3; - } - } else { - errno = ENOENT; /* Transfer syntax is not defined for this type. */ - ASN__ENCODE_FAILED; - } - break; -#else - case ATS_UNALIGNED_BASIC_PER: - case ATS_UNALIGNED_CANONICAL_PER: - errno = ENOENT; /* UPER is not defined. */ - ASN__ENCODE_FAILED; - break; -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ -#if !defined(ASN_DISABLE_APER_SUPPORT) - case ATS_ALIGNED_BASIC_PER: - /* CANONICAL-APER is a superset of BASIC-APER. */ - /* Fall through. */ - case ATS_ALIGNED_CANONICAL_PER: - if(td->op->aper_encoder) { - er = aper_encode(td, 0, sptr, callback, callback_key); - if(er.encoded == -1) { - if(er.failed_type && er.failed_type->op->aper_encoder) { - errno = EBADF; /* Structure has incorrect form. */ - } else { - errno = ENOENT; /* APER is not defined for this type. */ - } - } else { - ASN_DEBUG("Complete encoded in %ld bits", (long)er.encoded); - if(er.encoded == 0) { - /* Enforce "Complete Encoding" of X.691 #11.1 */ - if(callback("\0", 1, callback_key) < 0) { - errno = EBADF; - ASN__ENCODE_FAILED; - } - er.encoded = 8; /* Exactly 8 zero bits is added. */ - } - /* Convert bits into bytes */ - er.encoded = (er.encoded + 7) >> 3; - } - } else { - errno = ENOENT; /* Transfer syntax is not defined for this type. */ - ASN__ENCODE_FAILED; - } - break; -#else - case ATS_ALIGNED_BASIC_PER: - case ATS_ALIGNED_CANONICAL_PER: - errno = ENOENT; /* APER is not defined. */ - ASN__ENCODE_FAILED; - break; -#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ - -#if !defined(ASN_DISABLE_XER_SUPPORT) - case ATS_BASIC_XER: - /* CANONICAL-XER is a superset of BASIC-XER. */ - xer_flags &= ~XER_F_CANONICAL; - xer_flags |= XER_F_BASIC; - /* Fall through. */ - case ATS_CANONICAL_XER: - if(td->op->xer_encoder) { - er = xer_encode(td, sptr, xer_flags, callback, callback_key); - if(er.encoded == -1) { - if(er.failed_type && er.failed_type->op->xer_encoder) { - errno = EBADF; /* Structure has incorrect form. */ - } else { - errno = ENOENT; /* XER is not defined for this type. */ - } - } - } else { - errno = ENOENT; /* Transfer syntax is not defined for this type. */ - ASN__ENCODE_FAILED; - } - break; -#else - case ATS_BASIC_XER: - case ATS_CANONICAL_XER: - errno = ENOENT; /* XER is not defined. */ - ASN__ENCODE_FAILED; - break; -#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ - -#if !defined(ASN_DISABLE_JER_SUPPORT) - case ATS_JER: - if(td->op->jer_encoder) { - er = jer_encode(td, sptr, callback, callback_key); - if(er.encoded == -1) { - if(er.failed_type && er.failed_type->op->jer_encoder) { - errno = EBADF; /* Structure has incorrect form. */ - } else { - errno = ENOENT; /* JER is not defined for this type. */ - } - } - } else { - errno = ENOENT; /* Transfer syntax is not defined for this type. */ - ASN__ENCODE_FAILED; - } - break; -#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ - default: - errno = ENOENT; - ASN__ENCODE_FAILED; - } - - return er; -} - -asn_dec_rval_t -asn_decode(const asn_codec_ctx_t *opt_codec_ctx, - enum asn_transfer_syntax syntax, const asn_TYPE_descriptor_t *td, - void **sptr, const void *buffer, size_t size) { - if(!td || !td->op || !sptr || (size && !buffer)) { - ASN__DECODE_FAILED; - } - - switch(syntax) { - case ATS_CER: - case ATS_NONSTANDARD_PLAINTEXT: - default: - errno = ENOENT; - ASN__DECODE_FAILED; - - case ATS_RANDOM: -#if !defined(ASN_DISABLE_RFILL_SUPPORT) - if(!td->op->random_fill) { - ASN__DECODE_FAILED; - } else { - if(asn_random_fill(td, sptr, 16000) == 0) { - asn_dec_rval_t ret = {RC_OK, 0}; - return ret; - } else { - ASN__DECODE_FAILED; - } - } - break; -#else - errno = ENOENT; - ASN__DECODE_FAILED; -#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ - - case ATS_DER: - case ATS_BER: -#if !defined(ASN_DISABLE_BER_SUPPORT) - return ber_decode(opt_codec_ctx, td, sptr, buffer, size); -#else - errno = ENOENT; - ASN__DECODE_FAILED; -#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ - - case ATS_BASIC_OER: - case ATS_CANONICAL_OER: -#if !defined(ASN_DISABLE_OER_SUPPORT) - return oer_decode(opt_codec_ctx, td, sptr, buffer, size); -#else - errno = ENOENT; - ASN__DECODE_FAILED; -#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ - - case ATS_UNALIGNED_BASIC_PER: - case ATS_UNALIGNED_CANONICAL_PER: -#if !defined(ASN_DISABLE_UPER_SUPPORT) - return uper_decode_complete(opt_codec_ctx, td, sptr, buffer, size); -#else - errno = ENOENT; - ASN__DECODE_FAILED; -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ - - case ATS_ALIGNED_BASIC_PER: - case ATS_ALIGNED_CANONICAL_PER: -#if !defined(ASN_DISABLE_APER_SUPPORT) - return aper_decode_complete(opt_codec_ctx, td, sptr, buffer, size); -#else - errno = ENOENT; - ASN__DECODE_FAILED; -#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ - - case ATS_BASIC_XER: - case ATS_CANONICAL_XER: -#if !defined(ASN_DISABLE_XER_SUPPORT) - return xer_decode(opt_codec_ctx, td, sptr, buffer, size); -#else - errno = ENOENT; - ASN__DECODE_FAILED; -#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ - } -} - +/* + * Copyright (c) 2017 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include +#include + +static asn_enc_rval_t asn_encode_internal(const asn_codec_ctx_t *opt_codec_ctx, + enum asn_transfer_syntax syntax, + const asn_TYPE_descriptor_t *td, + const void *sptr, + asn_app_consume_bytes_f *callback, + void *callback_key); + + +struct callback_count_bytes_key { + asn_app_consume_bytes_f *callback; + void *callback_key; + size_t computed_size; +}; + +/* + * Encoder which just counts bytes that come through it. + */ +static int +callback_count_bytes_cb(const void *data, size_t size, void *keyp) { + struct callback_count_bytes_key *key = keyp; + int ret; + + ret = key->callback(data, size, key->callback_key); + if(ret >= 0) { + key->computed_size += size; + } + + return ret; +} + +struct overrun_encoder_key { + void *buffer; + size_t buffer_size; + size_t computed_size; +}; + +struct dynamic_encoder_key { + void *buffer; + size_t buffer_size; + size_t computed_size; +}; + +struct callback_failure_catch_key { + asn_app_consume_bytes_f *callback; + void *callback_key; + int callback_failed; +}; + +/* + * Encoder which doesn't stop counting bytes + * even if it reaches the end of the buffer. + */ +static int +overrun_encoder_cb(const void *data, size_t size, void *keyp) { + struct overrun_encoder_key *key = keyp; + + if(key->computed_size + size > key->buffer_size) { + /* + * Avoid accident on the next call: + * stop adding bytes to the buffer. + */ + key->buffer_size = 0; + } else { + memcpy((char *)key->buffer + key->computed_size, data, size); + } + key->computed_size += size; + + return 0; +} + +/* + * Encoder which dynamically allocates output, and continues + * to count even if allocation failed. + */ +static int +dynamic_encoder_cb(const void *data, size_t size, void *keyp) { + struct dynamic_encoder_key *key = keyp; + + if(key->buffer) { + if(key->computed_size + size >= key->buffer_size) { + void *p; + size_t new_size = key->buffer_size; + + do { + new_size *= 2; + } while(new_size <= key->computed_size + size); + + p = REALLOC(key->buffer, new_size); + if(p) { + key->buffer = p; + key->buffer_size = new_size; + } else { + FREEMEM(key->buffer); + key->buffer = 0; + key->buffer_size = 0; + key->computed_size += size; + return 0; + } + } + memcpy((char *)key->buffer + key->computed_size, data, size); + } + + key->computed_size += size; + + return 0; +} + +/* + * Encoder which help convert the application level encoder failure into EIO. + */ +static int +callback_failure_catch_cb(const void *data, size_t size, void *keyp) { + struct callback_failure_catch_key *key = keyp; + int ret; + + ret = key->callback(data, size, key->callback_key); + if(ret < 0) { + key->callback_failed = 1; + } + + return ret; +} + +asn_enc_rval_t +asn_encode(const asn_codec_ctx_t *opt_codec_ctx, + enum asn_transfer_syntax syntax, const asn_TYPE_descriptor_t *td, + const void *sptr, asn_app_consume_bytes_f *callback, void *callback_key) { + struct callback_failure_catch_key cb_key; + asn_enc_rval_t er = {0,0,0}; + + if(!callback) { + errno = EINVAL; + ASN__ENCODE_FAILED; + } + + cb_key.callback = callback; + cb_key.callback_key = callback_key; + cb_key.callback_failed = 0; + + er = asn_encode_internal(opt_codec_ctx, syntax, td, sptr, + callback_failure_catch_cb, &cb_key); + if(cb_key.callback_failed) { + assert(er.encoded == -1); + assert(errno == EBADF); + errno = EIO; + } + + return er; +} + +asn_enc_rval_t +asn_encode_to_buffer(const asn_codec_ctx_t *opt_codec_ctx, + enum asn_transfer_syntax syntax, + const asn_TYPE_descriptor_t *td, const void *sptr, + void *buffer, size_t buffer_size) { + struct overrun_encoder_key buf_key; + asn_enc_rval_t er = {0,0,0}; + + if(buffer_size > 0 && !buffer) { + errno = EINVAL; + ASN__ENCODE_FAILED; + } + + buf_key.buffer = buffer; + buf_key.buffer_size = buffer_size; + buf_key.computed_size = 0; + + er = asn_encode_internal(opt_codec_ctx, syntax, td, sptr, + overrun_encoder_cb, &buf_key); + + if(er.encoded >= 0 && (size_t)er.encoded != buf_key.computed_size) { + ASN_DEBUG("asn_encode() returned %" ASN_PRI_SSIZE + " yet produced %" ASN_PRI_SIZE " bytes", + er.encoded, buf_key.computed_size); + assert(er.encoded < 0 || (size_t)er.encoded == buf_key.computed_size); + } + + return er; +} + +asn_encode_to_new_buffer_result_t +asn_encode_to_new_buffer(const asn_codec_ctx_t *opt_codec_ctx, + enum asn_transfer_syntax syntax, + const asn_TYPE_descriptor_t *td, const void *sptr) { + struct dynamic_encoder_key buf_key; + asn_encode_to_new_buffer_result_t res; + + buf_key.buffer_size = 16; + buf_key.buffer = MALLOC(buf_key.buffer_size); + buf_key.computed_size = 0; + + res.result = asn_encode_internal(opt_codec_ctx, syntax, td, sptr, + dynamic_encoder_cb, &buf_key); + + if(res.result.encoded >= 0 + && (size_t)res.result.encoded != buf_key.computed_size) { + ASN_DEBUG("asn_encode() returned %" ASN_PRI_SSIZE + " yet produced %" ASN_PRI_SIZE " bytes", + res.result.encoded, buf_key.computed_size); + assert(res.result.encoded < 0 + || (size_t)res.result.encoded == buf_key.computed_size); + } + + res.buffer = buf_key.buffer; + + /* 0-terminate just in case. */ + if(res.buffer) { + assert(buf_key.computed_size < buf_key.buffer_size); + ((char *)res.buffer)[buf_key.computed_size] = '\0'; + } + + return res; +} + +static asn_enc_rval_t +asn_encode_internal(const asn_codec_ctx_t *opt_codec_ctx, + enum asn_transfer_syntax syntax, + const asn_TYPE_descriptor_t *td, const void *sptr, + asn_app_consume_bytes_f *callback, void *callback_key) { + asn_enc_rval_t er = {0,0,0}; +#if !defined(ASN_DISABLE_XER_SUPPORT) + enum xer_encoder_flags_e xer_flags = XER_F_CANONICAL; +#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ + + (void)opt_codec_ctx; /* Parameters are not checked on encode yet. */ + + if(!td || !sptr) { + errno = EINVAL; + ASN__ENCODE_FAILED; + } + + switch(syntax) { + case ATS_NONSTANDARD_PLAINTEXT: + if(td->op->print_struct) { + struct callback_count_bytes_key cb_key; + cb_key.callback = callback; + cb_key.callback_key = callback_key; + cb_key.computed_size = 0; + if(td->op->print_struct(td, sptr, 1, callback_count_bytes_cb, + &cb_key) + < 0 + || callback_count_bytes_cb("\n", 1, &cb_key) < 0) { + errno = EBADF; /* Structure has incorrect form. */ + er.encoded = -1; + er.failed_type = td; + er.structure_ptr = sptr; + } else { + er.encoded = cb_key.computed_size; + er.failed_type = 0; + er.structure_ptr = 0; + } + } else { + errno = ENOENT; /* Transfer syntax is not defined for this type. */ + ASN__ENCODE_FAILED; + } + break; + + case ATS_RANDOM: + errno = ENOENT; /* Randomization doesn't make sense on output. */ + ASN__ENCODE_FAILED; + +#if !defined(ASN_DISABLE_BER_SUPPORT) + case ATS_BER: + /* BER is a superset of DER. */ + /* Fall through. */ + case ATS_DER: + if(td->op->der_encoder) { + er = der_encode(td, sptr, callback, callback_key); + if(er.encoded == -1) { + if(er.failed_type && er.failed_type->op->der_encoder) { + errno = EBADF; /* Structure has incorrect form. */ + } else { + errno = ENOENT; /* DER is not defined for this type. */ + } + } + } else { + errno = ENOENT; /* Transfer syntax is not defined for this type. */ + ASN__ENCODE_FAILED; + } + break; + case ATS_CER: + errno = ENOENT; /* Transfer syntax is not defined for any type. */ + ASN__ENCODE_FAILED; +#else + case ATS_BER: + case ATS_DER: + case ATS_CER: + errno = ENOENT; /* BER is not defined. */ + ASN__ENCODE_FAILED; + +#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ + +#if !defined(ASN_DISABLE_OER_SUPPORT) + case ATS_BASIC_OER: + /* CANONICAL-OER is a superset of BASIC-OER. */ + /* Fall through. */ + case ATS_CANONICAL_OER: + if(td->op->oer_encoder) { + er = oer_encode(td, sptr, callback, callback_key); + if(er.encoded == -1) { + if(er.failed_type && er.failed_type->op->oer_encoder) { + errno = EBADF; /* Structure has incorrect form. */ + } else { + errno = ENOENT; /* OER is not defined for this type. */ + } + } + } else { + errno = ENOENT; /* Transfer syntax is not defined for this type. */ + ASN__ENCODE_FAILED; + } + break; +#else + case ATS_BASIC_OER: + case ATS_CANONICAL_OER: + errno = ENOENT; /* OER is not defined. */ + ASN__ENCODE_FAILED; + break; +#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ + +#if !defined(ASN_DISABLE_UPER_SUPPORT) + case ATS_UNALIGNED_BASIC_PER: + /* CANONICAL-UPER is a superset of BASIC-UPER. */ + /* Fall through. */ + case ATS_UNALIGNED_CANONICAL_PER: + if(td->op->uper_encoder) { + er = uper_encode(td, 0, sptr, callback, callback_key); + if(er.encoded == -1) { + if(er.failed_type && er.failed_type->op->uper_encoder) { + errno = EBADF; /* Structure has incorrect form. */ + } else { + errno = ENOENT; /* UPER is not defined for this type. */ + } + } else { + ASN_DEBUG("Complete encoded in %ld bits", (long)er.encoded); + if(er.encoded == 0) { + /* Enforce "Complete Encoding" of X.691 #11.1 */ + if(callback("\0", 1, callback_key) < 0) { + errno = EBADF; + ASN__ENCODE_FAILED; + } + er.encoded = 8; /* Exactly 8 zero bits is added. */ + } + /* Convert bits into bytes */ + er.encoded = (er.encoded + 7) >> 3; + } + } else { + errno = ENOENT; /* Transfer syntax is not defined for this type. */ + ASN__ENCODE_FAILED; + } + break; +#else + case ATS_UNALIGNED_BASIC_PER: + case ATS_UNALIGNED_CANONICAL_PER: + errno = ENOENT; /* UPER is not defined. */ + ASN__ENCODE_FAILED; + break; +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ +#if !defined(ASN_DISABLE_APER_SUPPORT) + case ATS_ALIGNED_BASIC_PER: + /* CANONICAL-APER is a superset of BASIC-APER. */ + /* Fall through. */ + case ATS_ALIGNED_CANONICAL_PER: + if(td->op->aper_encoder) { + er = aper_encode(td, 0, sptr, callback, callback_key); + if(er.encoded == -1) { + if(er.failed_type && er.failed_type->op->aper_encoder) { + errno = EBADF; /* Structure has incorrect form. */ + } else { + errno = ENOENT; /* APER is not defined for this type. */ + } + } else { + ASN_DEBUG("Complete encoded in %ld bits", (long)er.encoded); + if(er.encoded == 0) { + /* Enforce "Complete Encoding" of X.691 #11.1 */ + if(callback("\0", 1, callback_key) < 0) { + errno = EBADF; + ASN__ENCODE_FAILED; + } + er.encoded = 8; /* Exactly 8 zero bits is added. */ + } + /* Convert bits into bytes */ + er.encoded = (er.encoded + 7) >> 3; + } + } else { + errno = ENOENT; /* Transfer syntax is not defined for this type. */ + ASN__ENCODE_FAILED; + } + break; +#else + case ATS_ALIGNED_BASIC_PER: + case ATS_ALIGNED_CANONICAL_PER: + errno = ENOENT; /* APER is not defined. */ + ASN__ENCODE_FAILED; + break; +#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ + +#if !defined(ASN_DISABLE_XER_SUPPORT) + case ATS_BASIC_XER: + /* CANONICAL-XER is a superset of BASIC-XER. */ + xer_flags &= ~XER_F_CANONICAL; + xer_flags |= XER_F_BASIC; + /* Fall through. */ + case ATS_CANONICAL_XER: + if(td->op->xer_encoder) { + er = xer_encode(td, sptr, xer_flags, callback, callback_key); + if(er.encoded == -1) { + if(er.failed_type && er.failed_type->op->xer_encoder) { + errno = EBADF; /* Structure has incorrect form. */ + } else { + errno = ENOENT; /* XER is not defined for this type. */ + } + } + } else { + errno = ENOENT; /* Transfer syntax is not defined for this type. */ + ASN__ENCODE_FAILED; + } + break; +#else + case ATS_BASIC_XER: + case ATS_CANONICAL_XER: + errno = ENOENT; /* XER is not defined. */ + ASN__ENCODE_FAILED; + break; +#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ + +#if !defined(ASN_DISABLE_JER_SUPPORT) + case ATS_JER: + if(td->op->jer_encoder) { + er = jer_encode(td, sptr, callback, callback_key); + if(er.encoded == -1) { + if(er.failed_type && er.failed_type->op->jer_encoder) { + errno = EBADF; /* Structure has incorrect form. */ + } else { + errno = ENOENT; /* JER is not defined for this type. */ + } + } + } else { + errno = ENOENT; /* Transfer syntax is not defined for this type. */ + ASN__ENCODE_FAILED; + } + break; +#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ + default: + errno = ENOENT; + ASN__ENCODE_FAILED; + } + + return er; +} + +asn_dec_rval_t +asn_decode(const asn_codec_ctx_t *opt_codec_ctx, + enum asn_transfer_syntax syntax, const asn_TYPE_descriptor_t *td, + void **sptr, const void *buffer, size_t size) { + if(!td || !td->op || !sptr || (size && !buffer)) { + ASN__DECODE_FAILED; + } + + switch(syntax) { + case ATS_CER: + case ATS_NONSTANDARD_PLAINTEXT: + default: + errno = ENOENT; + ASN__DECODE_FAILED; + + case ATS_RANDOM: +#if !defined(ASN_DISABLE_RFILL_SUPPORT) + if(!td->op->random_fill) { + ASN__DECODE_FAILED; + } else { + if(asn_random_fill(td, sptr, 16000) == 0) { + asn_dec_rval_t ret = {RC_OK, 0}; + return ret; + } else { + ASN__DECODE_FAILED; + } + } + break; +#else + errno = ENOENT; + ASN__DECODE_FAILED; +#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ + + case ATS_DER: + case ATS_BER: +#if !defined(ASN_DISABLE_BER_SUPPORT) + return ber_decode(opt_codec_ctx, td, sptr, buffer, size); +#else + errno = ENOENT; + ASN__DECODE_FAILED; +#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ + + case ATS_BASIC_OER: + case ATS_CANONICAL_OER: +#if !defined(ASN_DISABLE_OER_SUPPORT) + return oer_decode(opt_codec_ctx, td, sptr, buffer, size); +#else + errno = ENOENT; + ASN__DECODE_FAILED; +#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ + + case ATS_UNALIGNED_BASIC_PER: + case ATS_UNALIGNED_CANONICAL_PER: +#if !defined(ASN_DISABLE_UPER_SUPPORT) + return uper_decode_complete(opt_codec_ctx, td, sptr, buffer, size); +#else + errno = ENOENT; + ASN__DECODE_FAILED; +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ + + case ATS_ALIGNED_BASIC_PER: + case ATS_ALIGNED_CANONICAL_PER: +#if !defined(ASN_DISABLE_APER_SUPPORT) + return aper_decode_complete(opt_codec_ctx, td, sptr, buffer, size); +#else + errno = ENOENT; + ASN__DECODE_FAILED; +#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ + + case ATS_BASIC_XER: + case ATS_CANONICAL_XER: +#if !defined(ASN_DISABLE_XER_SUPPORT) + return xer_decode(opt_codec_ctx, td, sptr, buffer, size); +#else + errno = ENOENT; + ASN__DECODE_FAILED; +#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ + } +} + diff --git a/certgen/asncodec/asn_application.h b/certgen/asncodec/asn_application.h index bf10cd3e2d4a5856cdbcfc7889d654f72b8902f2..a459ebfa518ff5bae7e147667b8f19a61c78b17b 100644 --- a/certgen/asncodec/asn_application.h +++ b/certgen/asncodec/asn_application.h @@ -1,173 +1,173 @@ -/*- - * Copyright (c) 2004-2017 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -/* - * Application-level ASN.1 callbacks. - */ -#ifndef ASN_APPLICATION_H -#define ASN_APPLICATION_H - -#include "asn_system.h" /* for platform-dependent types */ -#include "asn_codecs.h" /* for ASN.1 codecs specifics */ -#include "asn_config.h" - -#ifdef __cplusplus -extern "C" { -#endif - -/* - * A selection of ASN.1 Transfer Syntaxes to use with generalized - * encoders and decoders declared further in this .h file. - */ -enum asn_transfer_syntax { - /* Avoid appearance of a default transfer syntax. */ - ATS_INVALID = 0, - /* Plaintext output (not conforming to any standard), for debugging. */ - ATS_NONSTANDARD_PLAINTEXT, - /* Returns a randomly generated structure. */ - ATS_RANDOM, - /* - * X.690: - * BER: Basic Encoding Rules. - * DER: Distinguished Encoding Rules. - * CER: Canonical Encoding Rules. - * DER and CER are more strict variants of BER. - */ - ATS_BER, - ATS_DER, - ATS_CER, /* Only decoding is supported */ - /* - * X.696: - * OER: Octet Encoding Rules. - * CANONICAL-OER is a more strict variant of BASIC-OER. - */ - ATS_BASIC_OER, - ATS_CANONICAL_OER, - /* - * X.691: - * PER: Packed Encoding Rules. - * CANONICAL-PER is a more strict variant of BASIC-PER. - * NOTE: Produces or consumes a complete encoding (X.691 (08/2015) #11.1). - */ - ATS_UNALIGNED_BASIC_PER, - ATS_UNALIGNED_CANONICAL_PER, - ATS_ALIGNED_BASIC_PER, - ATS_ALIGNED_CANONICAL_PER, - /* - * X.693: - * XER: XML Encoding Rules. - * CANONICAL-XER is a more strict variant of BASIC-XER. - */ - ATS_BASIC_XER, - ATS_CANONICAL_XER, - ATS_JER, -}; - -/* - * A generic encoder for any supported transfer syntax. - * RETURN VALUES: - * The (.encoded) field of the return value is REDEFINED to mean the following: - * >=0: The computed size of the encoded data. Can exceed the (buffer_size). - * -1: Error encoding the structure. See the error code in (errno): - * EINVAL: Incorrect parameters to the function, such as NULLs. - * ENOENT: Encoding transfer syntax is not defined (for this type). - * EBADF: The structure has invalid form or content constraint failed. - * The (.failed_type) and (.structure_ptr) MIGHT be set to the appropriate - * values at the place of failure, if at all possible. - * WARNING: The (.encoded) field of the return value can exceed the buffer_size. - * This is similar to snprintf(3) contract which might return values - * greater than the buffer size. - */ -asn_enc_rval_t asn_encode_to_buffer( - const asn_codec_ctx_t *opt_codec_parameters, /* See asn_codecs.h */ - enum asn_transfer_syntax, - const struct asn_TYPE_descriptor_s *type_to_encode, - const void *structure_to_encode, void *buffer, size_t buffer_size); - -/* - * A variant of asn_encode_to_buffer() with automatically allocated buffer. - * RETURN VALUES: - * On success, returns a newly allocated (.buffer) containing the whole message. - * The message size is returned in (.result.encoded). - * On failure: - * (.buffer) is NULL, - * (.result.encoded) as in asn_encode_to_buffer(), - * The errno codes as in asn_encode_to_buffer(), plus the following: - * ENOMEM: Memory allocation failed due to system or internal limits. - * The user is responsible for freeing the (.buffer). - */ -typedef struct asn_encode_to_new_buffer_result_s { - void *buffer; /* NULL if failed to encode. */ - asn_enc_rval_t result; -} asn_encode_to_new_buffer_result_t; -asn_encode_to_new_buffer_result_t asn_encode_to_new_buffer( - const asn_codec_ctx_t *opt_codec_parameters, /* See asn_codecs.h */ - enum asn_transfer_syntax, - const struct asn_TYPE_descriptor_s *type_to_encode, - const void *structure_to_encode); - - -/* - * Generic type of an application-defined callback to return various - * types of data to the application. - * EXPECTED RETURN VALUES: - * -1: Failed to consume bytes. Abort the mission. - * Non-negative return values indicate success, and ignored. - */ -typedef int(asn_app_consume_bytes_f)(const void *buffer, size_t size, - void *application_specific_key); - - -/* - * A generic encoder for any supported transfer syntax. - * Returns the comprehensive encoding result descriptor (see asn_codecs.h). - * RETURN VALUES: - * The negative (.encoded) field of the return values is accompanied with the - * following error codes (errno): - * EINVAL: Incorrect parameters to the function, such as NULLs. - * ENOENT: Encoding transfer syntax is not defined (for this type). - * EBADF: The structure has invalid form or content constraint failed. - * EIO: The (callback) has returned negative value during encoding. - */ -asn_enc_rval_t asn_encode( - const asn_codec_ctx_t *opt_codec_parameters, /* See asn_codecs.h */ - enum asn_transfer_syntax, - const struct asn_TYPE_descriptor_s *type_to_encode, - const void *structure_to_encode, - asn_app_consume_bytes_f *callback, void *callback_key); - - -/* - * A generic decoder for any supported transfer syntax. - */ -asn_dec_rval_t asn_decode( - const asn_codec_ctx_t *opt_codec_parameters, enum asn_transfer_syntax, - const struct asn_TYPE_descriptor_s *type_to_decode, - void **structure_ptr, /* Pointer to a target structure's pointer */ - const void *buffer, /* Data to be decoded */ - size_t size /* Size of that buffer */ -); - - -/* - * A callback of this type is called whenever constraint validation fails - * on some ASN.1 type. See "constraints.h" for more details on constraint - * validation. - * This callback specifies a descriptor of the ASN.1 type which failed - * the constraint check, as well as human readable message on what - * particular constraint has failed. - */ -typedef void (asn_app_constraint_failed_f)(void *application_specific_key, - const struct asn_TYPE_descriptor_s *type_descriptor_which_failed, - const void *structure_which_failed_ptr, - const char *error_message_format, ...) CC_PRINTFLIKE(4, 5); - - -#ifdef __cplusplus -} -#endif - -#include "constr_TYPE.h" /* for asn_TYPE_descriptor_t */ - -#endif /* ASN_APPLICATION_H */ +/*- + * Copyright (c) 2004-2017 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +/* + * Application-level ASN.1 callbacks. + */ +#ifndef ASN_APPLICATION_H +#define ASN_APPLICATION_H + +#include "asn_system.h" /* for platform-dependent types */ +#include "asn_codecs.h" /* for ASN.1 codecs specifics */ +#include "asn_config.h" + +#ifdef __cplusplus +extern "C" { +#endif + +/* + * A selection of ASN.1 Transfer Syntaxes to use with generalized + * encoders and decoders declared further in this .h file. + */ +enum asn_transfer_syntax { + /* Avoid appearance of a default transfer syntax. */ + ATS_INVALID = 0, + /* Plaintext output (not conforming to any standard), for debugging. */ + ATS_NONSTANDARD_PLAINTEXT, + /* Returns a randomly generated structure. */ + ATS_RANDOM, + /* + * X.690: + * BER: Basic Encoding Rules. + * DER: Distinguished Encoding Rules. + * CER: Canonical Encoding Rules. + * DER and CER are more strict variants of BER. + */ + ATS_BER, + ATS_DER, + ATS_CER, /* Only decoding is supported */ + /* + * X.696: + * OER: Octet Encoding Rules. + * CANONICAL-OER is a more strict variant of BASIC-OER. + */ + ATS_BASIC_OER, + ATS_CANONICAL_OER, + /* + * X.691: + * PER: Packed Encoding Rules. + * CANONICAL-PER is a more strict variant of BASIC-PER. + * NOTE: Produces or consumes a complete encoding (X.691 (08/2015) #11.1). + */ + ATS_UNALIGNED_BASIC_PER, + ATS_UNALIGNED_CANONICAL_PER, + ATS_ALIGNED_BASIC_PER, + ATS_ALIGNED_CANONICAL_PER, + /* + * X.693: + * XER: XML Encoding Rules. + * CANONICAL-XER is a more strict variant of BASIC-XER. + */ + ATS_BASIC_XER, + ATS_CANONICAL_XER, + ATS_JER, +}; + +/* + * A generic encoder for any supported transfer syntax. + * RETURN VALUES: + * The (.encoded) field of the return value is REDEFINED to mean the following: + * >=0: The computed size of the encoded data. Can exceed the (buffer_size). + * -1: Error encoding the structure. See the error code in (errno): + * EINVAL: Incorrect parameters to the function, such as NULLs. + * ENOENT: Encoding transfer syntax is not defined (for this type). + * EBADF: The structure has invalid form or content constraint failed. + * The (.failed_type) and (.structure_ptr) MIGHT be set to the appropriate + * values at the place of failure, if at all possible. + * WARNING: The (.encoded) field of the return value can exceed the buffer_size. + * This is similar to snprintf(3) contract which might return values + * greater than the buffer size. + */ +asn_enc_rval_t asn_encode_to_buffer( + const asn_codec_ctx_t *opt_codec_parameters, /* See asn_codecs.h */ + enum asn_transfer_syntax, + const struct asn_TYPE_descriptor_s *type_to_encode, + const void *structure_to_encode, void *buffer, size_t buffer_size); + +/* + * A variant of asn_encode_to_buffer() with automatically allocated buffer. + * RETURN VALUES: + * On success, returns a newly allocated (.buffer) containing the whole message. + * The message size is returned in (.result.encoded). + * On failure: + * (.buffer) is NULL, + * (.result.encoded) as in asn_encode_to_buffer(), + * The errno codes as in asn_encode_to_buffer(), plus the following: + * ENOMEM: Memory allocation failed due to system or internal limits. + * The user is responsible for freeing the (.buffer). + */ +typedef struct asn_encode_to_new_buffer_result_s { + void *buffer; /* NULL if failed to encode. */ + asn_enc_rval_t result; +} asn_encode_to_new_buffer_result_t; +asn_encode_to_new_buffer_result_t asn_encode_to_new_buffer( + const asn_codec_ctx_t *opt_codec_parameters, /* See asn_codecs.h */ + enum asn_transfer_syntax, + const struct asn_TYPE_descriptor_s *type_to_encode, + const void *structure_to_encode); + + +/* + * Generic type of an application-defined callback to return various + * types of data to the application. + * EXPECTED RETURN VALUES: + * -1: Failed to consume bytes. Abort the mission. + * Non-negative return values indicate success, and ignored. + */ +typedef int(asn_app_consume_bytes_f)(const void *buffer, size_t size, + void *application_specific_key); + + +/* + * A generic encoder for any supported transfer syntax. + * Returns the comprehensive encoding result descriptor (see asn_codecs.h). + * RETURN VALUES: + * The negative (.encoded) field of the return values is accompanied with the + * following error codes (errno): + * EINVAL: Incorrect parameters to the function, such as NULLs. + * ENOENT: Encoding transfer syntax is not defined (for this type). + * EBADF: The structure has invalid form or content constraint failed. + * EIO: The (callback) has returned negative value during encoding. + */ +asn_enc_rval_t asn_encode( + const asn_codec_ctx_t *opt_codec_parameters, /* See asn_codecs.h */ + enum asn_transfer_syntax, + const struct asn_TYPE_descriptor_s *type_to_encode, + const void *structure_to_encode, + asn_app_consume_bytes_f *callback, void *callback_key); + + +/* + * A generic decoder for any supported transfer syntax. + */ +asn_dec_rval_t asn_decode( + const asn_codec_ctx_t *opt_codec_parameters, enum asn_transfer_syntax, + const struct asn_TYPE_descriptor_s *type_to_decode, + void **structure_ptr, /* Pointer to a target structure's pointer */ + const void *buffer, /* Data to be decoded */ + size_t size /* Size of that buffer */ +); + + +/* + * A callback of this type is called whenever constraint validation fails + * on some ASN.1 type. See "constraints.h" for more details on constraint + * validation. + * This callback specifies a descriptor of the ASN.1 type which failed + * the constraint check, as well as human readable message on what + * particular constraint has failed. + */ +typedef void (asn_app_constraint_failed_f)(void *application_specific_key, + const struct asn_TYPE_descriptor_s *type_descriptor_which_failed, + const void *structure_which_failed_ptr, + const char *error_message_format, ...) CC_PRINTFLIKE(4, 5); + + +#ifdef __cplusplus +} +#endif + +#include "constr_TYPE.h" /* for asn_TYPE_descriptor_t */ + +#endif /* ASN_APPLICATION_H */ diff --git a/certgen/asncodec/asn_bit_data.c b/certgen/asncodec/asn_bit_data.c index fe4b89ba70065e6d7ff3f8ee146d68de412b10fb..29a91acde4a9dba154fe541d9706ac22bfc359cf 100644 --- a/certgen/asncodec/asn_bit_data.c +++ b/certgen/asncodec/asn_bit_data.c @@ -1,333 +1,333 @@ -/* - * Copyright (c) 2005-2017 Lev Walkin . - * All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include -#include - -/* - * Create a contiguous non-refillable bit data structure. - * Can be freed by FREEMEM(). - */ -asn_bit_data_t * -asn_bit_data_new_contiguous(const void *data, size_t size_bits) { - size_t size_bytes = (size_bits + 7) / 8; - asn_bit_data_t *pd; - uint8_t *bytes; - - /* Get the extensions map */ - pd = CALLOC(1, sizeof(*pd) + size_bytes + 1); - if(!pd) { - return NULL; - } - bytes = (void *)(((char *)pd) + sizeof(*pd)); - memcpy(bytes, data, size_bytes); - bytes[size_bytes] = 0; - pd->buffer = bytes; - pd->nboff = 0; - pd->nbits = size_bits; - - return pd; -} - - -char * -asn_bit_data_string(asn_bit_data_t *pd) { - static char buf[2][32]; - static int n; - n = (n+1) % 2; - snprintf(buf[n], sizeof(buf[n]), - "{m=%" ASN_PRI_SIZE " span %" ASN_PRI_SIZE "[%" ASN_PRI_SIZE - "..%" ASN_PRI_SIZE "] (%" ASN_PRI_SIZE ")}", - pd->moved, ((uintptr_t)(pd->buffer) & 0xf), pd->nboff, pd->nbits, - pd->nbits - pd->nboff); - return buf[n]; -} - -void -asn_get_undo(asn_bit_data_t *pd, int nbits) { - if((ssize_t)pd->nboff < nbits) { - assert((ssize_t)pd->nboff < nbits); - } else { - pd->nboff -= nbits; - pd->moved -= nbits; - } -} - -/* - * Extract a small number of bits (<= 31) from the specified PER data pointer. - */ -int32_t -asn_get_few_bits(asn_bit_data_t *pd, int nbits) { - size_t off; /* Next after last bit offset */ - ssize_t nleft; /* Number of bits left in this stream */ - uint32_t accum; - const uint8_t *buf; - - if(nbits < 0) - return -1; - - nleft = pd->nbits - pd->nboff; - if(nbits > nleft) { - int32_t tailv, vhead; - if(!pd->refill || nbits > 31) return -1; - /* Accumulate unused bytes before refill */ - ASN_DEBUG("Obtain the rest %d bits (want %d)", - (int)nleft, (int)nbits); - tailv = asn_get_few_bits(pd, nleft); - if(tailv < 0) return -1; - /* Refill (replace pd contents with new data) */ - if(pd->refill(pd)) - return -1; - nbits -= nleft; - vhead = asn_get_few_bits(pd, nbits); - /* Combine the rest of previous pd with the head of new one */ - tailv = (tailv << nbits) | vhead; /* Could == -1 */ - return tailv; - } - - /* - * Normalize position indicator. - */ - if(pd->nboff >= 8) { - pd->buffer += (pd->nboff >> 3); - pd->nbits -= (pd->nboff & ~0x07); - pd->nboff &= 0x07; - } - pd->moved += nbits; - pd->nboff += nbits; - off = pd->nboff; - buf = pd->buffer; - - /* - * Extract specified number of bits. - */ - if(off <= 8) - accum = nbits ? (buf[0]) >> (8 - off) : 0; - else if(off <= 16) - accum = ((buf[0] << 8) + buf[1]) >> (16 - off); - else if(off <= 24) - accum = ((buf[0] << 16) + (buf[1] << 8) + buf[2]) >> (24 - off); - else if(off <= 31) - accum = (((uint32_t)buf[0] << 24) + (buf[1] << 16) - + (buf[2] << 8) + (buf[3])) >> (32 - off); - else if(nbits <= 31) { - asn_bit_data_t tpd = *pd; - /* Here are we with our 31-bits limit plus 1..7 bits offset. */ - asn_get_undo(&tpd, nbits); - /* The number of available bits in the stream allow - * for the following operations to take place without - * invoking the ->refill() function */ - accum = asn_get_few_bits(&tpd, nbits - 24) << 24; - accum |= asn_get_few_bits(&tpd, 24); - } else { - asn_get_undo(pd, nbits); - return -1; - } - - accum &= (((uint32_t)1 << nbits) - 1); - - ASN_DEBUG(" [PER got %2d<=%2d bits => span %d %+ld[%d..%d]:%02x (%d) => 0x%x]", - (int)nbits, (int)nleft, - (int)pd->moved, - (((long)pd->buffer) & 0xf), - (int)pd->nboff, (int)pd->nbits, - ((pd->buffer != NULL)?pd->buffer[0]:0), - (int)(pd->nbits - pd->nboff), - (int)accum); - - return accum; -} - -/* - * Extract a large number of bits from the specified PER data pointer. - */ -int -asn_get_many_bits(asn_bit_data_t *pd, uint8_t *dst, int alright, int nbits) { - int32_t value; - - if(alright && (nbits & 7)) { - /* Perform right alignment of a first few bits */ - value = asn_get_few_bits(pd, nbits & 0x07); - if(value < 0) return -1; - *dst++ = value; /* value is already right-aligned */ - nbits &= ~7; - } - - while(nbits) { - if(nbits >= 24) { - value = asn_get_few_bits(pd, 24); - if(value < 0) return -1; - *(dst++) = value >> 16; - *(dst++) = value >> 8; - *(dst++) = value; - nbits -= 24; - } else { - value = asn_get_few_bits(pd, nbits); - if(value < 0) return -1; - if(nbits & 7) { /* implies left alignment */ - value <<= 8 - (nbits & 7), - nbits += 8 - (nbits & 7); - if(nbits > 24) - *dst++ = value >> 24; - } - if(nbits > 16) - *dst++ = value >> 16; - if(nbits > 8) - *dst++ = value >> 8; - *dst++ = value; - break; - } - } - - return 0; -} - -/* - * Put a small number of bits (<= 31). - */ -int -asn_put_few_bits(asn_bit_outp_t *po, uint32_t bits, int obits) { - size_t off; /* Next after last bit offset */ - size_t omsk; /* Existing last byte meaningful bits mask */ - uint8_t *buf; - - if(obits <= 0 || obits >= 32) return obits ? -1 : 0; - - ASN_DEBUG("[PER put %d bits %x to %p+%d bits]", - obits, (int)bits, (void *)po->buffer, (int)po->nboff); - - /* - * Normalize position indicator. - */ - if(po->nboff >= 8) { - po->buffer += (po->nboff >> 3); - po->nbits -= (po->nboff & ~0x07); - po->nboff &= 0x07; - } - - /* - * Flush whole-bytes output, if necessary. - */ - if(po->nboff + obits > po->nbits) { - size_t complete_bytes; - if(!po->buffer) po->buffer = po->tmpspace; - complete_bytes = (po->buffer - po->tmpspace); - ASN_DEBUG("[PER output %ld complete + %ld]", - (long)complete_bytes, (long)po->flushed_bytes); - if(po->output(po->tmpspace, complete_bytes, po->op_key) < 0) - return -1; - if(po->nboff) - po->tmpspace[0] = po->buffer[0]; - po->buffer = po->tmpspace; - po->nbits = 8 * sizeof(po->tmpspace); - po->flushed_bytes += complete_bytes; - } - - /* - * Now, due to sizeof(tmpspace), we are guaranteed large enough space. - */ - buf = po->buffer; - omsk = ~((1 << (8 - po->nboff)) - 1); - off = (po->nboff + obits); - - /* Clear data of debris before meaningful bits */ - bits &= (((uint32_t)1 << obits) - 1); - - ASN_DEBUG("[PER out %d %u/%x (t=%d,o=%d) %x&%x=%x]", obits, - (int)bits, (int)bits, - (int)po->nboff, (int)off, - buf[0], (int)(omsk&0xff), - (int)(buf[0] & omsk)); - - if(off <= 8) /* Completely within 1 byte */ - po->nboff = off, - bits <<= (8 - off), - buf[0] = (buf[0] & omsk) | bits; - else if(off <= 16) - po->nboff = off, - bits <<= (16 - off), - buf[0] = (buf[0] & omsk) | (bits >> 8), - buf[1] = bits; - else if(off <= 24) - po->nboff = off, - bits <<= (24 - off), - buf[0] = (buf[0] & omsk) | (bits >> 16), - buf[1] = bits >> 8, - buf[2] = bits; - else if(off <= 31) - po->nboff = off, - bits <<= (32 - off), - buf[0] = (buf[0] & omsk) | (bits >> 24), - buf[1] = bits >> 16, - buf[2] = bits >> 8, - buf[3] = bits; - else { - if(asn_put_few_bits(po, bits >> (obits - 24), 24)) return -1; - if(asn_put_few_bits(po, bits, obits - 24)) return -1; - } - - ASN_DEBUG("[PER out %u/%x => %02x buf+%ld]", - (int)bits, (int)bits, buf[0], - (long)(po->buffer - po->tmpspace)); - - return 0; -} - - -/* - * Output a large number of bits. - */ -int -asn_put_many_bits(asn_bit_outp_t *po, const uint8_t *src, int nbits) { - - while(nbits) { - uint32_t value; - - if(nbits >= 24) { - value = (src[0] << 16) | (src[1] << 8) | src[2]; - src += 3; - nbits -= 24; - if(asn_put_few_bits(po, value, 24)) - return -1; - } else { - value = src[0]; - if(nbits > 8) - value = (value << 8) | src[1]; - if(nbits > 16) - value = (value << 8) | src[2]; - if(nbits & 0x07) - value >>= (8 - (nbits & 0x07)); - if(asn_put_few_bits(po, value, nbits)) - return -1; - break; - } - } - - return 0; -} - - -int -asn_put_aligned_flush(asn_bit_outp_t *po) { - uint32_t unused_bits = (0x7 & (8 - (po->nboff & 0x07))); - size_t complete_bytes = - (po->buffer ? po->buffer - po->tmpspace : 0) + ((po->nboff + 7) >> 3); - - if(unused_bits) { - po->buffer[po->nboff >> 3] &= ~0u << unused_bits; - } - - if(po->output(po->tmpspace, complete_bytes, po->op_key) < 0) { - return -1; - } else { - po->buffer = po->tmpspace; - po->nboff = 0; - po->nbits = 8 * sizeof(po->tmpspace); - po->flushed_bytes += complete_bytes; - return 0; - } -} - +/* + * Copyright (c) 2005-2017 Lev Walkin . + * All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include +#include + +/* + * Create a contiguous non-refillable bit data structure. + * Can be freed by FREEMEM(). + */ +asn_bit_data_t * +asn_bit_data_new_contiguous(const void *data, size_t size_bits) { + size_t size_bytes = (size_bits + 7) / 8; + asn_bit_data_t *pd; + uint8_t *bytes; + + /* Get the extensions map */ + pd = CALLOC(1, sizeof(*pd) + size_bytes + 1); + if(!pd) { + return NULL; + } + bytes = (void *)(((char *)pd) + sizeof(*pd)); + memcpy(bytes, data, size_bytes); + bytes[size_bytes] = 0; + pd->buffer = bytes; + pd->nboff = 0; + pd->nbits = size_bits; + + return pd; +} + + +char * +asn_bit_data_string(asn_bit_data_t *pd) { + static char buf[2][32]; + static int n; + n = (n+1) % 2; + snprintf(buf[n], sizeof(buf[n]), + "{m=%" ASN_PRI_SIZE " span %" ASN_PRI_SIZE "[%" ASN_PRI_SIZE + "..%" ASN_PRI_SIZE "] (%" ASN_PRI_SIZE ")}", + pd->moved, ((uintptr_t)(pd->buffer) & 0xf), pd->nboff, pd->nbits, + pd->nbits - pd->nboff); + return buf[n]; +} + +void +asn_get_undo(asn_bit_data_t *pd, int nbits) { + if((ssize_t)pd->nboff < nbits) { + assert((ssize_t)pd->nboff < nbits); + } else { + pd->nboff -= nbits; + pd->moved -= nbits; + } +} + +/* + * Extract a small number of bits (<= 31) from the specified PER data pointer. + */ +int32_t +asn_get_few_bits(asn_bit_data_t *pd, int nbits) { + size_t off; /* Next after last bit offset */ + ssize_t nleft; /* Number of bits left in this stream */ + uint32_t accum; + const uint8_t *buf; + + if(nbits < 0) + return -1; + + nleft = pd->nbits - pd->nboff; + if(nbits > nleft) { + int32_t tailv, vhead; + if(!pd->refill || nbits > 31) return -1; + /* Accumulate unused bytes before refill */ + ASN_DEBUG("Obtain the rest %d bits (want %d)", + (int)nleft, (int)nbits); + tailv = asn_get_few_bits(pd, nleft); + if(tailv < 0) return -1; + /* Refill (replace pd contents with new data) */ + if(pd->refill(pd)) + return -1; + nbits -= nleft; + vhead = asn_get_few_bits(pd, nbits); + /* Combine the rest of previous pd with the head of new one */ + tailv = (tailv << nbits) | vhead; /* Could == -1 */ + return tailv; + } + + /* + * Normalize position indicator. + */ + if(pd->nboff >= 8) { + pd->buffer += (pd->nboff >> 3); + pd->nbits -= (pd->nboff & ~0x07); + pd->nboff &= 0x07; + } + pd->moved += nbits; + pd->nboff += nbits; + off = pd->nboff; + buf = pd->buffer; + + /* + * Extract specified number of bits. + */ + if(off <= 8) + accum = nbits ? (buf[0]) >> (8 - off) : 0; + else if(off <= 16) + accum = ((buf[0] << 8) + buf[1]) >> (16 - off); + else if(off <= 24) + accum = ((buf[0] << 16) + (buf[1] << 8) + buf[2]) >> (24 - off); + else if(off <= 31) + accum = (((uint32_t)buf[0] << 24) + (buf[1] << 16) + + (buf[2] << 8) + (buf[3])) >> (32 - off); + else if(nbits <= 31) { + asn_bit_data_t tpd = *pd; + /* Here are we with our 31-bits limit plus 1..7 bits offset. */ + asn_get_undo(&tpd, nbits); + /* The number of available bits in the stream allow + * for the following operations to take place without + * invoking the ->refill() function */ + accum = asn_get_few_bits(&tpd, nbits - 24) << 24; + accum |= asn_get_few_bits(&tpd, 24); + } else { + asn_get_undo(pd, nbits); + return -1; + } + + accum &= (((uint32_t)1 << nbits) - 1); + + ASN_DEBUG(" [PER got %2d<=%2d bits => span %d %+ld[%d..%d]:%02x (%d) => 0x%x]", + (int)nbits, (int)nleft, + (int)pd->moved, + (((long)pd->buffer) & 0xf), + (int)pd->nboff, (int)pd->nbits, + ((pd->buffer != NULL)?pd->buffer[0]:0), + (int)(pd->nbits - pd->nboff), + (int)accum); + + return accum; +} + +/* + * Extract a large number of bits from the specified PER data pointer. + */ +int +asn_get_many_bits(asn_bit_data_t *pd, uint8_t *dst, int alright, int nbits) { + int32_t value; + + if(alright && (nbits & 7)) { + /* Perform right alignment of a first few bits */ + value = asn_get_few_bits(pd, nbits & 0x07); + if(value < 0) return -1; + *dst++ = value; /* value is already right-aligned */ + nbits &= ~7; + } + + while(nbits) { + if(nbits >= 24) { + value = asn_get_few_bits(pd, 24); + if(value < 0) return -1; + *(dst++) = value >> 16; + *(dst++) = value >> 8; + *(dst++) = value; + nbits -= 24; + } else { + value = asn_get_few_bits(pd, nbits); + if(value < 0) return -1; + if(nbits & 7) { /* implies left alignment */ + value <<= 8 - (nbits & 7), + nbits += 8 - (nbits & 7); + if(nbits > 24) + *dst++ = value >> 24; + } + if(nbits > 16) + *dst++ = value >> 16; + if(nbits > 8) + *dst++ = value >> 8; + *dst++ = value; + break; + } + } + + return 0; +} + +/* + * Put a small number of bits (<= 31). + */ +int +asn_put_few_bits(asn_bit_outp_t *po, uint32_t bits, int obits) { + size_t off; /* Next after last bit offset */ + size_t omsk; /* Existing last byte meaningful bits mask */ + uint8_t *buf; + + if(obits <= 0 || obits >= 32) return obits ? -1 : 0; + + ASN_DEBUG("[PER put %d bits %x to %p+%d bits]", + obits, (int)bits, (void *)po->buffer, (int)po->nboff); + + /* + * Normalize position indicator. + */ + if(po->nboff >= 8) { + po->buffer += (po->nboff >> 3); + po->nbits -= (po->nboff & ~0x07); + po->nboff &= 0x07; + } + + /* + * Flush whole-bytes output, if necessary. + */ + if(po->nboff + obits > po->nbits) { + size_t complete_bytes; + if(!po->buffer) po->buffer = po->tmpspace; + complete_bytes = (po->buffer - po->tmpspace); + ASN_DEBUG("[PER output %ld complete + %ld]", + (long)complete_bytes, (long)po->flushed_bytes); + if(po->output(po->tmpspace, complete_bytes, po->op_key) < 0) + return -1; + if(po->nboff) + po->tmpspace[0] = po->buffer[0]; + po->buffer = po->tmpspace; + po->nbits = 8 * sizeof(po->tmpspace); + po->flushed_bytes += complete_bytes; + } + + /* + * Now, due to sizeof(tmpspace), we are guaranteed large enough space. + */ + buf = po->buffer; + omsk = ~((1 << (8 - po->nboff)) - 1); + off = (po->nboff + obits); + + /* Clear data of debris before meaningful bits */ + bits &= (((uint32_t)1 << obits) - 1); + + ASN_DEBUG("[PER out %d %u/%x (t=%d,o=%d) %x&%x=%x]", obits, + (int)bits, (int)bits, + (int)po->nboff, (int)off, + buf[0], (int)(omsk&0xff), + (int)(buf[0] & omsk)); + + if(off <= 8) /* Completely within 1 byte */ + po->nboff = off, + bits <<= (8 - off), + buf[0] = (buf[0] & omsk) | bits; + else if(off <= 16) + po->nboff = off, + bits <<= (16 - off), + buf[0] = (buf[0] & omsk) | (bits >> 8), + buf[1] = bits; + else if(off <= 24) + po->nboff = off, + bits <<= (24 - off), + buf[0] = (buf[0] & omsk) | (bits >> 16), + buf[1] = bits >> 8, + buf[2] = bits; + else if(off <= 31) + po->nboff = off, + bits <<= (32 - off), + buf[0] = (buf[0] & omsk) | (bits >> 24), + buf[1] = bits >> 16, + buf[2] = bits >> 8, + buf[3] = bits; + else { + if(asn_put_few_bits(po, bits >> (obits - 24), 24)) return -1; + if(asn_put_few_bits(po, bits, obits - 24)) return -1; + } + + ASN_DEBUG("[PER out %u/%x => %02x buf+%ld]", + (int)bits, (int)bits, buf[0], + (long)(po->buffer - po->tmpspace)); + + return 0; +} + + +/* + * Output a large number of bits. + */ +int +asn_put_many_bits(asn_bit_outp_t *po, const uint8_t *src, int nbits) { + + while(nbits) { + uint32_t value; + + if(nbits >= 24) { + value = (src[0] << 16) | (src[1] << 8) | src[2]; + src += 3; + nbits -= 24; + if(asn_put_few_bits(po, value, 24)) + return -1; + } else { + value = src[0]; + if(nbits > 8) + value = (value << 8) | src[1]; + if(nbits > 16) + value = (value << 8) | src[2]; + if(nbits & 0x07) + value >>= (8 - (nbits & 0x07)); + if(asn_put_few_bits(po, value, nbits)) + return -1; + break; + } + } + + return 0; +} + + +int +asn_put_aligned_flush(asn_bit_outp_t *po) { + uint32_t unused_bits = (0x7 & (8 - (po->nboff & 0x07))); + size_t complete_bytes = + (po->buffer ? po->buffer - po->tmpspace : 0) + ((po->nboff + 7) >> 3); + + if(unused_bits) { + po->buffer[po->nboff >> 3] &= ~0u << unused_bits; + } + + if(po->output(po->tmpspace, complete_bytes, po->op_key) < 0) { + return -1; + } else { + po->buffer = po->tmpspace; + po->nboff = 0; + po->nbits = 8 * sizeof(po->tmpspace); + po->flushed_bytes += complete_bytes; + return 0; + } +} + diff --git a/certgen/asncodec/asn_bit_data.h b/certgen/asncodec/asn_bit_data.h index f14714bbdbce39f06f230d90063ff8d0730a326a..c9e9a4e81d9ad96536673c944b501b19b8d8201d 100644 --- a/certgen/asncodec/asn_bit_data.h +++ b/certgen/asncodec/asn_bit_data.h @@ -1,83 +1,83 @@ -/* - * Copyright (c) 2005-2017 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#ifndef ASN_BIT_DATA -#define ASN_BIT_DATA - -#include /* Platform-specific types */ - -#ifdef __cplusplus -extern "C" { -#endif - -/* - * This structure describes a position inside an incoming PER bit stream. - */ -typedef struct asn_bit_data_s { - const uint8_t *buffer; /* Pointer to the octet stream */ - size_t nboff; /* Bit offset to the meaningful bit */ - size_t nbits; /* Number of bits in the stream */ - size_t moved; /* Number of bits moved through this bit stream */ - int (*refill)(struct asn_bit_data_s *); - void *refill_key; -} asn_bit_data_t; - -/* - * Create a contiguous non-refillable bit data structure. - * Can be freed by FREEMEM(). - */ -asn_bit_data_t *asn_bit_data_new_contiguous(const void *data, size_t size_bits); - -/* - * Extract a small number of bits (<= 31) from the specified PER data pointer. - * This function returns -1 if the specified number of bits could not be - * extracted due to EOD or other conditions. - */ -int32_t asn_get_few_bits(asn_bit_data_t *, int get_nbits); - -/* Undo the immediately preceding "get_few_bits" operation */ -void asn_get_undo(asn_bit_data_t *, int get_nbits); - -/* - * Extract a large number of bits from the specified PER data pointer. - * This function returns -1 if the specified number of bits could not be - * extracted due to EOD or other conditions. - */ -int asn_get_many_bits(asn_bit_data_t *, uint8_t *dst, int right_align, - int get_nbits); - -/* Non-thread-safe debugging function, don't use it */ -char *asn_bit_data_string(asn_bit_data_t *); - -/* - * This structure supports forming bit output. - */ -typedef struct asn_bit_outp_s { - uint8_t *buffer; /* Pointer into the (tmpspace) */ - size_t nboff; /* Bit offset to the meaningful bit */ - size_t nbits; /* Number of bits left in (tmpspace) */ - uint8_t tmpspace[32]; /* Preliminary storage to hold data */ - int (*output)(const void *data, size_t size, void *op_key); - void *op_key; /* Key for (output) data callback */ - size_t flushed_bytes; /* Bytes already flushed through (output) */ -} asn_bit_outp_t; - -/* Output a small number of bits (<= 31) */ -int asn_put_few_bits(asn_bit_outp_t *, uint32_t bits, int obits); - -/* Output a large number of bits */ -int asn_put_many_bits(asn_bit_outp_t *, const uint8_t *src, int put_nbits); - -/* - * Flush whole bytes (0 or more) through (outper) member. - * The least significant bits which are not used are guaranteed to be set to 0. - * Returns -1 if callback returns -1. Otherwise, 0. - */ -int asn_put_aligned_flush(asn_bit_outp_t *); - -#ifdef __cplusplus -} -#endif - -#endif /* ASN_BIT_DATA */ +/* + * Copyright (c) 2005-2017 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#ifndef ASN_BIT_DATA +#define ASN_BIT_DATA + +#include /* Platform-specific types */ + +#ifdef __cplusplus +extern "C" { +#endif + +/* + * This structure describes a position inside an incoming PER bit stream. + */ +typedef struct asn_bit_data_s { + const uint8_t *buffer; /* Pointer to the octet stream */ + size_t nboff; /* Bit offset to the meaningful bit */ + size_t nbits; /* Number of bits in the stream */ + size_t moved; /* Number of bits moved through this bit stream */ + int (*refill)(struct asn_bit_data_s *); + void *refill_key; +} asn_bit_data_t; + +/* + * Create a contiguous non-refillable bit data structure. + * Can be freed by FREEMEM(). + */ +asn_bit_data_t *asn_bit_data_new_contiguous(const void *data, size_t size_bits); + +/* + * Extract a small number of bits (<= 31) from the specified PER data pointer. + * This function returns -1 if the specified number of bits could not be + * extracted due to EOD or other conditions. + */ +int32_t asn_get_few_bits(asn_bit_data_t *, int get_nbits); + +/* Undo the immediately preceding "get_few_bits" operation */ +void asn_get_undo(asn_bit_data_t *, int get_nbits); + +/* + * Extract a large number of bits from the specified PER data pointer. + * This function returns -1 if the specified number of bits could not be + * extracted due to EOD or other conditions. + */ +int asn_get_many_bits(asn_bit_data_t *, uint8_t *dst, int right_align, + int get_nbits); + +/* Non-thread-safe debugging function, don't use it */ +char *asn_bit_data_string(asn_bit_data_t *); + +/* + * This structure supports forming bit output. + */ +typedef struct asn_bit_outp_s { + uint8_t *buffer; /* Pointer into the (tmpspace) */ + size_t nboff; /* Bit offset to the meaningful bit */ + size_t nbits; /* Number of bits left in (tmpspace) */ + uint8_t tmpspace[32]; /* Preliminary storage to hold data */ + int (*output)(const void *data, size_t size, void *op_key); + void *op_key; /* Key for (output) data callback */ + size_t flushed_bytes; /* Bytes already flushed through (output) */ +} asn_bit_outp_t; + +/* Output a small number of bits (<= 31) */ +int asn_put_few_bits(asn_bit_outp_t *, uint32_t bits, int obits); + +/* Output a large number of bits */ +int asn_put_many_bits(asn_bit_outp_t *, const uint8_t *src, int put_nbits); + +/* + * Flush whole bytes (0 or more) through (outper) member. + * The least significant bits which are not used are guaranteed to be set to 0. + * Returns -1 if callback returns -1. Otherwise, 0. + */ +int asn_put_aligned_flush(asn_bit_outp_t *); + +#ifdef __cplusplus +} +#endif + +#endif /* ASN_BIT_DATA */ diff --git a/certgen/asncodec/asn_codecs.h b/certgen/asncodec/asn_codecs.h index e75c2709cd956507df15791c7b602996fbced9a8..5a6d9f79232e8b32062949d63d8e7e81055124a1 100644 --- a/certgen/asncodec/asn_codecs.h +++ b/certgen/asncodec/asn_codecs.h @@ -1,108 +1,108 @@ -/* - * Copyright (c) 2003-2017 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#ifndef ASN_CODECS_H -#define ASN_CODECS_H - -#ifdef __cplusplus -extern "C" { -#endif - -struct asn_TYPE_descriptor_s; /* Forward declaration */ - -/* - * This structure defines a set of parameters that may be passed - * to every ASN.1 encoder or decoder function. - * WARNING: if max_stack_size member is set, and you are calling the - * function pointers of the asn_TYPE_descriptor_t directly, - * this structure must be ALLOCATED ON THE STACK! - * If you can't always satisfy this requirement, use ber_decode(), - * xer_decode() and uper_decode() functions instead. - */ -typedef struct asn_codec_ctx_s { - /* - * Limit the decoder routines to use no (much) more stack than a given - * number of bytes. Most of decoders are stack-based, and this - * would protect against stack overflows if the number of nested - * encodings is high. - * The OCTET STRING, BIT STRING and ANY BER decoders are heap-based, - * and are safe from this kind of overflow. - * A value from getrlimit(RLIMIT_STACK) may be used to initialize - * this variable. Be careful in multithreaded environments, as the - * stack size is rather limited. - */ - size_t max_stack_size; /* 0 disables stack bounds checking */ -} asn_codec_ctx_t; - -/* - * Type of the return value of the encoding functions (der_encode, xer_encode). - */ -typedef struct asn_enc_rval_s { - /* - * Number of bytes encoded. - * -1 indicates failure to encode the structure. - * In this case, the members below this one are meaningful. - */ - ssize_t encoded; - - /* - * Members meaningful when (encoded == -1), for post mortem analysis. - */ - - /* Type which cannot be encoded */ - const struct asn_TYPE_descriptor_s *failed_type; - - /* Pointer to the structure of that type */ - const void *structure_ptr; -} asn_enc_rval_t; -#define ASN__ENCODE_FAILED do { \ - asn_enc_rval_t tmp_error; \ - tmp_error.encoded = -1; \ - tmp_error.failed_type = td; \ - tmp_error.structure_ptr = sptr; \ - ASN_DEBUG("Failed to encode element %s", td ? td->name : ""); \ - return tmp_error; \ -} while(0) -#define ASN__ENCODED_OK(rval) do { \ - rval.structure_ptr = 0; \ - rval.failed_type = 0; \ - return rval; \ -} while(0) - -/* - * Type of the return value of the decoding functions (ber_decode, xer_decode) - * - * Please note that the number of consumed bytes is ALWAYS meaningful, - * even if code==RC_FAIL. This is to indicate the number of successfully - * decoded bytes, hence providing a possibility to fail with more diagnostics - * (i.e., print the offending remainder of the buffer). - */ -enum asn_dec_rval_code_e { - RC_OK, /* Decoded successfully */ - RC_WMORE, /* More data expected, call again */ - RC_FAIL /* Failure to decode data */ -}; -typedef struct asn_dec_rval_s { - enum asn_dec_rval_code_e code; /* Result code */ - size_t consumed; /* Number of bytes consumed */ -} asn_dec_rval_t; -#define ASN__DECODE_FAILED do { \ - asn_dec_rval_t tmp_error; \ - tmp_error.code = RC_FAIL; \ - tmp_error.consumed = 0; \ - ASN_DEBUG("Failed to decode element %s", td ? td->name : ""); \ - return tmp_error; \ -} while(0) -#define ASN__DECODE_STARVED do { \ - asn_dec_rval_t tmp_error; \ - tmp_error.code = RC_WMORE; \ - tmp_error.consumed = 0; \ - return tmp_error; \ -} while(0) - -#ifdef __cplusplus -} -#endif - -#endif /* ASN_CODECS_H */ +/* + * Copyright (c) 2003-2017 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#ifndef ASN_CODECS_H +#define ASN_CODECS_H + +#ifdef __cplusplus +extern "C" { +#endif + +struct asn_TYPE_descriptor_s; /* Forward declaration */ + +/* + * This structure defines a set of parameters that may be passed + * to every ASN.1 encoder or decoder function. + * WARNING: if max_stack_size member is set, and you are calling the + * function pointers of the asn_TYPE_descriptor_t directly, + * this structure must be ALLOCATED ON THE STACK! + * If you can't always satisfy this requirement, use ber_decode(), + * xer_decode() and uper_decode() functions instead. + */ +typedef struct asn_codec_ctx_s { + /* + * Limit the decoder routines to use no (much) more stack than a given + * number of bytes. Most of decoders are stack-based, and this + * would protect against stack overflows if the number of nested + * encodings is high. + * The OCTET STRING, BIT STRING and ANY BER decoders are heap-based, + * and are safe from this kind of overflow. + * A value from getrlimit(RLIMIT_STACK) may be used to initialize + * this variable. Be careful in multithreaded environments, as the + * stack size is rather limited. + */ + size_t max_stack_size; /* 0 disables stack bounds checking */ +} asn_codec_ctx_t; + +/* + * Type of the return value of the encoding functions (der_encode, xer_encode). + */ +typedef struct asn_enc_rval_s { + /* + * Number of bytes encoded. + * -1 indicates failure to encode the structure. + * In this case, the members below this one are meaningful. + */ + ssize_t encoded; + + /* + * Members meaningful when (encoded == -1), for post mortem analysis. + */ + + /* Type which cannot be encoded */ + const struct asn_TYPE_descriptor_s *failed_type; + + /* Pointer to the structure of that type */ + const void *structure_ptr; +} asn_enc_rval_t; +#define ASN__ENCODE_FAILED do { \ + asn_enc_rval_t tmp_error; \ + tmp_error.encoded = -1; \ + tmp_error.failed_type = td; \ + tmp_error.structure_ptr = sptr; \ + ASN_DEBUG("Failed to encode element %s", td ? td->name : ""); \ + return tmp_error; \ +} while(0) +#define ASN__ENCODED_OK(rval) do { \ + rval.structure_ptr = 0; \ + rval.failed_type = 0; \ + return rval; \ +} while(0) + +/* + * Type of the return value of the decoding functions (ber_decode, xer_decode) + * + * Please note that the number of consumed bytes is ALWAYS meaningful, + * even if code==RC_FAIL. This is to indicate the number of successfully + * decoded bytes, hence providing a possibility to fail with more diagnostics + * (i.e., print the offending remainder of the buffer). + */ +enum asn_dec_rval_code_e { + RC_OK, /* Decoded successfully */ + RC_WMORE, /* More data expected, call again */ + RC_FAIL /* Failure to decode data */ +}; +typedef struct asn_dec_rval_s { + enum asn_dec_rval_code_e code; /* Result code */ + size_t consumed; /* Number of bytes consumed */ +} asn_dec_rval_t; +#define ASN__DECODE_FAILED do { \ + asn_dec_rval_t tmp_error; \ + tmp_error.code = RC_FAIL; \ + tmp_error.consumed = 0; \ + ASN_DEBUG("Failed to decode element %s", td ? td->name : ""); \ + return tmp_error; \ +} while(0) +#define ASN__DECODE_STARVED do { \ + asn_dec_rval_t tmp_error; \ + tmp_error.code = RC_WMORE; \ + tmp_error.consumed = 0; \ + return tmp_error; \ +} while(0) + +#ifdef __cplusplus +} +#endif + +#endif /* ASN_CODECS_H */ diff --git a/certgen/asncodec/asn_codecs_prim.c b/certgen/asncodec/asn_codecs_prim.c index f3fdbfd2beff1d5f9f7845ea3426e91cef1b986e..c915df186d692f854f7d011b2227bc9a614d8e83 100644 --- a/certgen/asncodec/asn_codecs_prim.c +++ b/certgen/asncodec/asn_codecs_prim.c @@ -1,31 +1,31 @@ -/*- - * Copyright (c) 2003, 2004 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include - -void -ASN__PRIMITIVE_TYPE_free(const asn_TYPE_descriptor_t *td, void *sptr, - enum asn_struct_free_method method) { - ASN__PRIMITIVE_TYPE_t *st = (ASN__PRIMITIVE_TYPE_t *)sptr; - - if(!td || !sptr) - return; - - ASN_DEBUG("Freeing %s as a primitive type", td->name); - - if(st->buf) - FREEMEM(st->buf); - - switch(method) { - case ASFM_FREE_EVERYTHING: - FREEMEM(sptr); - break; - case ASFM_FREE_UNDERLYING: - break; - case ASFM_FREE_UNDERLYING_AND_RESET: - memset(sptr, 0, sizeof(ASN__PRIMITIVE_TYPE_t)); - break; - } -} +/*- + * Copyright (c) 2003, 2004 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include + +void +ASN__PRIMITIVE_TYPE_free(const asn_TYPE_descriptor_t *td, void *sptr, + enum asn_struct_free_method method) { + ASN__PRIMITIVE_TYPE_t *st = (ASN__PRIMITIVE_TYPE_t *)sptr; + + if(!td || !sptr) + return; + + ASN_DEBUG("Freeing %s as a primitive type", td->name); + + if(st->buf) + FREEMEM(st->buf); + + switch(method) { + case ASFM_FREE_EVERYTHING: + FREEMEM(sptr); + break; + case ASFM_FREE_UNDERLYING: + break; + case ASFM_FREE_UNDERLYING_AND_RESET: + memset(sptr, 0, sizeof(ASN__PRIMITIVE_TYPE_t)); + break; + } +} diff --git a/certgen/asncodec/asn_codecs_prim.h b/certgen/asncodec/asn_codecs_prim.h index 5bbd9cfbc8bcddb805406659bdc5a60521d07dc4..71f193faeb9fcf281f7a0035413e0601160da1ec 100644 --- a/certgen/asncodec/asn_codecs_prim.h +++ b/certgen/asncodec/asn_codecs_prim.h @@ -1,56 +1,56 @@ -/*- - * Copyright (c) 2004-2017 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#ifndef ASN_CODECS_PRIM_H -#define ASN_CODECS_PRIM_H - -#include - -#ifdef __cplusplus -extern "C" { -#endif - -typedef struct ASN__PRIMITIVE_TYPE_s { - uint8_t *buf; /* Buffer with consecutive primitive encoding bytes */ - size_t size; /* Size of the buffer */ -} ASN__PRIMITIVE_TYPE_t; /* Do not use this type directly! */ - -asn_struct_free_f ASN__PRIMITIVE_TYPE_free; - -#if !defined(ASN_DISABLE_BER_SUPPORT) -ber_type_decoder_f ber_decode_primitive; -der_type_encoder_f der_encode_primitive; -#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ - -#if !defined(ASN_DISABLE_XER_SUPPORT) -/* - * A callback specification for the xer_decode_primitive() function below. - */ -enum xer_pbd_rval { - XPBD_SYSTEM_FAILURE, /* System failure (memory shortage, etc) */ - XPBD_DECODER_LIMIT, /* Hit some decoder limitation or deficiency */ - XPBD_BROKEN_ENCODING, /* Encoding of a primitive body is broken */ - XPBD_NOT_BODY_IGNORE, /* Not a body format, but safe to ignore */ - XPBD_BODY_CONSUMED /* Body is recognized and consumed */ -}; -typedef enum xer_pbd_rval(xer_primitive_body_decoder_f)( - const asn_TYPE_descriptor_t *td, void *struct_ptr, const void *chunk_buf, - size_t chunk_size); - -/* - * Specific function to decode simple primitive types. - * Also see xer_decode_general() in xer_decoder.h - */ -asn_dec_rval_t xer_decode_primitive( - const asn_codec_ctx_t *opt_codec_ctx, - const asn_TYPE_descriptor_t *type_descriptor, void **struct_ptr, - size_t struct_size, const char *opt_mname, const void *buf_ptr, size_t size, - xer_primitive_body_decoder_f *prim_body_decoder); -#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ - -#ifdef __cplusplus -} -#endif - -#endif /* ASN_CODECS_PRIM_H */ +/*- + * Copyright (c) 2004-2017 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#ifndef ASN_CODECS_PRIM_H +#define ASN_CODECS_PRIM_H + +#include + +#ifdef __cplusplus +extern "C" { +#endif + +typedef struct ASN__PRIMITIVE_TYPE_s { + uint8_t *buf; /* Buffer with consecutive primitive encoding bytes */ + size_t size; /* Size of the buffer */ +} ASN__PRIMITIVE_TYPE_t; /* Do not use this type directly! */ + +asn_struct_free_f ASN__PRIMITIVE_TYPE_free; + +#if !defined(ASN_DISABLE_BER_SUPPORT) +ber_type_decoder_f ber_decode_primitive; +der_type_encoder_f der_encode_primitive; +#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ + +#if !defined(ASN_DISABLE_XER_SUPPORT) +/* + * A callback specification for the xer_decode_primitive() function below. + */ +enum xer_pbd_rval { + XPBD_SYSTEM_FAILURE, /* System failure (memory shortage, etc) */ + XPBD_DECODER_LIMIT, /* Hit some decoder limitation or deficiency */ + XPBD_BROKEN_ENCODING, /* Encoding of a primitive body is broken */ + XPBD_NOT_BODY_IGNORE, /* Not a body format, but safe to ignore */ + XPBD_BODY_CONSUMED /* Body is recognized and consumed */ +}; +typedef enum xer_pbd_rval(xer_primitive_body_decoder_f)( + const asn_TYPE_descriptor_t *td, void *struct_ptr, const void *chunk_buf, + size_t chunk_size); + +/* + * Specific function to decode simple primitive types. + * Also see xer_decode_general() in xer_decoder.h + */ +asn_dec_rval_t xer_decode_primitive( + const asn_codec_ctx_t *opt_codec_ctx, + const asn_TYPE_descriptor_t *type_descriptor, void **struct_ptr, + size_t struct_size, const char *opt_mname, const void *buf_ptr, size_t size, + xer_primitive_body_decoder_f *prim_body_decoder); +#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ + +#ifdef __cplusplus +} +#endif + +#endif /* ASN_CODECS_PRIM_H */ diff --git a/certgen/asncodec/asn_codecs_prim_xer.c b/certgen/asncodec/asn_codecs_prim_xer.c index 70c91bc26dbf0b2c42b671fa9637f3e90c45cb1a..adb7085c9e10a45c1d0a4fde664b2764aab19e02 100644 --- a/certgen/asncodec/asn_codecs_prim_xer.c +++ b/certgen/asncodec/asn_codecs_prim_xer.c @@ -1,184 +1,184 @@ -/* - * Copyright (c) 2017 Lev Walkin . - * All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include - -/* - * Local internal type passed around as an argument. - */ -struct xdp_arg_s { - const asn_TYPE_descriptor_t *type_descriptor; - void *struct_key; - xer_primitive_body_decoder_f *prim_body_decoder; - int decoded_something; - int want_more; -}; - -/* - * Since some kinds of primitive values can be encoded using value-specific - * tags (, , etc), the primitive decoder must - * be supplied with such tags to parse them as needed. - */ -static int -xer_decode__unexpected_tag(void *key, const void *chunk_buf, size_t chunk_size) { - struct xdp_arg_s *arg = (struct xdp_arg_s *)key; - enum xer_pbd_rval bret; - - /* - * The chunk_buf is guaranteed to start at '<'. - */ - assert(chunk_size && ((const char *)chunk_buf)[0] == 0x3c); - - /* - * Decoding was performed once already. Prohibit doing it again. - */ - if(arg->decoded_something) - return -1; - - bret = arg->prim_body_decoder(arg->type_descriptor, - arg->struct_key, chunk_buf, - chunk_size); - switch(bret) { - case XPBD_SYSTEM_FAILURE: - case XPBD_DECODER_LIMIT: - case XPBD_BROKEN_ENCODING: - break; - case XPBD_BODY_CONSUMED: - /* Tag decoded successfully */ - arg->decoded_something = 1; - /* Fall through */ - case XPBD_NOT_BODY_IGNORE: /* Safe to proceed further */ - return 0; - } - - return -1; -} - -static ssize_t -xer_decode__primitive_body(void *key, const void *chunk_buf, size_t chunk_size, int have_more) { - struct xdp_arg_s *arg = (struct xdp_arg_s *)key; - enum xer_pbd_rval bret; - size_t lead_wsp_size; - - if(arg->decoded_something) { - if(xer_whitespace_span(chunk_buf, chunk_size) == chunk_size) { - /* - * Example: - * "123 " - * ^- chunk_buf position. - */ - return chunk_size; - } - /* - * Decoding was done once already. Prohibit doing it again. - */ - return -1; - } - - if(!have_more) { - /* - * If we've received something like "1", we can't really - * tell whether it is really `1` or `123`, until we know - * that there is no more data coming. - * The have_more argument will be set to 1 once something - * like this is available to the caller of this callback: - * "1want_more = 1; - return -1; - } - - lead_wsp_size = xer_whitespace_span(chunk_buf, chunk_size); - chunk_buf = (chunk_buf == NULL)? NULL : ((const char *)chunk_buf + lead_wsp_size); - chunk_size -= lead_wsp_size; - - bret = arg->prim_body_decoder(arg->type_descriptor, - arg->struct_key, chunk_buf, - chunk_size); - switch(bret) { - case XPBD_SYSTEM_FAILURE: - case XPBD_DECODER_LIMIT: - case XPBD_BROKEN_ENCODING: - break; - case XPBD_BODY_CONSUMED: - /* Tag decoded successfully */ - arg->decoded_something = 1; - /* Fall through */ - case XPBD_NOT_BODY_IGNORE: /* Safe to proceed further */ - return lead_wsp_size + chunk_size; - } - - return -1; -} - -asn_dec_rval_t -xer_decode_primitive(const asn_codec_ctx_t *opt_codec_ctx, - const asn_TYPE_descriptor_t *td, void **sptr, - size_t struct_size, const char *opt_mname, - const void *buf_ptr, size_t size, - xer_primitive_body_decoder_f *prim_body_decoder) { - const char *xml_tag = opt_mname ? opt_mname : td->xml_tag; - asn_struct_ctx_t s_ctx; - struct xdp_arg_s s_arg; - asn_dec_rval_t rc; - - /* - * Create the structure if does not exist. - */ - if(!*sptr) { - *sptr = CALLOC(1, struct_size); - if(!*sptr) ASN__DECODE_FAILED; - } - - memset(&s_ctx, 0, sizeof(s_ctx)); - s_arg.type_descriptor = td; - s_arg.struct_key = *sptr; - s_arg.prim_body_decoder = prim_body_decoder; - s_arg.decoded_something = 0; - s_arg.want_more = 0; - - rc = xer_decode_general(opt_codec_ctx, &s_ctx, &s_arg, - xml_tag, buf_ptr, size, - xer_decode__unexpected_tag, - xer_decode__primitive_body); - switch(rc.code) { - case RC_OK: - if(!s_arg.decoded_something) { - char ch; - ASN_DEBUG("Primitive body is not recognized, " - "supplying empty one"); - /* - * Decoding opportunity has come and gone. - * Where's the result? - * Try to feed with empty body, see if it eats it. - */ - if(prim_body_decoder(s_arg.type_descriptor, - s_arg.struct_key, &ch, 0) - != XPBD_BODY_CONSUMED) { - /* - * This decoder does not like empty stuff. - */ - ASN__DECODE_FAILED; - } - } - break; - case RC_WMORE: - /* - * Redo the whole thing later. - * We don't have a context to save intermediate parsing state. - */ - rc.consumed = 0; - break; - case RC_FAIL: - rc.consumed = 0; - if(s_arg.want_more) - rc.code = RC_WMORE; - else - ASN__DECODE_FAILED; - break; - } - return rc; -} +/* + * Copyright (c) 2017 Lev Walkin . + * All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include + +/* + * Local internal type passed around as an argument. + */ +struct xdp_arg_s { + const asn_TYPE_descriptor_t *type_descriptor; + void *struct_key; + xer_primitive_body_decoder_f *prim_body_decoder; + int decoded_something; + int want_more; +}; + +/* + * Since some kinds of primitive values can be encoded using value-specific + * tags (, , etc), the primitive decoder must + * be supplied with such tags to parse them as needed. + */ +static int +xer_decode__unexpected_tag(void *key, const void *chunk_buf, size_t chunk_size) { + struct xdp_arg_s *arg = (struct xdp_arg_s *)key; + enum xer_pbd_rval bret; + + /* + * The chunk_buf is guaranteed to start at '<'. + */ + assert(chunk_size && ((const char *)chunk_buf)[0] == 0x3c); + + /* + * Decoding was performed once already. Prohibit doing it again. + */ + if(arg->decoded_something) + return -1; + + bret = arg->prim_body_decoder(arg->type_descriptor, + arg->struct_key, chunk_buf, + chunk_size); + switch(bret) { + case XPBD_SYSTEM_FAILURE: + case XPBD_DECODER_LIMIT: + case XPBD_BROKEN_ENCODING: + break; + case XPBD_BODY_CONSUMED: + /* Tag decoded successfully */ + arg->decoded_something = 1; + /* Fall through */ + case XPBD_NOT_BODY_IGNORE: /* Safe to proceed further */ + return 0; + } + + return -1; +} + +static ssize_t +xer_decode__primitive_body(void *key, const void *chunk_buf, size_t chunk_size, int have_more) { + struct xdp_arg_s *arg = (struct xdp_arg_s *)key; + enum xer_pbd_rval bret; + size_t lead_wsp_size; + + if(arg->decoded_something) { + if(xer_whitespace_span(chunk_buf, chunk_size) == chunk_size) { + /* + * Example: + * "123 " + * ^- chunk_buf position. + */ + return chunk_size; + } + /* + * Decoding was done once already. Prohibit doing it again. + */ + return -1; + } + + if(!have_more) { + /* + * If we've received something like "1", we can't really + * tell whether it is really `1` or `123`, until we know + * that there is no more data coming. + * The have_more argument will be set to 1 once something + * like this is available to the caller of this callback: + * "1want_more = 1; + return -1; + } + + lead_wsp_size = xer_whitespace_span(chunk_buf, chunk_size); + chunk_buf = (chunk_buf == NULL)? NULL : ((const char *)chunk_buf + lead_wsp_size); + chunk_size -= lead_wsp_size; + + bret = arg->prim_body_decoder(arg->type_descriptor, + arg->struct_key, chunk_buf, + chunk_size); + switch(bret) { + case XPBD_SYSTEM_FAILURE: + case XPBD_DECODER_LIMIT: + case XPBD_BROKEN_ENCODING: + break; + case XPBD_BODY_CONSUMED: + /* Tag decoded successfully */ + arg->decoded_something = 1; + /* Fall through */ + case XPBD_NOT_BODY_IGNORE: /* Safe to proceed further */ + return lead_wsp_size + chunk_size; + } + + return -1; +} + +asn_dec_rval_t +xer_decode_primitive(const asn_codec_ctx_t *opt_codec_ctx, + const asn_TYPE_descriptor_t *td, void **sptr, + size_t struct_size, const char *opt_mname, + const void *buf_ptr, size_t size, + xer_primitive_body_decoder_f *prim_body_decoder) { + const char *xml_tag = opt_mname ? opt_mname : td->xml_tag; + asn_struct_ctx_t s_ctx; + struct xdp_arg_s s_arg; + asn_dec_rval_t rc; + + /* + * Create the structure if does not exist. + */ + if(!*sptr) { + *sptr = CALLOC(1, struct_size); + if(!*sptr) ASN__DECODE_FAILED; + } + + memset(&s_ctx, 0, sizeof(s_ctx)); + s_arg.type_descriptor = td; + s_arg.struct_key = *sptr; + s_arg.prim_body_decoder = prim_body_decoder; + s_arg.decoded_something = 0; + s_arg.want_more = 0; + + rc = xer_decode_general(opt_codec_ctx, &s_ctx, &s_arg, + xml_tag, buf_ptr, size, + xer_decode__unexpected_tag, + xer_decode__primitive_body); + switch(rc.code) { + case RC_OK: + if(!s_arg.decoded_something) { + char ch; + ASN_DEBUG("Primitive body is not recognized, " + "supplying empty one"); + /* + * Decoding opportunity has come and gone. + * Where's the result? + * Try to feed with empty body, see if it eats it. + */ + if(prim_body_decoder(s_arg.type_descriptor, + s_arg.struct_key, &ch, 0) + != XPBD_BODY_CONSUMED) { + /* + * This decoder does not like empty stuff. + */ + ASN__DECODE_FAILED; + } + } + break; + case RC_WMORE: + /* + * Redo the whole thing later. + * We don't have a context to save intermediate parsing state. + */ + rc.consumed = 0; + break; + case RC_FAIL: + rc.consumed = 0; + if(s_arg.want_more) + rc.code = RC_WMORE; + else + ASN__DECODE_FAILED; + break; + } + return rc; +} diff --git a/certgen/asncodec/asn_internal.c b/certgen/asncodec/asn_internal.c index c2a8108e79e9a6b232462f47ab85c2402016a1d1..d00689262cb708e660ab7d11e9e013f2a23410e9 100644 --- a/certgen/asncodec/asn_internal.c +++ b/certgen/asncodec/asn_internal.c @@ -1,48 +1,49 @@ -#include - -ssize_t -asn__format_to_callback(int (*cb)(const void *, size_t, void *key), void *key, - const char *fmt, ...) { - char scratch[64]; - char *buf = scratch; - size_t buf_size = sizeof(scratch); - int wrote; - int cb_ret; - - do { - va_list args; - va_start(args, fmt); - - wrote = vsnprintf(buf, buf_size, fmt, args); - va_end(args); - if(wrote < (ssize_t)buf_size) { - if(wrote < 0) { - if(buf != scratch) FREEMEM(buf); - return -1; - } - break; - } - - buf_size <<= 1; - if(buf == scratch) { - buf = MALLOC(buf_size); - if(!buf) return -1; - } else { - void *p = REALLOC(buf, buf_size); - if(!p) { - FREEMEM(buf); - return -1; - } - buf = p; - } - } while(1); - - cb_ret = cb(buf, wrote, key); - if(buf != scratch) FREEMEM(buf); - if(cb_ret < 0) { - return -1; - } - - return wrote; -} - +#define ASN_INTERNAL_C +#include + +ssize_t +asn__format_to_callback(int (*cb)(const void *, size_t, void *key), void *key, + const char *fmt, ...) { + char scratch[64]; + char *buf = scratch; + size_t buf_size = sizeof(scratch); + int wrote; + int cb_ret; + + do { + va_list args; + va_start(args, fmt); + + wrote = vsnprintf(buf, buf_size, fmt, args); + va_end(args); + if(wrote < (ssize_t)buf_size) { + if(wrote < 0) { + if(buf != scratch) FREEMEM(buf); + return -1; + } + break; + } + + buf_size <<= 1; + if(buf == scratch) { + buf = MALLOC(buf_size); + if(!buf) return -1; + } else { + void *p = REALLOC(buf, buf_size); + if(!p) { + FREEMEM(buf); + return -1; + } + buf = p; + } + } while(1); + + cb_ret = cb(buf, wrote, key); + if(buf != scratch) FREEMEM(buf); + if(cb_ret < 0) { + return -1; + } + + return wrote; +} + diff --git a/certgen/asncodec/asn_internal.h b/certgen/asncodec/asn_internal.h index 7103b50fd1ffb396899608397c01975676945eb2..64aa1d8e86ea91a745a69ad1c0f9bb45668559c3 100644 --- a/certgen/asncodec/asn_internal.h +++ b/certgen/asncodec/asn_internal.h @@ -1,170 +1,190 @@ -/* - * Copyright (c) 2003-2017 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -/* - * Declarations internally useful for the ASN.1 support code. - */ -#ifndef ASN_INTERNAL_H -#define ASN_INTERNAL_H -#ifndef __EXTENSIONS__ -#define __EXTENSIONS__ /* for Sun */ -#endif - -#include "asn_application.h" /* Application-visible API */ - -#ifndef __NO_ASSERT_H__ /* Include assert.h only for internal use. */ -#include /* for assert() macro */ -#endif - -#ifdef __cplusplus -extern "C" { -#endif - -#if !defined(ASN_DISABLE_UPER_SUPPORT) -#include -#include -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ -#if !defined(ASN_DISABLE_APER_SUPPORT) -#include -#include -#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ - -/* Environment version might be used to avoid running with the old library */ -#define ASN1C_ENVIRONMENT_VERSION 923 /* Compile-time version */ -int get_asn1c_environment_version(void); /* Run-time version */ - -#define CALLOC(nmemb, size) calloc(nmemb, size) -#define MALLOC(size) malloc(size) -#define REALLOC(oldptr, size) realloc(oldptr, size) -#define FREEMEM(ptr) free(ptr) - -#define asn_debug_indent 0 -#define ASN_DEBUG_INDENT_ADD(i) do{}while(0) - -#ifdef EMIT_ASN_DEBUG -#warning "Use ASN_EMIT_DEBUG instead of EMIT_ASN_DEBUG" -#define ASN_EMIT_DEBUG EMIT_ASN_DEBUG -#endif - -/* - * A macro for debugging the ASN.1 internals. - * You may enable or override it. - */ -#ifndef ASN_DEBUG /* If debugging code is not defined elsewhere... */ -#if ASN_EMIT_DEBUG == 1 /* And it was asked to emit this code... */ -#if __STDC_VERSION__ >= 199901L -#ifdef ASN_THREAD_SAFE -/* Thread safety requires sacrifice in output indentation: - * Retain empty definition of ASN_DEBUG_INDENT_ADD. */ -#else /* !ASN_THREAD_SAFE */ -#undef ASN_DEBUG_INDENT_ADD -#undef asn_debug_indent -int asn_debug_indent; -#define ASN_DEBUG_INDENT_ADD(i) do { asn_debug_indent += i; } while(0) -#endif /* ASN_THREAD_SAFE */ -#define ASN_DEBUG(fmt, args...) do { \ - int adi = asn_debug_indent; \ - while(adi--) fprintf(stderr, " "); \ - fprintf(stderr, fmt, ##args); \ - fprintf(stderr, " (%s:%d)\n", \ - __FILE__, __LINE__); \ - } while(0) -#else /* !C99 */ -void CC_PRINTFLIKE(1, 2) ASN_DEBUG_f(const char *fmt, ...); -#define ASN_DEBUG ASN_DEBUG_f -#endif /* C99 */ -#else /* ASN_EMIT_DEBUG != 1 */ -#if __STDC_VERSION__ >= 199901L -#define ASN_DEBUG(...) do{}while(0) -#else /* not C99 */ -static void CC_PRINTFLIKE(1, 2) ASN_DEBUG(const char *fmt, ...) { (void)fmt; } -#endif /* C99 or better */ -#endif /* ASN_EMIT_DEBUG */ -#endif /* ASN_DEBUG */ - -/* - * Print to a callback. - * The callback is expected to return negative values on error. - * 0 and positive values are treated as success. - * RETURN VALUES: - * -1: Failed to format or invoke the callback. - * >0: Size of the data that got delivered to the callback. - */ -ssize_t CC_PRINTFLIKE(3, 4) -asn__format_to_callback( - int (*callback)(const void *, size_t, void *key), void *key, - const char *fmt, ...); - -/* - * Invoke the application-supplied callback and fail, if something is wrong. - */ -#define ASN__E_cbc(buf, size) (cb((buf), (size), app_key) < 0) -#define ASN__E_CALLBACK(size, foo) \ - do { \ - if(foo) goto cb_failed; \ - er.encoded += (size); \ - } while(0) -#define ASN__CALLBACK(buf, size) ASN__E_CALLBACK(size, ASN__E_cbc(buf, size)) -#define ASN__CALLBACK2(buf1, size1, buf2, size2) \ - ASN__E_CALLBACK((size1) + (size2), \ - ASN__E_cbc(buf1, size1) || ASN__E_cbc(buf2, size2)) -#define ASN__CALLBACK3(buf1, size1, buf2, size2, buf3, size3) \ - ASN__E_CALLBACK((size1) + (size2) + (size3), \ - ASN__E_cbc(buf1, size1) || ASN__E_cbc(buf2, size2) \ - || ASN__E_cbc(buf3, size3)) - -#define ASN__TEXT_INDENT(nl, level) \ - do { \ - int tmp_level = (level); \ - int tmp_nl = ((nl) != 0); \ - int tmp_i; \ - if(tmp_nl) ASN__CALLBACK("\n", 1); \ - if(tmp_level < 0) tmp_level = 0; \ - for(tmp_i = 0; tmp_i < tmp_level; tmp_i++) ASN__CALLBACK(" ", 4); \ - } while(0) - -#define _i_INDENT(nl) do { \ - int tmp_i; \ - if((nl) && cb("\n", 1, app_key) < 0) \ - return -1; \ - for(tmp_i = 0; tmp_i < ilevel; tmp_i++) \ - if(cb(" ", 4, app_key) < 0) \ - return -1; \ - } while(0) - -/* - * Check stack against overflow, if limit is set. - */ -#define ASN__DEFAULT_STACK_MAX (30000) -#ifdef ASN_DISABLE_STACK_OVERFLOW_CHECK -static int CC_NOTUSED -ASN__STACK_OVERFLOW_CHECK(const asn_codec_ctx_t *ctx) { - (void)ctx; - return 0; -} -#else -static int CC_NOTUSED -ASN__STACK_OVERFLOW_CHECK(const asn_codec_ctx_t *ctx) { - if(ctx && ctx->max_stack_size) { - - /* ctx MUST be allocated on the stack */ - ptrdiff_t usedstack = ((const char *)ctx - (const char *)&ctx); - if(usedstack > 0) usedstack = -usedstack; /* grows up! */ - - /* double negative required to avoid int wrap-around */ - if(usedstack < -(ptrdiff_t)ctx->max_stack_size) { - ASN_DEBUG("Stack limit %ld reached", - (long)ctx->max_stack_size); - return -1; - } - } - return 0; -} -#endif - -#ifdef __cplusplus -} -#endif - -#endif /* ASN_INTERNAL_H */ +/* + * Copyright (c) 2003-2017 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +/* + * Declarations internally useful for the ASN.1 support code. + */ +#ifndef ASN_INTERNAL_H +#define ASN_INTERNAL_H +#ifndef __EXTENSIONS__ +#define __EXTENSIONS__ /* for Sun */ +#endif + +#include "asn_application.h" /* Application-visible API */ + +#ifndef __NO_ASSERT_H__ /* Include assert.h only for internal use. */ +#include /* for assert() macro */ +#endif + +#ifdef __cplusplus +extern "C" { +#endif + +#if !defined(ASN_DISABLE_UPER_SUPPORT) +#include +#include +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ +#if !defined(ASN_DISABLE_APER_SUPPORT) +#include +#include +#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ + +/* Environment version might be used to avoid running with the old library */ +#define ASN1C_ENVIRONMENT_VERSION 923 /* Compile-time version */ +int get_asn1c_environment_version(void); /* Run-time version */ + +#define CALLOC(nmemb, size) calloc(nmemb, size) +#define MALLOC(size) malloc(size) +#define REALLOC(oldptr, size) realloc(oldptr, size) +#define FREEMEM(ptr) free(ptr) + +#define asn_debug_indent 0 +#define ASN_DEBUG_INDENT_ADD(i) do{}while(0) + +#ifdef EMIT_ASN_DEBUG +#warning "Use ASN_EMIT_DEBUG instead of EMIT_ASN_DEBUG" +#define ASN_EMIT_DEBUG EMIT_ASN_DEBUG +#endif + +/* + * A macro for debugging the ASN.1 internals. + * You may enable or override it. + */ +#ifndef ASN_DEBUG /* If debugging code is not defined elsewhere... */ +#if ASN_EMIT_DEBUG == 1 /* And it was asked to emit this code... */ +#if __STDC_VERSION__ >= 199901L +#ifdef ASN_THREAD_SAFE +/* Thread safety requires sacrifice in output indentation: + * Retain empty definition of ASN_DEBUG_INDENT_ADD. */ +#else /* !ASN_THREAD_SAFE */ +#undef ASN_DEBUG_INDENT_ADD +#undef asn_debug_indent +#ifndef ASN_INTERNAL_C +extern +#endif +int asn_debug_indent; +#define ASN_DEBUG_INDENT_ADD(i) do { asn_debug_indent += i; } while(0) +#endif /* ASN_THREAD_SAFE */ +#define ASN_DEBUG(fmt, args...) do { \ + int adi = asn_debug_indent; \ + while(adi--) fprintf(stderr, " "); \ + fprintf(stderr, fmt, ##args); \ + fprintf(stderr, " (%s:%d)\n", \ + __FILE__, __LINE__); \ + } while(0) +#else /* !C99 */ +void CC_PRINTFLIKE(1, 2) ASN_DEBUG_f(const char *fmt, ...); +#define ASN_DEBUG ASN_DEBUG_f +#endif /* C99 */ +#else /* ASN_EMIT_DEBUG != 1 */ +#if __STDC_VERSION__ >= 199901L +#define ASN_DEBUG(...) do{}while(0) +#else /* not C99 */ +static void CC_PRINTFLIKE(1, 2) ASN_DEBUG(const char *fmt, ...) { (void)fmt; } +#endif /* C99 or better */ +#endif /* ASN_EMIT_DEBUG */ +#endif /* ASN_DEBUG */ + +/* + * Print to a callback. + * The callback is expected to return negative values on error. + * 0 and positive values are treated as success. + * RETURN VALUES: + * -1: Failed to format or invoke the callback. + * >0: Size of the data that got delivered to the callback. + */ +ssize_t CC_PRINTFLIKE(3, 4) +asn__format_to_callback( + int (*callback)(const void *, size_t, void *key), void *key, + const char *fmt, ...); + +/* + * Invoke the application-supplied callback and fail, if something is wrong. + */ +#define ASN__E_cbc(buf, size) (cb((buf), (size), app_key) < 0) +#define ASN__E_CALLBACK(size, foo) \ + do { \ + if(foo) goto cb_failed; \ + er.encoded += (size); \ + } while(0) +#define ASN__CALLBACK(buf, size) ASN__E_CALLBACK(size, ASN__E_cbc(buf, size)) +#define ASN__CALLBACK2(buf1, size1, buf2, size2) \ + ASN__E_CALLBACK((size1) + (size2), \ + ASN__E_cbc(buf1, size1) || ASN__E_cbc(buf2, size2)) +#define ASN__CALLBACK3(buf1, size1, buf2, size2, buf3, size3) \ + ASN__E_CALLBACK((size1) + (size2) + (size3), \ + ASN__E_cbc(buf1, size1) || ASN__E_cbc(buf2, size2) \ + || ASN__E_cbc(buf3, size3)) + +#define ASN__TEXT_INDENT(nl, level) \ + do { \ + int tmp_level = (level); \ + int tmp_nl = ((nl) != 0); \ + int tmp_i; \ + if(tmp_nl) ASN__CALLBACK("\n", 1); \ + if(tmp_level < 0) tmp_level = 0; \ + for(tmp_i = 0; tmp_i < tmp_level; tmp_i++) ASN__CALLBACK(" ", 4); \ + } while(0) + +#define _i_INDENT(nl) do { \ + int tmp_i; \ + if((nl) && cb("\n", 1, app_key) < 0) \ + return -1; \ + for(tmp_i = 0; tmp_i < ilevel; tmp_i++) \ + if(cb(" ", 4, app_key) < 0) \ + return -1; \ + } while(0) + +/* + * Check stack against overflow, if limit is set. + */ + +/* Since GCC 13, AddressSanitizer started defaulting to +* ASAN_OPTIONS="detect_stack_use_after_return=1", which makes this check +* fail due to apparently jumping stack pointers. +* Hence, disable this check if building with ASan, as documented in: +* GCC: https://gcc.gnu.org/onlinedocs/cpp/Common-Predefined-Macros.html +* Clang: https://clang.llvm.org/docs/AddressSanitizer.html#conditional-compilation-with-has-feature-address-sanitizer +*/ +#if defined(__SANITIZE_ADDRESS__) + #define ASN__SANITIZE_ENABLED 1 +#elif defined(__has_feature) +#if __has_feature(address_sanitizer) + #define ASN__SANITIZE_ENABLED 1 +#endif +#endif + +#define ASN__DEFAULT_STACK_MAX (30000) + +#if defined(ASN__SANITIZE_ENABLED) || defined(ASN_DISABLE_STACK_OVERFLOW_CHECK) +static int CC_NOTUSED +ASN__STACK_OVERFLOW_CHECK(const asn_codec_ctx_t *ctx) { + (void)ctx; + return 0; +} +#else +static int CC_NOTUSED +ASN__STACK_OVERFLOW_CHECK(const asn_codec_ctx_t *ctx) { + if(ctx && ctx->max_stack_size) { + + /* ctx MUST be allocated on the stack */ + ptrdiff_t usedstack = ((const char *)ctx - (const char *)&ctx); + if(usedstack > 0) usedstack = -usedstack; /* grows up! */ + + /* double negative required to avoid int wrap-around */ + if(usedstack < -(ptrdiff_t)ctx->max_stack_size) { + ASN_DEBUG("Stack limit %ld reached", + (long)ctx->max_stack_size); + return -1; + } + } + return 0; +} +#endif + +#ifdef __cplusplus +} +#endif + +#endif /* ASN_INTERNAL_H */ diff --git a/certgen/asncodec/asn_ioc.h b/certgen/asncodec/asn_ioc.h index 7de210ee0069244b5d75a3a73a33a8d8838b7279..fba74e4b8f8fecba2c1ddfb6a7a02316a5d73477 100644 --- a/certgen/asncodec/asn_ioc.h +++ b/certgen/asncodec/asn_ioc.h @@ -1,51 +1,51 @@ -/* - * Run-time support for Information Object Classes. - * Copyright (c) 2017 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#ifndef ASN_IOC_H -#define ASN_IOC_H - -#include /* Platform-specific types */ - -#ifdef __cplusplus -extern "C" { -#endif - -struct asn_TYPE_descriptor_s; -struct asn_ioc_cell_s; - -/* - * X.681, #13 - */ -typedef struct asn_ioc_set_s { - size_t rows_count; - size_t columns_count; - const struct asn_ioc_cell_s *rows; -} asn_ioc_set_t; - - -typedef struct asn_ioc_cell_s { - const char *field_name; /* Is equal to corresponding column_name */ - enum { - aioc__undefined = 0, - aioc__value, - aioc__type, - aioc__open_type, - } cell_kind; - struct asn_TYPE_descriptor_s *type_descriptor; - const void *value_sptr; - struct { - size_t types_count; - struct { - unsigned choice_position; - } *types; - } open_type; -} asn_ioc_cell_t; - - -#ifdef __cplusplus -} -#endif - -#endif /* ASN_IOC_H */ +/* + * Run-time support for Information Object Classes. + * Copyright (c) 2017 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#ifndef ASN_IOC_H +#define ASN_IOC_H + +#include /* Platform-specific types */ + +#ifdef __cplusplus +extern "C" { +#endif + +struct asn_TYPE_descriptor_s; +struct asn_ioc_cell_s; + +/* + * X.681, #13 + */ +typedef struct asn_ioc_set_s { + size_t rows_count; + size_t columns_count; + const struct asn_ioc_cell_s *rows; +} asn_ioc_set_t; + + +typedef struct asn_ioc_cell_s { + const char *field_name; /* Is equal to corresponding column_name */ + enum { + aioc__undefined = 0, + aioc__value, + aioc__type, + aioc__open_type, + } cell_kind; + struct asn_TYPE_descriptor_s *type_descriptor; + const void *value_sptr; + struct { + size_t types_count; + struct { + unsigned choice_position; + } *types; + } open_type; +} asn_ioc_cell_t; + + +#ifdef __cplusplus +} +#endif + +#endif /* ASN_IOC_H */ diff --git a/certgen/asncodec/asn_system.h b/certgen/asncodec/asn_system.h index 43f7821c5715c09b63a80ca82464df2e9e60f035..c22bf22ed2c76cbac531cc6efd6addaff6f6aa37 100644 --- a/certgen/asncodec/asn_system.h +++ b/certgen/asncodec/asn_system.h @@ -1,179 +1,179 @@ -/* - * Copyright (c) 2003-2017 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -/* - * Miscellaneous system-dependent types. - */ -#ifndef ASN_SYSTEM_H -#define ASN_SYSTEM_H - -#ifdef HAVE_CONFIG_H -#include "config.h" -#endif - -#ifndef _DEFAULT_SOURCE -#define _DEFAULT_SOURCE 1 -#endif - -#ifndef _BSD_SOURCE -#define _BSD_SOURCE /* for snprintf() on some linux systems */ -#endif - -#include /* For snprintf(3) */ -#include /* For *alloc(3) */ -#include /* For memcpy(3) */ -#include /* For size_t */ -#include /* For LONG_MAX */ -#include /* For va_start */ -#include /* for offsetof and ptrdiff_t */ -#include /* for PRIdMAX */ - -#ifdef _WIN32 - -#include -#ifndef __MINGW32__ -#define snprintf _snprintf -#define vsnprintf _vsnprintf -#endif - -/* To avoid linking with ws2_32.lib, here's the definition of ntohl() */ -#define sys_ntohl(l) ((((l) << 24) & 0xff000000) \ - | (((l) << 8) & 0xff0000) \ - | (((l) >> 8) & 0xff00) \ - | ((l >> 24) & 0xff)) - -#ifdef _MSC_VER /* MSVS.Net */ -#ifndef __cplusplus -#ifndef inline -#define inline __inline -#endif -#endif -#ifndef ASSUMESTDTYPES /* Standard types have been defined elsewhere */ -#define ssize_t SSIZE_T -#if _MSC_VER < 1600 -typedef char int8_t; -typedef short int16_t; -typedef int int32_t; -typedef unsigned char uint8_t; -typedef unsigned short uint16_t; -typedef unsigned int uint32_t; -#else /* _MSC_VER >= 1600 */ -#include -#endif /* _MSC_VER < 1600 */ -#endif /* ASSUMESTDTYPES */ -#define WIN32_LEAN_AND_MEAN -#include -#include -#ifndef isnan -#define isnan _isnan -#endif -#define finite _finite -#define copysign _copysign -#define ilogb _logb -#define random rand -#else /* !_MSC_VER */ -#include -#endif /* _MSC_VER */ - -#else /* !_WIN32 */ - -#if defined(__vxworks) -#include -#else /* !defined(__vxworks) */ - -#include /* C99 specifies this file */ -#ifdef HAVE_NETINET_IN_H -#include /* for ntohl() */ -#endif -#define sys_ntohl(foo) ntohl(foo) -#endif /* defined(__vxworks) */ - -#endif /* _WIN32 */ - -#if __GNUC__ >= 3 || defined(__clang__) -#define CC_ATTRIBUTE(attr) __attribute__((attr)) -#else -#define CC_ATTRIBUTE(attr) -#endif -#if defined(__GNUC__) && ((__GNUC__ == 4 && __GNUC_MINOR__>= 4) || __GNUC__ > 4) -#define CC_PRINTFLIKE(fmt, var) CC_ATTRIBUTE(format(gnu_printf, fmt, var)) -#elif defined(__GNUC__) -#if defined(ANDROID) -#define CC_PRINTFLIKE(fmt, var) CC_ATTRIBUTE(__format__(__printf__, fmt, var)) -#else -#define CC_PRINTFLIKE(fmt, var) CC_ATTRIBUTE(format(printf, fmt, var)) -#endif -#else -#define CC_PRINTFLIKE(fmt, var) -#endif -#define CC_NOTUSED CC_ATTRIBUTE(unused) -#ifndef CC_ATTR_NO_SANITIZE -#if __GNUC__ < 8 -#define CC_ATTR_NO_SANITIZE(what) -#else -#define CC_ATTR_NO_SANITIZE(what) CC_ATTRIBUTE(no_sanitize(what)) -#endif -#endif - -/* Figure out if thread safety is requested */ -#if !defined(ASN_THREAD_SAFE) && (defined(THREAD_SAFE) || defined(_REENTRANT)) -#define ASN_THREAD_SAFE -#endif /* Thread safety */ - -#ifndef offsetof /* If not defined by */ -#define offsetof(s, m) ((ptrdiff_t)&(((s *)0)->m) - (ptrdiff_t)((s *)0)) -#endif /* offsetof */ - -#ifndef MIN /* Suitable for comparing primitive types (integers) */ -#if defined(__GNUC__) -#define MIN(a,b) ({ __typeof a _a = a; __typeof b _b = b; \ - ((_a)<(_b)?(_a):(_b)); }) -#else /* !__GNUC__ */ -#define MIN(a,b) ((a)<(b)?(a):(b)) /* Unsafe variant */ -#endif /* __GNUC__ */ -#endif /* MIN */ - -#if __STDC_VERSION__ >= 199901L -#ifndef SIZE_MAX -#define SIZE_MAX ((~((size_t)0)) >> 1) -#endif - -#ifndef RSIZE_MAX /* C11, Annex K */ -#define RSIZE_MAX (SIZE_MAX >> 1) -#endif -#ifndef RSSIZE_MAX /* Halve signed size even further than unsigned */ -#define RSSIZE_MAX ((ssize_t)(RSIZE_MAX >> 1)) -#endif -#else /* Old compiler */ -#undef SIZE_MAX -#undef RSIZE_MAX -#undef RSSIZE_MAX -#define SIZE_MAX ((~((size_t)0)) >> 1) -#define RSIZE_MAX (SIZE_MAX >> 1) -#define RSSIZE_MAX ((ssize_t)(RSIZE_MAX >> 1)) -#endif - -#if __STDC_VERSION__ >= 199901L -#define ASN_PRI_SIZE "zu" -#define ASN_PRI_SSIZE "zd" -#define ASN_PRIuMAX PRIuMAX -#define ASN_PRIdMAX PRIdMAX -#else -#if _MSC_VER >= 1800 -#define ASN_PRI_SIZE "zu" -#define ASN_PRI_SSIZE "zd" -#else -#define ASN_PRI_SIZE "lu" -#define ASN_PRI_SSIZE "ld" -#endif -#if LLONG_MAX > LONG_MAX -#define ASN_PRIuMAX "llu" -#define ASN_PRIdMAX "lld" -#else -#define ASN_PRIuMAX "lu" -#define ASN_PRIdMAX "ld" -#endif -#endif - -#endif /* ASN_SYSTEM_H */ +/* + * Copyright (c) 2003-2017 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +/* + * Miscellaneous system-dependent types. + */ +#ifndef ASN_SYSTEM_H +#define ASN_SYSTEM_H + +#ifdef HAVE_CONFIG_H +#include "config.h" +#endif + +#ifndef _DEFAULT_SOURCE +#define _DEFAULT_SOURCE 1 +#endif + +#ifndef _BSD_SOURCE +#define _BSD_SOURCE /* for snprintf() on some linux systems */ +#endif + +#include /* For snprintf(3) */ +#include /* For *alloc(3) */ +#include /* For memcpy(3) */ +#include /* For size_t */ +#include /* For LONG_MAX */ +#include /* For va_start */ +#include /* for offsetof and ptrdiff_t */ +#include /* for PRIdMAX */ + +#ifdef _WIN32 + +#include +#ifndef __MINGW32__ +#define snprintf _snprintf +#define vsnprintf _vsnprintf +#endif + +/* To avoid linking with ws2_32.lib, here's the definition of ntohl() */ +#define sys_ntohl(l) ((((l) << 24) & 0xff000000) \ + | (((l) << 8) & 0xff0000) \ + | (((l) >> 8) & 0xff00) \ + | ((l >> 24) & 0xff)) + +#ifdef _MSC_VER /* MSVS.Net */ +#ifndef __cplusplus +#ifndef inline +#define inline __inline +#endif +#endif +#ifndef ASSUMESTDTYPES /* Standard types have been defined elsewhere */ +#define ssize_t SSIZE_T +#if _MSC_VER < 1600 +typedef char int8_t; +typedef short int16_t; +typedef int int32_t; +typedef unsigned char uint8_t; +typedef unsigned short uint16_t; +typedef unsigned int uint32_t; +#else /* _MSC_VER >= 1600 */ +#include +#endif /* _MSC_VER < 1600 */ +#endif /* ASSUMESTDTYPES */ +#define WIN32_LEAN_AND_MEAN +#include +#include +#ifndef isnan +#define isnan _isnan +#endif +#define finite _finite +#define copysign _copysign +#define ilogb _logb +#define random rand +#else /* !_MSC_VER */ +#include +#endif /* _MSC_VER */ + +#else /* !_WIN32 */ + +#if defined(__vxworks) +#include +#else /* !defined(__vxworks) */ + +#include /* C99 specifies this file */ +#ifdef HAVE_NETINET_IN_H +#include /* for ntohl() */ +#endif +#define sys_ntohl(foo) ntohl(foo) +#endif /* defined(__vxworks) */ + +#endif /* _WIN32 */ + +#if __GNUC__ >= 3 || defined(__clang__) +#define CC_ATTRIBUTE(attr) __attribute__((attr)) +#else +#define CC_ATTRIBUTE(attr) +#endif +#if defined(__GNUC__) && ((__GNUC__ == 4 && __GNUC_MINOR__>= 4) || __GNUC__ > 4) +#define CC_PRINTFLIKE(fmt, var) CC_ATTRIBUTE(format(gnu_printf, fmt, var)) +#elif defined(__GNUC__) +#if defined(ANDROID) +#define CC_PRINTFLIKE(fmt, var) CC_ATTRIBUTE(__format__(__printf__, fmt, var)) +#else +#define CC_PRINTFLIKE(fmt, var) CC_ATTRIBUTE(format(printf, fmt, var)) +#endif +#else +#define CC_PRINTFLIKE(fmt, var) +#endif +#define CC_NOTUSED CC_ATTRIBUTE(unused) +#ifndef CC_ATTR_NO_SANITIZE +#if __GNUC__ < 8 +#define CC_ATTR_NO_SANITIZE(what) +#else +#define CC_ATTR_NO_SANITIZE(what) CC_ATTRIBUTE(no_sanitize(what)) +#endif +#endif + +/* Figure out if thread safety is requested */ +#if !defined(ASN_THREAD_SAFE) && (defined(THREAD_SAFE) || defined(_REENTRANT)) +#define ASN_THREAD_SAFE +#endif /* Thread safety */ + +#ifndef offsetof /* If not defined by */ +#define offsetof(s, m) ((ptrdiff_t)&(((s *)0)->m) - (ptrdiff_t)((s *)0)) +#endif /* offsetof */ + +#ifndef MIN /* Suitable for comparing primitive types (integers) */ +#if defined(__GNUC__) +#define MIN(a,b) ({ __typeof a _a = a; __typeof b _b = b; \ + ((_a)<(_b)?(_a):(_b)); }) +#else /* !__GNUC__ */ +#define MIN(a,b) ((a)<(b)?(a):(b)) /* Unsafe variant */ +#endif /* __GNUC__ */ +#endif /* MIN */ + +#if __STDC_VERSION__ >= 199901L +#ifndef SIZE_MAX +#define SIZE_MAX ((~((size_t)0)) >> 1) +#endif + +#ifndef RSIZE_MAX /* C11, Annex K */ +#define RSIZE_MAX (SIZE_MAX >> 1) +#endif +#ifndef RSSIZE_MAX /* Halve signed size even further than unsigned */ +#define RSSIZE_MAX ((ssize_t)(RSIZE_MAX >> 1)) +#endif +#else /* Old compiler */ +#undef SIZE_MAX +#undef RSIZE_MAX +#undef RSSIZE_MAX +#define SIZE_MAX ((~((size_t)0)) >> 1) +#define RSIZE_MAX (SIZE_MAX >> 1) +#define RSSIZE_MAX ((ssize_t)(RSIZE_MAX >> 1)) +#endif + +#if __STDC_VERSION__ >= 199901L +#define ASN_PRI_SIZE "zu" +#define ASN_PRI_SSIZE "zd" +#define ASN_PRIuMAX PRIuMAX +#define ASN_PRIdMAX PRIdMAX +#else +#if _MSC_VER >= 1800 +#define ASN_PRI_SIZE "zu" +#define ASN_PRI_SSIZE "zd" +#else +#define ASN_PRI_SIZE "lu" +#define ASN_PRI_SSIZE "ld" +#endif +#if LLONG_MAX > LONG_MAX +#define ASN_PRIuMAX "llu" +#define ASN_PRIdMAX "lld" +#else +#define ASN_PRIuMAX "lu" +#define ASN_PRIdMAX "ld" +#endif +#endif + +#endif /* ASN_SYSTEM_H */ diff --git a/certgen/asncodec/ber_tlv_length.c b/certgen/asncodec/ber_tlv_length.c index 0a0deec1aee7da88404a966b13b215554fbdbc9b..11234c98f5903c0c8dc45b41b538eab0758c5e04 100644 --- a/certgen/asncodec/ber_tlv_length.c +++ b/certgen/asncodec/ber_tlv_length.c @@ -1,168 +1,168 @@ -/*- - * Copyright (c) 2003, 2004 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include -#include - -ssize_t -ber_fetch_length(int _is_constructed, const void *bufptr, size_t size, - ber_tlv_len_t *len_r) { - const uint8_t *buf = (const uint8_t *)bufptr; - unsigned oct; - - if(size == 0) - return 0; /* Want more */ - - oct = *(const uint8_t *)buf; - if((oct & 0x80) == 0) { - /* - * Short definite length. - */ - *len_r = oct; /* & 0x7F */ - return 1; - } else { - ber_tlv_len_t len; - size_t skipped; - - if(_is_constructed && oct == 0x80) { - *len_r = -1; /* Indefinite length */ - return 1; - } - - if(oct == 0xff) { - /* Reserved in standard for future use. */ - return -1; - } - - oct &= 0x7F; /* Leave only the 7 LS bits */ - for(len = 0, buf++, skipped = 1; - oct && (++skipped <= size); buf++, oct--) { - - /* Verify that we won't overflow. */ - if(!(len >> ((8 * sizeof(len)) - (8+1)))) { - len = (len << 8) | *buf; - } else { - /* Too large length value. */ - return -1; - } - } - - if(oct == 0) { - if(len < 0 || len > RSSIZE_MAX) { - /* Length value out of sane range. */ - return -1; - } - - *len_r = len; - return skipped; - } - - return 0; /* Want more */ - } - -} - -ssize_t -ber_skip_length(const asn_codec_ctx_t *opt_codec_ctx, - int _is_constructed, const void *ptr, size_t size) { - ber_tlv_len_t vlen; /* Length of V in TLV */ - ssize_t tl; /* Length of L in TLV */ - ssize_t ll; /* Length of L in TLV */ - size_t skip; - - /* - * Make sure we didn't exceed the maximum stack size. - */ - if(ASN__STACK_OVERFLOW_CHECK(opt_codec_ctx)) - return -1; - - /* - * Determine the size of L in TLV. - */ - ll = ber_fetch_length(_is_constructed, ptr, size, &vlen); - if(ll <= 0) return ll; - - /* - * Definite length. - */ - if(vlen >= 0) { - skip = ll + vlen; - if(skip > size) - return 0; /* Want more */ - return skip; - } - - /* - * Indefinite length! - */ - ASN_DEBUG("Skipping indefinite length"); - for(skip = ll, ptr = ((const char *)ptr) + ll, size -= ll;;) { - ber_tlv_tag_t tag; - - /* Fetch the tag */ - tl = ber_fetch_tag(ptr, size, &tag); - if(tl <= 0) return tl; - - ll = ber_skip_length(opt_codec_ctx, - BER_TLV_CONSTRUCTED(ptr), - ((const char *)ptr) + tl, size - tl); - if(ll <= 0) return ll; - - skip += tl + ll; - - /* - * This may be the end of the indefinite length structure, - * two consecutive 0 octets. - * Check if it is true. - */ - if(((const uint8_t *)ptr)[0] == 0 - && ((const uint8_t *)ptr)[1] == 0) - return skip; - - ptr = ((const char *)ptr) + tl + ll; - size -= tl + ll; - } - - /* UNREACHABLE */ -} - -size_t -der_tlv_length_serialize(ber_tlv_len_t len, void *bufp, size_t size) { - size_t required_size; /* Size of len encoding */ - uint8_t *buf = (uint8_t *)bufp; - uint8_t *end; - int i; - - if(len <= 127) { - /* Encoded in 1 octet */ - if(size) *buf = (uint8_t)len; - return 1; - } - - /* - * Compute the size of the subsequent bytes. - */ - for(required_size = 1, i = 8; i < 8 * (int)sizeof(len); i += 8) { - if(len >> i) - required_size++; - else - break; - } - - if(size <= required_size) - return required_size + 1; - - *buf++ = (uint8_t)(0x80 | required_size); /* Length of the encoding */ - - /* - * Produce the len encoding, space permitting. - */ - end = buf + required_size; - for(i -= 8; buf < end; i -= 8, buf++) - *buf = (uint8_t)(len >> i); - - return required_size + 1; -} - +/*- + * Copyright (c) 2003, 2004 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include +#include + +ssize_t +ber_fetch_length(int _is_constructed, const void *bufptr, size_t size, + ber_tlv_len_t *len_r) { + const uint8_t *buf = (const uint8_t *)bufptr; + unsigned oct; + + if(size == 0) + return 0; /* Want more */ + + oct = *(const uint8_t *)buf; + if((oct & 0x80) == 0) { + /* + * Short definite length. + */ + *len_r = oct; /* & 0x7F */ + return 1; + } else { + ber_tlv_len_t len; + size_t skipped; + + if(_is_constructed && oct == 0x80) { + *len_r = -1; /* Indefinite length */ + return 1; + } + + if(oct == 0xff) { + /* Reserved in standard for future use. */ + return -1; + } + + oct &= 0x7F; /* Leave only the 7 LS bits */ + for(len = 0, buf++, skipped = 1; + oct && (++skipped <= size); buf++, oct--) { + + /* Verify that we won't overflow. */ + if(!(len >> ((8 * sizeof(len)) - (8+1)))) { + len = (len << 8) | *buf; + } else { + /* Too large length value. */ + return -1; + } + } + + if(oct == 0) { + if(len < 0 || len > RSSIZE_MAX) { + /* Length value out of sane range. */ + return -1; + } + + *len_r = len; + return skipped; + } + + return 0; /* Want more */ + } + +} + +ssize_t +ber_skip_length(const asn_codec_ctx_t *opt_codec_ctx, + int _is_constructed, const void *ptr, size_t size) { + ber_tlv_len_t vlen; /* Length of V in TLV */ + ssize_t tl; /* Length of L in TLV */ + ssize_t ll; /* Length of L in TLV */ + size_t skip; + + /* + * Make sure we didn't exceed the maximum stack size. + */ + if(ASN__STACK_OVERFLOW_CHECK(opt_codec_ctx)) + return -1; + + /* + * Determine the size of L in TLV. + */ + ll = ber_fetch_length(_is_constructed, ptr, size, &vlen); + if(ll <= 0) return ll; + + /* + * Definite length. + */ + if(vlen >= 0) { + skip = ll + vlen; + if(skip > size) + return 0; /* Want more */ + return skip; + } + + /* + * Indefinite length! + */ + ASN_DEBUG("Skipping indefinite length"); + for(skip = ll, ptr = ((const char *)ptr) + ll, size -= ll;;) { + ber_tlv_tag_t tag; + + /* Fetch the tag */ + tl = ber_fetch_tag(ptr, size, &tag); + if(tl <= 0) return tl; + + ll = ber_skip_length(opt_codec_ctx, + BER_TLV_CONSTRUCTED(ptr), + ((const char *)ptr) + tl, size - tl); + if(ll <= 0) return ll; + + skip += tl + ll; + + /* + * This may be the end of the indefinite length structure, + * two consecutive 0 octets. + * Check if it is true. + */ + if(((const uint8_t *)ptr)[0] == 0 + && ((const uint8_t *)ptr)[1] == 0) + return skip; + + ptr = ((const char *)ptr) + tl + ll; + size -= tl + ll; + } + + /* UNREACHABLE */ +} + +size_t +der_tlv_length_serialize(ber_tlv_len_t len, void *bufp, size_t size) { + size_t required_size; /* Size of len encoding */ + uint8_t *buf = (uint8_t *)bufp; + uint8_t *end; + int i; + + if(len <= 127) { + /* Encoded in 1 octet */ + if(size) *buf = (uint8_t)len; + return 1; + } + + /* + * Compute the size of the subsequent bytes. + */ + for(required_size = 1, i = 8; i < 8 * (int)sizeof(len); i += 8) { + if(len >> i) + required_size++; + else + break; + } + + if(size <= required_size) + return required_size + 1; + + *buf++ = (uint8_t)(0x80 | required_size); /* Length of the encoding */ + + /* + * Produce the len encoding, space permitting. + */ + end = buf + required_size; + for(i -= 8; buf < end; i -= 8, buf++) + *buf = (uint8_t)(len >> i); + + return required_size + 1; +} + diff --git a/certgen/asncodec/ber_tlv_length.h b/certgen/asncodec/ber_tlv_length.h index d1e4d48dd73fecb6d5d1b3cfe5529df7e2975363..ebae5e075b419e5a298af0e56cce46e394e607e3 100644 --- a/certgen/asncodec/ber_tlv_length.h +++ b/certgen/asncodec/ber_tlv_length.h @@ -1,50 +1,50 @@ -/*- - * Copyright (c) 2003-2017 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#ifndef _BER_TLV_LENGTH_H_ -#define _BER_TLV_LENGTH_H_ - -#ifdef __cplusplus -extern "C" { -#endif - -typedef ssize_t ber_tlv_len_t; - -/* - * This function tries to fetch the length of the BER TLV value and place it - * in *len_r. - * RETURN VALUES: - * 0: More data expected than bufptr contains. - * -1: Fatal error deciphering length. - * >0: Number of bytes used from bufptr. - * On return with >0, len_r is constrained as -1..MAX, where -1 mean - * that the value is of indefinite length. - */ -ssize_t ber_fetch_length(int _is_constructed, const void *bufptr, size_t size, - ber_tlv_len_t *len_r); - -/* - * This function expects bufptr to be positioned over L in TLV. - * It returns number of bytes occupied by L and V together, suitable - * for skipping. The function properly handles indefinite length. - * RETURN VALUES: - * Standard {-1,0,>0} convention. - */ -ssize_t ber_skip_length( - const struct asn_codec_ctx_s *opt_codec_ctx, /* optional context */ - int _is_constructed, const void *bufptr, size_t size); - -/* - * This function serializes the length (L from TLV) in DER format. - * It always returns number of bytes necessary to represent the length, - * it is a caller's responsibility to check the return value - * against the supplied buffer's size. - */ -size_t der_tlv_length_serialize(ber_tlv_len_t len, void *bufptr, size_t size); - -#ifdef __cplusplus -} -#endif - -#endif /* _BER_TLV_LENGTH_H_ */ +/*- + * Copyright (c) 2003-2017 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#ifndef _BER_TLV_LENGTH_H_ +#define _BER_TLV_LENGTH_H_ + +#ifdef __cplusplus +extern "C" { +#endif + +typedef ssize_t ber_tlv_len_t; + +/* + * This function tries to fetch the length of the BER TLV value and place it + * in *len_r. + * RETURN VALUES: + * 0: More data expected than bufptr contains. + * -1: Fatal error deciphering length. + * >0: Number of bytes used from bufptr. + * On return with >0, len_r is constrained as -1..MAX, where -1 mean + * that the value is of indefinite length. + */ +ssize_t ber_fetch_length(int _is_constructed, const void *bufptr, size_t size, + ber_tlv_len_t *len_r); + +/* + * This function expects bufptr to be positioned over L in TLV. + * It returns number of bytes occupied by L and V together, suitable + * for skipping. The function properly handles indefinite length. + * RETURN VALUES: + * Standard {-1,0,>0} convention. + */ +ssize_t ber_skip_length( + const struct asn_codec_ctx_s *opt_codec_ctx, /* optional context */ + int _is_constructed, const void *bufptr, size_t size); + +/* + * This function serializes the length (L from TLV) in DER format. + * It always returns number of bytes necessary to represent the length, + * it is a caller's responsibility to check the return value + * against the supplied buffer's size. + */ +size_t der_tlv_length_serialize(ber_tlv_len_t len, void *bufptr, size_t size); + +#ifdef __cplusplus +} +#endif + +#endif /* _BER_TLV_LENGTH_H_ */ diff --git a/certgen/asncodec/ber_tlv_tag.c b/certgen/asncodec/ber_tlv_tag.c index 64ec14f07fbae1a50cfcd95ef5cf3254b43c6a2a..06285d3898a46759610701e646c1f42acba65696 100644 --- a/certgen/asncodec/ber_tlv_tag.c +++ b/certgen/asncodec/ber_tlv_tag.c @@ -1,144 +1,144 @@ -/*- - * Copyright (c) 2003, 2004 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include -#include - -ssize_t -ber_fetch_tag(const void *ptr, size_t size, ber_tlv_tag_t *tag_r) { - ber_tlv_tag_t val; - ber_tlv_tag_t tclass; - size_t skipped; - - if(size == 0) - return 0; - - val = *(const uint8_t *)ptr; - tclass = (val >> 6); - if((val &= 0x1F) != 0x1F) { - /* - * Simple form: everything encoded in a single octet. - * Tag Class is encoded using two least significant bits. - */ - *tag_r = (val << 2) | tclass; - return 1; - } - - /* - * Each octet contains 7 bits of useful information. - * The MSB is 0 if it is the last octet of the tag. - */ - for(val = 0, ptr = ((const char *)ptr) + 1, skipped = 2; - skipped <= size; - ptr = ((const char *)ptr) + 1, skipped++) { - unsigned int oct = *(const uint8_t *)ptr; - if(oct & 0x80) { - val = (val << 7) | (oct & 0x7F); - /* - * Make sure there are at least 9 bits spare - * at the MS side of a value. - */ - if(val >> ((8 * sizeof(val)) - 9)) { - /* - * We would not be able to accommodate - * any more tag bits. - */ - return -1; - } - } else { - val = (val << 7) | oct; - *tag_r = (val << 2) | tclass; - return skipped; - } - } - - return 0; /* Want more */ -} - - -ssize_t -ber_tlv_tag_fwrite(ber_tlv_tag_t tag, FILE *f) { - char buf[sizeof("[APPLICATION ]") + 32]; - ssize_t ret; - - ret = ber_tlv_tag_snprint(tag, buf, sizeof(buf)); - if(ret >= (ssize_t)sizeof(buf) || ret < 2) { - errno = EPERM; - return -1; - } - - return fwrite(buf, 1, ret, f); -} - -ssize_t -ber_tlv_tag_snprint(ber_tlv_tag_t tag, char *buf, size_t size) { - const char *type = 0; - int ret; - - switch(tag & 0x3) { - case ASN_TAG_CLASS_UNIVERSAL: type = "UNIVERSAL "; break; - case ASN_TAG_CLASS_APPLICATION: type = "APPLICATION "; break; - case ASN_TAG_CLASS_CONTEXT: type = ""; break; - case ASN_TAG_CLASS_PRIVATE: type = "PRIVATE "; break; - } - - ret = snprintf(buf, size, "[%s%u]", type, ((unsigned)tag) >> 2); - if(ret <= 0 && size) buf[0] = '\0'; /* against broken libc's */ - - return ret; -} - -char * -ber_tlv_tag_string(ber_tlv_tag_t tag) { - static char buf[sizeof("[APPLICATION ]") + 32]; - - (void)ber_tlv_tag_snprint(tag, buf, sizeof(buf)); - - return buf; -} - - -size_t -ber_tlv_tag_serialize(ber_tlv_tag_t tag, void *bufp, size_t size) { - int tclass = BER_TAG_CLASS(tag); - ber_tlv_tag_t tval = BER_TAG_VALUE(tag); - uint8_t *buf = (uint8_t *)bufp; - uint8_t *end; - size_t required_size; - size_t i; - - if(tval <= 30) { - /* Encoded in 1 octet */ - if(size) buf[0] = (tclass << 6) | tval; - return 1; - } else if(size) { - *buf++ = (tclass << 6) | 0x1F; - size--; - } - - /* - * Compute the size of the subsequent bytes. - */ - for(required_size = 1, i = 7; i < 8 * sizeof(tval); i += 7) { - if(tval >> i) - required_size++; - else - break; - } - - if(size < required_size) - return required_size + 1; - - /* - * Fill in the buffer, space permitting. - */ - end = buf + required_size - 1; - for(i -= 7; buf < end; i -= 7, buf++) - *buf = 0x80 | ((tval >> i) & 0x7F); - *buf = (tval & 0x7F); /* Last octet without high bit */ - - return required_size + 1; -} - +/*- + * Copyright (c) 2003, 2004 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include +#include + +ssize_t +ber_fetch_tag(const void *ptr, size_t size, ber_tlv_tag_t *tag_r) { + ber_tlv_tag_t val; + ber_tlv_tag_t tclass; + size_t skipped; + + if(size == 0) + return 0; + + val = *(const uint8_t *)ptr; + tclass = (val >> 6); + if((val &= 0x1F) != 0x1F) { + /* + * Simple form: everything encoded in a single octet. + * Tag Class is encoded using two least significant bits. + */ + *tag_r = (val << 2) | tclass; + return 1; + } + + /* + * Each octet contains 7 bits of useful information. + * The MSB is 0 if it is the last octet of the tag. + */ + for(val = 0, ptr = ((const char *)ptr) + 1, skipped = 2; + skipped <= size; + ptr = ((const char *)ptr) + 1, skipped++) { + unsigned int oct = *(const uint8_t *)ptr; + if(oct & 0x80) { + val = (val << 7) | (oct & 0x7F); + /* + * Make sure there are at least 9 bits spare + * at the MS side of a value. + */ + if(val >> ((8 * sizeof(val)) - 9)) { + /* + * We would not be able to accommodate + * any more tag bits. + */ + return -1; + } + } else { + val = (val << 7) | oct; + *tag_r = (val << 2) | tclass; + return skipped; + } + } + + return 0; /* Want more */ +} + + +ssize_t +ber_tlv_tag_fwrite(ber_tlv_tag_t tag, FILE *f) { + char buf[sizeof("[APPLICATION ]") + 32]; + ssize_t ret; + + ret = ber_tlv_tag_snprint(tag, buf, sizeof(buf)); + if(ret >= (ssize_t)sizeof(buf) || ret < 2) { + errno = EPERM; + return -1; + } + + return fwrite(buf, 1, ret, f); +} + +ssize_t +ber_tlv_tag_snprint(ber_tlv_tag_t tag, char *buf, size_t size) { + const char *type = 0; + int ret; + + switch(tag & 0x3) { + case ASN_TAG_CLASS_UNIVERSAL: type = "UNIVERSAL "; break; + case ASN_TAG_CLASS_APPLICATION: type = "APPLICATION "; break; + case ASN_TAG_CLASS_CONTEXT: type = ""; break; + case ASN_TAG_CLASS_PRIVATE: type = "PRIVATE "; break; + } + + ret = snprintf(buf, size, "[%s%u]", type, ((unsigned)tag) >> 2); + if(ret <= 0 && size) buf[0] = '\0'; /* against broken libc's */ + + return ret; +} + +char * +ber_tlv_tag_string(ber_tlv_tag_t tag) { + static char buf[sizeof("[APPLICATION ]") + 32]; + + (void)ber_tlv_tag_snprint(tag, buf, sizeof(buf)); + + return buf; +} + + +size_t +ber_tlv_tag_serialize(ber_tlv_tag_t tag, void *bufp, size_t size) { + int tclass = BER_TAG_CLASS(tag); + ber_tlv_tag_t tval = BER_TAG_VALUE(tag); + uint8_t *buf = (uint8_t *)bufp; + uint8_t *end; + size_t required_size; + size_t i; + + if(tval <= 30) { + /* Encoded in 1 octet */ + if(size) buf[0] = (tclass << 6) | tval; + return 1; + } else if(size) { + *buf++ = (tclass << 6) | 0x1F; + size--; + } + + /* + * Compute the size of the subsequent bytes. + */ + for(required_size = 1, i = 7; i < 8 * sizeof(tval); i += 7) { + if(tval >> i) + required_size++; + else + break; + } + + if(size < required_size) + return required_size + 1; + + /* + * Fill in the buffer, space permitting. + */ + end = buf + required_size - 1; + for(i -= 7; buf < end; i -= 7, buf++) + *buf = 0x80 | ((tval >> i) & 0x7F); + *buf = (tval & 0x7F); /* Last octet without high bit */ + + return required_size + 1; +} + diff --git a/certgen/asncodec/ber_tlv_tag.h b/certgen/asncodec/ber_tlv_tag.h index ce227add6d1918cbf6dbd5edbbb1ab6eb49b027d..4386c2cb77e3fc23013c4270cd01c9c22697f8f8 100644 --- a/certgen/asncodec/ber_tlv_tag.h +++ b/certgen/asncodec/ber_tlv_tag.h @@ -1,60 +1,60 @@ -/*- - * Copyright (c) 2003-2017 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#ifndef _BER_TLV_TAG_H_ -#define _BER_TLV_TAG_H_ - -#ifdef __cplusplus -extern "C" { -#endif - -enum asn_tag_class { - ASN_TAG_CLASS_UNIVERSAL = 0, /* 0b00 */ - ASN_TAG_CLASS_APPLICATION = 1, /* 0b01 */ - ASN_TAG_CLASS_CONTEXT = 2, /* 0b10 */ - ASN_TAG_CLASS_PRIVATE = 3 /* 0b11 */ -}; -typedef unsigned ber_tlv_tag_t; /* BER TAG from Tag-Length-Value */ - -/* - * Tag class is encoded together with tag value for optimization purposes. - */ -#define BER_TAG_CLASS(tag) ((tag) & 0x3) -#define BER_TAG_VALUE(tag) ((tag) >> 2) -#define BER_TLV_CONSTRUCTED(tagptr) (((*(const uint8_t *)tagptr)&0x20)?1:0) - -#define BER_TAGS_EQUAL(tag1, tag2) ((tag1) == (tag2)) - -/* - * Several functions for printing the TAG in the canonical form - * (i.e. "[PRIVATE 0]"). - * Return values correspond to their libc counterparts (if any). - */ -ssize_t ber_tlv_tag_snprint(ber_tlv_tag_t tag, char *buf, size_t buflen); -ssize_t ber_tlv_tag_fwrite(ber_tlv_tag_t tag, FILE *); -char *ber_tlv_tag_string(ber_tlv_tag_t tag); - - -/* - * This function tries to fetch the tag from the input stream. - * RETURN VALUES: - * 0: More data expected than bufptr contains. - * -1: Fatal error deciphering tag. - * >0: Number of bytes used from bufptr. tag_r will contain the tag. - */ -ssize_t ber_fetch_tag(const void *bufptr, size_t size, ber_tlv_tag_t *tag_r); - -/* - * This function serializes the tag (T from TLV) in BER format. - * It always returns number of bytes necessary to represent the tag, - * it is a caller's responsibility to check the return value - * against the supplied buffer's size. - */ -size_t ber_tlv_tag_serialize(ber_tlv_tag_t tag, void *bufptr, size_t size); - -#ifdef __cplusplus -} -#endif - -#endif /* _BER_TLV_TAG_H_ */ +/*- + * Copyright (c) 2003-2017 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#ifndef _BER_TLV_TAG_H_ +#define _BER_TLV_TAG_H_ + +#ifdef __cplusplus +extern "C" { +#endif + +enum asn_tag_class { + ASN_TAG_CLASS_UNIVERSAL = 0, /* 0b00 */ + ASN_TAG_CLASS_APPLICATION = 1, /* 0b01 */ + ASN_TAG_CLASS_CONTEXT = 2, /* 0b10 */ + ASN_TAG_CLASS_PRIVATE = 3 /* 0b11 */ +}; +typedef unsigned ber_tlv_tag_t; /* BER TAG from Tag-Length-Value */ + +/* + * Tag class is encoded together with tag value for optimization purposes. + */ +#define BER_TAG_CLASS(tag) ((tag) & 0x3) +#define BER_TAG_VALUE(tag) ((tag) >> 2) +#define BER_TLV_CONSTRUCTED(tagptr) (((*(const uint8_t *)tagptr)&0x20)?1:0) + +#define BER_TAGS_EQUAL(tag1, tag2) ((tag1) == (tag2)) + +/* + * Several functions for printing the TAG in the canonical form + * (i.e. "[PRIVATE 0]"). + * Return values correspond to their libc counterparts (if any). + */ +ssize_t ber_tlv_tag_snprint(ber_tlv_tag_t tag, char *buf, size_t buflen); +ssize_t ber_tlv_tag_fwrite(ber_tlv_tag_t tag, FILE *); +char *ber_tlv_tag_string(ber_tlv_tag_t tag); + + +/* + * This function tries to fetch the tag from the input stream. + * RETURN VALUES: + * 0: More data expected than bufptr contains. + * -1: Fatal error deciphering tag. + * >0: Number of bytes used from bufptr. tag_r will contain the tag. + */ +ssize_t ber_fetch_tag(const void *bufptr, size_t size, ber_tlv_tag_t *tag_r); + +/* + * This function serializes the tag (T from TLV) in BER format. + * It always returns number of bytes necessary to represent the tag, + * it is a caller's responsibility to check the return value + * against the supplied buffer's size. + */ +size_t ber_tlv_tag_serialize(ber_tlv_tag_t tag, void *bufptr, size_t size); + +#ifdef __cplusplus +} +#endif + +#endif /* _BER_TLV_TAG_H_ */ diff --git a/certgen/asncodec/constr_CHOICE.c b/certgen/asncodec/constr_CHOICE.c index 5f52e3d8bfa0671c14a04e370e3155e91b6252c7..5ffe9cddf9b574ad2c4addf1cc35a1b92b12c173 100644 --- a/certgen/asncodec/constr_CHOICE.c +++ b/certgen/asncodec/constr_CHOICE.c @@ -1,358 +1,358 @@ -/* - * Copyright (c) 2003-2017 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include - -asn_TYPE_operation_t asn_OP_CHOICE = { - CHOICE_free, -#if !defined(ASN_DISABLE_PRINT_SUPPORT) - CHOICE_print, -#else - 0, -#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ - CHOICE_compare, -#if !defined(ASN_DISABLE_BER_SUPPORT) - CHOICE_decode_ber, - CHOICE_encode_der, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ -#if !defined(ASN_DISABLE_XER_SUPPORT) - CHOICE_decode_xer, - CHOICE_encode_xer, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ -#if !defined(ASN_DISABLE_JER_SUPPORT) - CHOICE_encode_jer, -#else - 0, -#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ -#if !defined(ASN_DISABLE_OER_SUPPORT) - CHOICE_decode_oer, - CHOICE_encode_oer, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ -#if !defined(ASN_DISABLE_UPER_SUPPORT) - CHOICE_decode_uper, - CHOICE_encode_uper, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ -#if !defined(ASN_DISABLE_APER_SUPPORT) - CHOICE_decode_aper, - CHOICE_encode_aper, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ -#if !defined(ASN_DISABLE_RFILL_SUPPORT) - CHOICE_random_fill, -#else - 0, -#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ - CHOICE_outmost_tag -}; - -ber_tlv_tag_t -CHOICE_outmost_tag(const asn_TYPE_descriptor_t *td, const void *ptr, int tag_mode, ber_tlv_tag_t tag) { - const asn_CHOICE_specifics_t *specs = (const asn_CHOICE_specifics_t *)td->specifics; - unsigned present; - - assert(tag_mode == 0); (void)tag_mode; - assert(tag == 0); (void)tag; - - /* - * Figure out which CHOICE element is encoded. - */ - present = _fetch_present_idx(ptr, specs->pres_offset, specs->pres_size); - - if(present > 0 && present <= td->elements_count) { - const asn_TYPE_member_t *elm = &td->elements[present-1]; - const void *memb_ptr; - - if(elm->flags & ATF_POINTER) { - memb_ptr = *(const void * const *) - ((const char *)ptr + elm->memb_offset); - } else { - memb_ptr = (const void *) - ((const char *)ptr + elm->memb_offset); - } - - return asn_TYPE_outmost_tag(elm->type, memb_ptr, - elm->tag_mode, elm->tag); - } else { - return (ber_tlv_tag_t)-1; - } -} - -/* - * See the definitions. - */ -static const void *_get_member_ptr(const asn_TYPE_descriptor_t *, - const void *sptr, asn_TYPE_member_t **elm, - unsigned *present); - -int -CHOICE_constraint(const asn_TYPE_descriptor_t *td, const void *sptr, - asn_app_constraint_failed_f *ctfailcb, void *app_key) { - const asn_CHOICE_specifics_t *specs = - (const asn_CHOICE_specifics_t *)td->specifics; - unsigned present; - - if(!sptr) { - ASN__CTFAIL(app_key, td, sptr, - "%s: value not given (%s:%d)", - td->name, __FILE__, __LINE__); - return -1; - } - - /* - * Figure out which CHOICE element is encoded. - */ - present = _fetch_present_idx(sptr, specs->pres_offset,specs->pres_size); - if(present > 0 && present <= td->elements_count) { - asn_TYPE_member_t *elm = &td->elements[present-1]; - const void *memb_ptr; - - if(elm->flags & ATF_POINTER) { - memb_ptr = *(const void * const *)((const char *)sptr + elm->memb_offset); - if(!memb_ptr) { - if(elm->optional) - return 0; - ASN__CTFAIL(app_key, td, sptr, - "%s: mandatory CHOICE element %s absent (%s:%d)", - td->name, elm->name, __FILE__, __LINE__); - return -1; - } - } else { - memb_ptr = (const void *)((const char *)sptr + elm->memb_offset); - } - - if(elm->encoding_constraints.general_constraints) { - return elm->encoding_constraints.general_constraints(elm->type, memb_ptr, - ctfailcb, app_key); - } else { - return elm->type->encoding_constraints.general_constraints(elm->type, - memb_ptr, ctfailcb, app_key); - } - } else { - ASN__CTFAIL(app_key, td, sptr, - "%s: no CHOICE element given (%s:%d)", - td->name, __FILE__, __LINE__); - return -1; - } -} - -void -CHOICE_free(const asn_TYPE_descriptor_t *td, void *ptr, - enum asn_struct_free_method method) { - const asn_CHOICE_specifics_t *specs = - (const asn_CHOICE_specifics_t *)td->specifics; - unsigned present; - - if(!td || !ptr) - return; - - ASN_DEBUG("Freeing %s as CHOICE", td->name); - - /* - * Figure out which CHOICE element is encoded. - */ - present = _fetch_present_idx(ptr, specs->pres_offset, specs->pres_size); - - /* - * Free that element. - */ - if(present > 0 && present <= td->elements_count) { - asn_TYPE_member_t *elm = &td->elements[present-1]; - void *memb_ptr; - - if(elm->flags & ATF_POINTER) { - memb_ptr = *(void **)((char *)ptr + elm->memb_offset); - if(memb_ptr) - ASN_STRUCT_FREE(*elm->type, memb_ptr); - } else { - memb_ptr = (void *)((char *)ptr + elm->memb_offset); - ASN_STRUCT_FREE_CONTENTS_ONLY(*elm->type, memb_ptr); - } - } - - switch(method) { - case ASFM_FREE_EVERYTHING: - FREEMEM(ptr); - break; - case ASFM_FREE_UNDERLYING: - break; - case ASFM_FREE_UNDERLYING_AND_RESET: - memset(ptr, 0, specs->struct_size); - break; - } -} - - -/* - * The following functions functions offer protection against -fshort-enums, - * compatible with little- and big-endian machines. - * If assertion is triggered, either disable -fshort-enums, or add an entry - * here with the ->pres_size of your target stracture. - * Unless the target structure is packed, the ".present" member - * is guaranteed to be aligned properly. ASN.1 compiler itself does not - * produce packed code. - */ -unsigned -_fetch_present_idx(const void *struct_ptr, unsigned pres_offset, - unsigned pres_size) { - const void *present_ptr; - unsigned present; - - present_ptr = ((const char *)struct_ptr) + pres_offset; - - switch(pres_size) { - case sizeof(int): present = *(const unsigned int *)present_ptr; break; - case sizeof(short): present = *(const unsigned short *)present_ptr; break; - case sizeof(char): present = *(const unsigned char *)present_ptr; break; - default: - /* ANSI C mandates enum to be equivalent to integer */ - assert(pres_size != sizeof(int)); - return 0; /* If not aborted, pass back safe value */ - } - - return present; -} - -void -_set_present_idx(void *struct_ptr, unsigned pres_offset, unsigned pres_size, - unsigned present) { - void *present_ptr; - present_ptr = ((char *)struct_ptr) + pres_offset; - - switch(pres_size) { - case sizeof(int): *(unsigned int *)present_ptr = present; break; - case sizeof(short): *(unsigned short *)present_ptr = present; break; - case sizeof(char): *(unsigned char *)present_ptr = present; break; - default: - /* ANSI C mandates enum to be equivalent to integer */ - assert(pres_size != sizeof(int)); - } -} - -static const void * -_get_member_ptr(const asn_TYPE_descriptor_t *td, const void *sptr, - asn_TYPE_member_t **elm_ptr, unsigned *present_out) { - const asn_CHOICE_specifics_t *specs = - (const asn_CHOICE_specifics_t *)td->specifics; - unsigned present; - - if(!sptr) { - *elm_ptr = NULL; - *present_out = 0; - return NULL; - } - - /* - * Figure out which CHOICE element is encoded. - */ - present = _fetch_present_idx(sptr, specs->pres_offset, specs->pres_size); - *present_out = present; - - /* - * The presence index is intentionally 1-based to avoid - * treating zeroed structure as a valid one. - */ - if(present > 0 && present <= td->elements_count) { - asn_TYPE_member_t *const elm = &td->elements[present - 1]; - const void *memb_ptr; - - if(elm->flags & ATF_POINTER) { - memb_ptr = - *(const void *const *)((const char *)sptr + elm->memb_offset); - } else { - memb_ptr = (const void *)((const char *)sptr + elm->memb_offset); - } - *elm_ptr = elm; - return memb_ptr; - } else { - *elm_ptr = NULL; - return NULL; - } - -} - -int -CHOICE_compare(const asn_TYPE_descriptor_t *td, const void *aptr, const void *bptr) { - asn_TYPE_member_t *aelm; - asn_TYPE_member_t *belm; - unsigned apresent = 0; - unsigned bpresent = 0; - const void *amember = _get_member_ptr(td, aptr, &aelm, &apresent); - const void *bmember = _get_member_ptr(td, bptr, &belm, &bpresent); - - if(amember && bmember) { - if(apresent == bpresent) { - assert(aelm == belm); - return aelm->type->op->compare_struct(aelm->type, amember, bmember); - } else if(apresent < bpresent) { - return -1; - } else { - return 1; - } - } else if(!amember) { - return -1; - } else { - return 1; - } -} - -/* - * Return the 1-based choice variant presence index. - * Returns 0 in case of error. - */ -unsigned -CHOICE_variant_get_presence(const asn_TYPE_descriptor_t *td, const void *sptr) { - const asn_CHOICE_specifics_t *specs = - (const asn_CHOICE_specifics_t *)td->specifics; - return _fetch_present_idx(sptr, specs->pres_offset, specs->pres_size); -} - -/* - * Sets or resets the 1-based choice variant presence index. - * In case a previous index is not zero, the currently selected structure - * member is freed and zeroed-out first. - * Returns 0 on success and -1 on error. - */ -int -CHOICE_variant_set_presence(const asn_TYPE_descriptor_t *td, void *sptr, - unsigned present) { - const asn_CHOICE_specifics_t *specs = - (const asn_CHOICE_specifics_t *)td->specifics; - unsigned old_present; - - if(!sptr) { - return -1; - } - - if(present > td->elements_count) - return -1; - - old_present = - _fetch_present_idx(sptr, specs->pres_offset, specs->pres_size); - if(present == old_present) - return 0; - - if(old_present != 0) { - assert(old_present <= td->elements_count); - ASN_STRUCT_RESET(*td, sptr); - } - - _set_present_idx(sptr, specs->pres_offset, specs->pres_size, present); - - return 0; -} +/* + * Copyright (c) 2003-2017 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include + +asn_TYPE_operation_t asn_OP_CHOICE = { + CHOICE_free, +#if !defined(ASN_DISABLE_PRINT_SUPPORT) + CHOICE_print, +#else + 0, +#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ + CHOICE_compare, +#if !defined(ASN_DISABLE_BER_SUPPORT) + CHOICE_decode_ber, + CHOICE_encode_der, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ +#if !defined(ASN_DISABLE_XER_SUPPORT) + CHOICE_decode_xer, + CHOICE_encode_xer, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ +#if !defined(ASN_DISABLE_JER_SUPPORT) + CHOICE_encode_jer, +#else + 0, +#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ +#if !defined(ASN_DISABLE_OER_SUPPORT) + CHOICE_decode_oer, + CHOICE_encode_oer, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ +#if !defined(ASN_DISABLE_UPER_SUPPORT) + CHOICE_decode_uper, + CHOICE_encode_uper, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ +#if !defined(ASN_DISABLE_APER_SUPPORT) + CHOICE_decode_aper, + CHOICE_encode_aper, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ +#if !defined(ASN_DISABLE_RFILL_SUPPORT) + CHOICE_random_fill, +#else + 0, +#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ + CHOICE_outmost_tag +}; + +ber_tlv_tag_t +CHOICE_outmost_tag(const asn_TYPE_descriptor_t *td, const void *ptr, int tag_mode, ber_tlv_tag_t tag) { + const asn_CHOICE_specifics_t *specs = (const asn_CHOICE_specifics_t *)td->specifics; + unsigned present; + + assert(tag_mode == 0); (void)tag_mode; + assert(tag == 0); (void)tag; + + /* + * Figure out which CHOICE element is encoded. + */ + present = _fetch_present_idx(ptr, specs->pres_offset, specs->pres_size); + + if(present > 0 && present <= td->elements_count) { + const asn_TYPE_member_t *elm = &td->elements[present-1]; + const void *memb_ptr; + + if(elm->flags & ATF_POINTER) { + memb_ptr = *(const void * const *) + ((const char *)ptr + elm->memb_offset); + } else { + memb_ptr = (const void *) + ((const char *)ptr + elm->memb_offset); + } + + return asn_TYPE_outmost_tag(elm->type, memb_ptr, + elm->tag_mode, elm->tag); + } else { + return (ber_tlv_tag_t)-1; + } +} + +/* + * See the definitions. + */ +static const void *_get_member_ptr(const asn_TYPE_descriptor_t *, + const void *sptr, asn_TYPE_member_t **elm, + unsigned *present); + +int +CHOICE_constraint(const asn_TYPE_descriptor_t *td, const void *sptr, + asn_app_constraint_failed_f *ctfailcb, void *app_key) { + const asn_CHOICE_specifics_t *specs = + (const asn_CHOICE_specifics_t *)td->specifics; + unsigned present; + + if(!sptr) { + ASN__CTFAIL(app_key, td, sptr, + "%s: value not given (%s:%d)", + td->name, __FILE__, __LINE__); + return -1; + } + + /* + * Figure out which CHOICE element is encoded. + */ + present = _fetch_present_idx(sptr, specs->pres_offset,specs->pres_size); + if(present > 0 && present <= td->elements_count) { + asn_TYPE_member_t *elm = &td->elements[present-1]; + const void *memb_ptr; + + if(elm->flags & ATF_POINTER) { + memb_ptr = *(const void * const *)((const char *)sptr + elm->memb_offset); + if(!memb_ptr) { + if(elm->optional) + return 0; + ASN__CTFAIL(app_key, td, sptr, + "%s: mandatory CHOICE element %s absent (%s:%d)", + td->name, elm->name, __FILE__, __LINE__); + return -1; + } + } else { + memb_ptr = (const void *)((const char *)sptr + elm->memb_offset); + } + + if(elm->encoding_constraints.general_constraints) { + return elm->encoding_constraints.general_constraints(elm->type, memb_ptr, + ctfailcb, app_key); + } else { + return elm->type->encoding_constraints.general_constraints(elm->type, + memb_ptr, ctfailcb, app_key); + } + } else { + ASN__CTFAIL(app_key, td, sptr, + "%s: no CHOICE element given (%s:%d)", + td->name, __FILE__, __LINE__); + return -1; + } +} + +void +CHOICE_free(const asn_TYPE_descriptor_t *td, void *ptr, + enum asn_struct_free_method method) { + const asn_CHOICE_specifics_t *specs = + (const asn_CHOICE_specifics_t *)td->specifics; + unsigned present; + + if(!td || !ptr) + return; + + ASN_DEBUG("Freeing %s as CHOICE", td->name); + + /* + * Figure out which CHOICE element is encoded. + */ + present = _fetch_present_idx(ptr, specs->pres_offset, specs->pres_size); + + /* + * Free that element. + */ + if(present > 0 && present <= td->elements_count) { + asn_TYPE_member_t *elm = &td->elements[present-1]; + void *memb_ptr; + + if(elm->flags & ATF_POINTER) { + memb_ptr = *(void **)((char *)ptr + elm->memb_offset); + if(memb_ptr) + ASN_STRUCT_FREE(*elm->type, memb_ptr); + } else { + memb_ptr = (void *)((char *)ptr + elm->memb_offset); + ASN_STRUCT_FREE_CONTENTS_ONLY(*elm->type, memb_ptr); + } + } + + switch(method) { + case ASFM_FREE_EVERYTHING: + FREEMEM(ptr); + break; + case ASFM_FREE_UNDERLYING: + break; + case ASFM_FREE_UNDERLYING_AND_RESET: + memset(ptr, 0, specs->struct_size); + break; + } +} + + +/* + * The following functions functions offer protection against -fshort-enums, + * compatible with little- and big-endian machines. + * If assertion is triggered, either disable -fshort-enums, or add an entry + * here with the ->pres_size of your target stracture. + * Unless the target structure is packed, the ".present" member + * is guaranteed to be aligned properly. ASN.1 compiler itself does not + * produce packed code. + */ +unsigned +_fetch_present_idx(const void *struct_ptr, unsigned pres_offset, + unsigned pres_size) { + const void *present_ptr; + unsigned present; + + present_ptr = ((const char *)struct_ptr) + pres_offset; + + switch(pres_size) { + case sizeof(int): present = *(const unsigned int *)present_ptr; break; + case sizeof(short): present = *(const unsigned short *)present_ptr; break; + case sizeof(char): present = *(const unsigned char *)present_ptr; break; + default: + /* ANSI C mandates enum to be equivalent to integer */ + assert(pres_size != sizeof(int)); + return 0; /* If not aborted, pass back safe value */ + } + + return present; +} + +void +_set_present_idx(void *struct_ptr, unsigned pres_offset, unsigned pres_size, + unsigned present) { + void *present_ptr; + present_ptr = ((char *)struct_ptr) + pres_offset; + + switch(pres_size) { + case sizeof(int): *(unsigned int *)present_ptr = present; break; + case sizeof(short): *(unsigned short *)present_ptr = present; break; + case sizeof(char): *(unsigned char *)present_ptr = present; break; + default: + /* ANSI C mandates enum to be equivalent to integer */ + assert(pres_size != sizeof(int)); + } +} + +static const void * +_get_member_ptr(const asn_TYPE_descriptor_t *td, const void *sptr, + asn_TYPE_member_t **elm_ptr, unsigned *present_out) { + const asn_CHOICE_specifics_t *specs = + (const asn_CHOICE_specifics_t *)td->specifics; + unsigned present; + + if(!sptr) { + *elm_ptr = NULL; + *present_out = 0; + return NULL; + } + + /* + * Figure out which CHOICE element is encoded. + */ + present = _fetch_present_idx(sptr, specs->pres_offset, specs->pres_size); + *present_out = present; + + /* + * The presence index is intentionally 1-based to avoid + * treating zeroed structure as a valid one. + */ + if(present > 0 && present <= td->elements_count) { + asn_TYPE_member_t *const elm = &td->elements[present - 1]; + const void *memb_ptr; + + if(elm->flags & ATF_POINTER) { + memb_ptr = + *(const void *const *)((const char *)sptr + elm->memb_offset); + } else { + memb_ptr = (const void *)((const char *)sptr + elm->memb_offset); + } + *elm_ptr = elm; + return memb_ptr; + } else { + *elm_ptr = NULL; + return NULL; + } + +} + +int +CHOICE_compare(const asn_TYPE_descriptor_t *td, const void *aptr, const void *bptr) { + asn_TYPE_member_t *aelm; + asn_TYPE_member_t *belm; + unsigned apresent = 0; + unsigned bpresent = 0; + const void *amember = _get_member_ptr(td, aptr, &aelm, &apresent); + const void *bmember = _get_member_ptr(td, bptr, &belm, &bpresent); + + if(amember && bmember) { + if(apresent == bpresent) { + assert(aelm == belm); + return aelm->type->op->compare_struct(aelm->type, amember, bmember); + } else if(apresent < bpresent) { + return -1; + } else { + return 1; + } + } else if(!amember) { + return -1; + } else { + return 1; + } +} + +/* + * Return the 1-based choice variant presence index. + * Returns 0 in case of error. + */ +unsigned +CHOICE_variant_get_presence(const asn_TYPE_descriptor_t *td, const void *sptr) { + const asn_CHOICE_specifics_t *specs = + (const asn_CHOICE_specifics_t *)td->specifics; + return _fetch_present_idx(sptr, specs->pres_offset, specs->pres_size); +} + +/* + * Sets or resets the 1-based choice variant presence index. + * In case a previous index is not zero, the currently selected structure + * member is freed and zeroed-out first. + * Returns 0 on success and -1 on error. + */ +int +CHOICE_variant_set_presence(const asn_TYPE_descriptor_t *td, void *sptr, + unsigned present) { + const asn_CHOICE_specifics_t *specs = + (const asn_CHOICE_specifics_t *)td->specifics; + unsigned old_present; + + if(!sptr) { + return -1; + } + + if(present > td->elements_count) + return -1; + + old_present = + _fetch_present_idx(sptr, specs->pres_offset, specs->pres_size); + if(present == old_present) + return 0; + + if(old_present != 0) { + assert(old_present <= td->elements_count); + ASN_STRUCT_RESET(*td, sptr); + } + + _set_present_idx(sptr, specs->pres_offset, specs->pres_size, present); + + return 0; +} diff --git a/certgen/asncodec/constr_CHOICE.h b/certgen/asncodec/constr_CHOICE.h index 03d606c88cfc211ae816843ab5e720b578898272..5a9ef8392c6bb6497f4bae5ae403e7adca5b275f 100644 --- a/certgen/asncodec/constr_CHOICE.h +++ b/certgen/asncodec/constr_CHOICE.h @@ -1,119 +1,119 @@ -/* - * Copyright (c) 2003-2017 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#ifndef _CONSTR_CHOICE_H_ -#define _CONSTR_CHOICE_H_ - -#include - -#ifdef __cplusplus -extern "C" { -#endif - -typedef struct asn_CHOICE_specifics_s { - /* - * Target structure description. - */ - unsigned struct_size; /* Size of the target structure. */ - unsigned ctx_offset; /* Offset of the asn_codec_ctx_t member */ - unsigned pres_offset; /* Identifier of the present member */ - unsigned pres_size; /* Size of the identifier (enum) */ - - /* - * Tags to members mapping table. - */ - const asn_TYPE_tag2member_t *tag2el; - unsigned tag2el_count; - - /* Canonical ordering of CHOICE elements, for PER */ - const unsigned *to_canonical_order; - const unsigned *from_canonical_order; - - /* - * Extensions-related stuff. - */ - signed ext_start; /* First member of extensions, or -1 */ -} asn_CHOICE_specifics_t; - -/* - * A set specialized functions dealing with the CHOICE type. - */ -asn_struct_free_f CHOICE_free; - -#if !defined(ASN_DISABLE_PRINT_SUPPORT) -asn_struct_print_f CHOICE_print; -#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ - -asn_struct_compare_f CHOICE_compare; - -asn_constr_check_f CHOICE_constraint; - -#if !defined(ASN_DISABLE_BER_SUPPORT) -ber_type_decoder_f CHOICE_decode_ber; -der_type_encoder_f CHOICE_encode_der; -#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ - -#if !defined(ASN_DISABLE_XER_SUPPORT) -xer_type_decoder_f CHOICE_decode_xer; -xer_type_encoder_f CHOICE_encode_xer; -#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ - -#if !defined(ASN_DISABLE_JER_SUPPORT) -jer_type_encoder_f CHOICE_encode_jer; -#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ - -#if !defined(ASN_DISABLE_OER_SUPPORT) -oer_type_decoder_f CHOICE_decode_oer; -oer_type_encoder_f CHOICE_encode_oer; -#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ - -#if !defined(ASN_DISABLE_UPER_SUPPORT) -per_type_decoder_f CHOICE_decode_uper; -per_type_encoder_f CHOICE_encode_uper; -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ -#if !defined(ASN_DISABLE_APER_SUPPORT) -per_type_decoder_f CHOICE_decode_aper; -per_type_encoder_f CHOICE_encode_aper; -#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ - -#if !defined(ASN_DISABLE_RFILL_SUPPORT) -asn_random_fill_f CHOICE_random_fill; -#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ - -asn_outmost_tag_f CHOICE_outmost_tag; - -extern asn_TYPE_operation_t asn_OP_CHOICE; - -unsigned _fetch_present_idx( - const void *struct_ptr, - unsigned off, - unsigned size); - -void _set_present_idx( - void *sptr, - unsigned offset, - unsigned size, - unsigned present); - -/* - * Return the 1-based choice variant presence index. - * Returns 0 in case of error. - */ -unsigned CHOICE_variant_get_presence(const asn_TYPE_descriptor_t *td, - const void *structure_ptr); - -/* - * Sets or resets the 1-based choice variant presence index. - * In case a previous index is not zero, the currently selected structure - * member is freed and zeroed-out first. - * Returns 0 on success and -1 on error. - */ -int CHOICE_variant_set_presence(const asn_TYPE_descriptor_t *td, - void *structure_ptr, unsigned present); - -#ifdef __cplusplus -} -#endif - -#endif /* _CONSTR_CHOICE_H_ */ +/* + * Copyright (c) 2003-2017 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#ifndef _CONSTR_CHOICE_H_ +#define _CONSTR_CHOICE_H_ + +#include + +#ifdef __cplusplus +extern "C" { +#endif + +typedef struct asn_CHOICE_specifics_s { + /* + * Target structure description. + */ + unsigned struct_size; /* Size of the target structure. */ + unsigned ctx_offset; /* Offset of the asn_codec_ctx_t member */ + unsigned pres_offset; /* Identifier of the present member */ + unsigned pres_size; /* Size of the identifier (enum) */ + + /* + * Tags to members mapping table. + */ + const asn_TYPE_tag2member_t *tag2el; + unsigned tag2el_count; + + /* Canonical ordering of CHOICE elements, for PER */ + const unsigned *to_canonical_order; + const unsigned *from_canonical_order; + + /* + * Extensions-related stuff. + */ + signed ext_start; /* First member of extensions, or -1 */ +} asn_CHOICE_specifics_t; + +/* + * A set specialized functions dealing with the CHOICE type. + */ +asn_struct_free_f CHOICE_free; + +#if !defined(ASN_DISABLE_PRINT_SUPPORT) +asn_struct_print_f CHOICE_print; +#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ + +asn_struct_compare_f CHOICE_compare; + +asn_constr_check_f CHOICE_constraint; + +#if !defined(ASN_DISABLE_BER_SUPPORT) +ber_type_decoder_f CHOICE_decode_ber; +der_type_encoder_f CHOICE_encode_der; +#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ + +#if !defined(ASN_DISABLE_XER_SUPPORT) +xer_type_decoder_f CHOICE_decode_xer; +xer_type_encoder_f CHOICE_encode_xer; +#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ + +#if !defined(ASN_DISABLE_JER_SUPPORT) +jer_type_encoder_f CHOICE_encode_jer; +#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ + +#if !defined(ASN_DISABLE_OER_SUPPORT) +oer_type_decoder_f CHOICE_decode_oer; +oer_type_encoder_f CHOICE_encode_oer; +#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ + +#if !defined(ASN_DISABLE_UPER_SUPPORT) +per_type_decoder_f CHOICE_decode_uper; +per_type_encoder_f CHOICE_encode_uper; +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ +#if !defined(ASN_DISABLE_APER_SUPPORT) +per_type_decoder_f CHOICE_decode_aper; +per_type_encoder_f CHOICE_encode_aper; +#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ + +#if !defined(ASN_DISABLE_RFILL_SUPPORT) +asn_random_fill_f CHOICE_random_fill; +#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ + +asn_outmost_tag_f CHOICE_outmost_tag; + +extern asn_TYPE_operation_t asn_OP_CHOICE; + +unsigned _fetch_present_idx( + const void *struct_ptr, + unsigned off, + unsigned size); + +void _set_present_idx( + void *sptr, + unsigned offset, + unsigned size, + unsigned present); + +/* + * Return the 1-based choice variant presence index. + * Returns 0 in case of error. + */ +unsigned CHOICE_variant_get_presence(const asn_TYPE_descriptor_t *td, + const void *structure_ptr); + +/* + * Sets or resets the 1-based choice variant presence index. + * In case a previous index is not zero, the currently selected structure + * member is freed and zeroed-out first. + * Returns 0 on success and -1 on error. + */ +int CHOICE_variant_set_presence(const asn_TYPE_descriptor_t *td, + void *structure_ptr, unsigned present); + +#ifdef __cplusplus +} +#endif + +#endif /* _CONSTR_CHOICE_H_ */ diff --git a/certgen/asncodec/constr_CHOICE_oer.c b/certgen/asncodec/constr_CHOICE_oer.c index fc3c488baa882c3dd8425bff93df771fa10907ca..ac1ab3af54e1846ecacd4e8731619bdeb6ba1c4c 100644 --- a/certgen/asncodec/constr_CHOICE_oer.c +++ b/certgen/asncodec/constr_CHOICE_oer.c @@ -1,377 +1,377 @@ -/* - * Copyright (c) 2017 Lev Walkin . - * All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include - -/* - * Return a standardized complex structure. - */ -#undef RETURN -#define RETURN(_code) \ - do { \ - asn_dec_rval_t rval; \ - rval.code = _code; \ - rval.consumed = consumed_myself; \ - return rval; \ - } while(0) - -#undef ADVANCE -#define ADVANCE(num_bytes) \ - do { \ - size_t num = num_bytes; \ - ptr = ((const char *)ptr) + num; \ - size -= num; \ - consumed_myself += num; \ - } while(0) - -/* - * Switch to the next phase of parsing. - */ -#undef NEXT_PHASE -#define NEXT_PHASE(ctx) \ - do { \ - ctx->phase++; \ - ctx->step = 0; \ - } while(0) -#undef SET_PHASE -#define SET_PHASE(ctx, value) \ - do { \ - ctx->phase = value; \ - ctx->step = 0; \ - } while(0) - -/* - * Tags are canonically sorted in the tag to member table. - */ -static int -_search4tag(const void *ap, const void *bp) { - const asn_TYPE_tag2member_t *a = (const asn_TYPE_tag2member_t *)ap; - const asn_TYPE_tag2member_t *b = (const asn_TYPE_tag2member_t *)bp; - - int a_class = BER_TAG_CLASS(a->el_tag); - int b_class = BER_TAG_CLASS(b->el_tag); - - if(a_class == b_class) { - ber_tlv_tag_t a_value = BER_TAG_VALUE(a->el_tag); - ber_tlv_tag_t b_value = BER_TAG_VALUE(b->el_tag); - - if(a_value == b_value) - return 0; - else if(a_value < b_value) - return -1; - else - return 1; - } else if(a_class < b_class) { - return -1; - } else { - return 1; - } -} - -/* - * X.696 (08/2015) #8.7 Encoding of tags - */ -static ssize_t -oer_fetch_tag(const void *ptr, size_t size, ber_tlv_tag_t *tag_r) { - ber_tlv_tag_t val; - ber_tlv_tag_t tclass; - size_t skipped; - - if(size == 0) - return 0; - - val = *(const uint8_t *)ptr; - tclass = (val >> 6); - if((val & 0x3F) != 0x3F) { - /* #8.7.1 */ - *tag_r = ((val & 0x3F) << 2) | tclass; - return 1; - } - - /* - * Each octet contains 7 bits of useful information. - * The MSB is 0 if it is the last octet of the tag. - */ - for(val = 0, ptr = ((const char *)ptr) + 1, skipped = 2; skipped <= size; - ptr = ((const char *)ptr) + 1, skipped++) { - unsigned int oct = *(const uint8_t *)ptr; - if(oct & 0x80) { - val = (val << 7) | (oct & 0x7F); - /* - * Make sure there are at least 9 bits spare - * at the MS side of a value. - */ - if(val >> ((8 * sizeof(val)) - 9)) { - /* - * We would not be able to accommodate - * any more tag bits. - */ - return -1; - } - } else { - val = (val << 7) | oct; - *tag_r = (val << 2) | tclass; - return skipped; - } - } - - return 0; /* Want more */ -} - -asn_dec_rval_t -CHOICE_decode_oer(const asn_codec_ctx_t *opt_codec_ctx, - const asn_TYPE_descriptor_t *td, - const asn_oer_constraints_t *constraints, void **struct_ptr, - const void *ptr, size_t size) { - /* - * Bring closer parts of structure description. - */ - const asn_CHOICE_specifics_t *specs = - (const asn_CHOICE_specifics_t *)td->specifics; - asn_TYPE_member_t *elements = td->elements; - - /* - * Parts of the structure being constructed. - */ - void *st = *struct_ptr; /* Target structure. */ - asn_struct_ctx_t *ctx; /* Decoder context */ - - ssize_t consumed_myself = 0; /* Consumed bytes from ptr */ - - (void)constraints; - - ASN_DEBUG("Decoding %s as CHOICE", td->name); - - /* - * Create the target structure if it is not present already. - */ - if(st == 0) { - st = *struct_ptr = CALLOC(1, specs->struct_size); - if(st == 0) { - RETURN(RC_FAIL); - } - } - - /* - * Restore parsing context. - */ - ctx = (asn_struct_ctx_t *)((char *)st + specs->ctx_offset); - switch(ctx->phase) { - case 0: { - /* - * Discover the tag. - */ - ber_tlv_tag_t tlv_tag; /* T from TLV */ - ssize_t tag_len; /* Length of TLV's T */ - - tag_len = oer_fetch_tag(ptr, size, &tlv_tag); - switch(tag_len) { - case 0: - ASN__DECODE_STARVED; - case -1: - ASN__DECODE_FAILED; - } - ctx->start = ptr; - - do { - const asn_TYPE_tag2member_t *t2m; - asn_TYPE_tag2member_t key = {0, 0, 0, 0}; - key.el_tag = tlv_tag; - - t2m = (const asn_TYPE_tag2member_t *)bsearch( - &key, specs->tag2el, specs->tag2el_count, - sizeof(specs->tag2el[0]), _search4tag); - if(t2m) { - /* - * Found the element corresponding to the tag. - */ - NEXT_PHASE(ctx); - ctx->step = t2m->el_no; - break; - } else if(specs->ext_start == -1) { - ASN_DEBUG( - "Unexpected tag %s " - "in non-extensible CHOICE %s", - ber_tlv_tag_string(tlv_tag), td->name); - RETURN(RC_FAIL); - } else { - /* Skip open type extension */ - ASN_DEBUG( - "Not implemented skipping open type extension for tag %s", - ber_tlv_tag_string(tlv_tag)); - RETURN(RC_FAIL); - } - } while(0); - - - ADVANCE(tag_len); - } - /* Fall through */ - case 1: { - asn_TYPE_member_t *elm = &elements[ctx->step]; /* CHOICE's element */ - void *memb_ptr; /* Pointer to the member */ - void **memb_ptr2; /* Pointer to that pointer */ - asn_dec_rval_t rval = {0,0}; - - /* - * Compute the position of the member inside a structure, - * and also a type of containment (it may be contained - * as pointer or using inline inclusion). - */ - if(elm->flags & ATF_POINTER) { - /* Member is a pointer to another structure */ - memb_ptr2 = (void **)((char *)st + elm->memb_offset); - } else { - /* - * A pointer to a pointer - * holding the start of the structure - */ - memb_ptr = (char *)st + elm->memb_offset; - memb_ptr2 = &memb_ptr; - } - - /* Set presence to be able to free it properly at any time */ - (void)CHOICE_variant_set_presence(td, st, ctx->step + 1); - - if(specs->ext_start >= 0 && specs->ext_start <= ctx->step) { - ssize_t got = - oer_open_type_get(opt_codec_ctx, elm->type, - elm->encoding_constraints.oer_constraints, - memb_ptr2, ptr, size); - if(got < 0) ASN__DECODE_FAILED; - if(got == 0) ASN__DECODE_STARVED; - rval.code = RC_OK; - rval.consumed = got; - } else { - rval = elm->type->op->oer_decoder( - opt_codec_ctx, elm->type, - elm->encoding_constraints.oer_constraints, memb_ptr2, ptr, - size); - } - rval.consumed += consumed_myself; - switch(rval.code) { - case RC_OK: - NEXT_PHASE(ctx); - case RC_WMORE: - break; - case RC_FAIL: - SET_PHASE(ctx, 3); /* => 3 */ - } - return rval; - } - case 2: - /* Already decoded everything */ - ctx->left = consumed_myself; - RETURN(RC_OK); - case 3: - /* Failed to decode, after all */ - RETURN(RC_FAIL); - } - - RETURN(RC_FAIL); -} - -/* - * X.696 (08/2015) #8.7 Encoding of tags - */ -static ssize_t -oer_put_tag(ber_tlv_tag_t tag, asn_app_consume_bytes_f *cb, void *app_key) { - uint8_t tclass = BER_TAG_CLASS(tag); - ber_tlv_tag_t tval = BER_TAG_VALUE(tag); - - if(tval < 0x3F) { - uint8_t b = (uint8_t)((tclass << 6) | tval); - if(cb(&b, 1, app_key) < 0) { - return -1; - } - return 1; - } else { - uint8_t buf[1 + 2 * sizeof(tval)]; - uint8_t *b = &buf[sizeof(buf)-1]; /* Last addressable */ - size_t encoded; - for(; ; tval >>= 7) { - if(tval >> 7) { - *b-- = 0x80 | (tval & 0x7f); - } else { - *b-- = tval & 0x7f; - break; - } - } - *b = (uint8_t)((tclass << 6) | 0x3F); - encoded = sizeof(buf) - (b - buf); - if(cb(b, encoded, app_key) < 0) { - return -1; - } - return encoded; - } - -} - -/* - * Encode as Canonical OER. - */ -asn_enc_rval_t -CHOICE_encode_oer(const asn_TYPE_descriptor_t *td, - const asn_oer_constraints_t *constraints, const void *sptr, - asn_app_consume_bytes_f *cb, void *app_key) { - const asn_CHOICE_specifics_t *specs = - (const asn_CHOICE_specifics_t *)td->specifics; - asn_TYPE_member_t *elm; /* CHOICE element */ - unsigned present; - const void *memb_ptr; - ber_tlv_tag_t tag; - ssize_t tag_len; - asn_enc_rval_t er = {0, 0, 0}; - - (void)constraints; - - if(!sptr) ASN__ENCODE_FAILED; - - ASN_DEBUG("OER %s encoding as CHOICE", td->name); - - present = CHOICE_variant_get_presence(td, sptr); - if(present == 0 || present > td->elements_count) { - ASN_DEBUG("CHOICE %s member is not selected", td->name); - ASN__ENCODE_FAILED; - } - - elm = &td->elements[present-1]; - if(elm->flags & ATF_POINTER) { - memb_ptr = - *(const void *const *)((const char *)sptr + elm->memb_offset); - if(memb_ptr == 0) { - /* Mandatory element absent */ - ASN__ENCODE_FAILED; - } - } else { - memb_ptr = (const void *)((const char *)sptr + elm->memb_offset); - } - - tag = asn_TYPE_outmost_tag(elm->type, memb_ptr, elm->tag_mode, elm->tag); - if(tag == 0) { - ASN__ENCODE_FAILED; - } - - tag_len = oer_put_tag(tag, cb, app_key); - if(tag_len < 0) { - ASN__ENCODE_FAILED; - } - - if(specs->ext_start >= 0 && (unsigned)specs->ext_start <= (present-1)) { - ssize_t encoded = oer_open_type_put(elm->type, - elm->encoding_constraints.oer_constraints, - memb_ptr, cb, app_key); - if(encoded < 0) ASN__ENCODE_FAILED; - er.encoded = tag_len + encoded; - } else { - er = elm->type->op->oer_encoder( - elm->type, elm->encoding_constraints.oer_constraints, memb_ptr, cb, - app_key); - if(er.encoded >= 0) er.encoded += tag_len; - } - - return er; -} +/* + * Copyright (c) 2017 Lev Walkin . + * All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include + +/* + * Return a standardized complex structure. + */ +#undef RETURN +#define RETURN(_code) \ + do { \ + asn_dec_rval_t rval; \ + rval.code = _code; \ + rval.consumed = consumed_myself; \ + return rval; \ + } while(0) + +#undef ADVANCE +#define ADVANCE(num_bytes) \ + do { \ + size_t num = num_bytes; \ + ptr = ((const char *)ptr) + num; \ + size -= num; \ + consumed_myself += num; \ + } while(0) + +/* + * Switch to the next phase of parsing. + */ +#undef NEXT_PHASE +#define NEXT_PHASE(ctx) \ + do { \ + ctx->phase++; \ + ctx->step = 0; \ + } while(0) +#undef SET_PHASE +#define SET_PHASE(ctx, value) \ + do { \ + ctx->phase = value; \ + ctx->step = 0; \ + } while(0) + +/* + * Tags are canonically sorted in the tag to member table. + */ +static int +_search4tag(const void *ap, const void *bp) { + const asn_TYPE_tag2member_t *a = (const asn_TYPE_tag2member_t *)ap; + const asn_TYPE_tag2member_t *b = (const asn_TYPE_tag2member_t *)bp; + + int a_class = BER_TAG_CLASS(a->el_tag); + int b_class = BER_TAG_CLASS(b->el_tag); + + if(a_class == b_class) { + ber_tlv_tag_t a_value = BER_TAG_VALUE(a->el_tag); + ber_tlv_tag_t b_value = BER_TAG_VALUE(b->el_tag); + + if(a_value == b_value) + return 0; + else if(a_value < b_value) + return -1; + else + return 1; + } else if(a_class < b_class) { + return -1; + } else { + return 1; + } +} + +/* + * X.696 (08/2015) #8.7 Encoding of tags + */ +static ssize_t +oer_fetch_tag(const void *ptr, size_t size, ber_tlv_tag_t *tag_r) { + ber_tlv_tag_t val; + ber_tlv_tag_t tclass; + size_t skipped; + + if(size == 0) + return 0; + + val = *(const uint8_t *)ptr; + tclass = (val >> 6); + if((val & 0x3F) != 0x3F) { + /* #8.7.1 */ + *tag_r = ((val & 0x3F) << 2) | tclass; + return 1; + } + + /* + * Each octet contains 7 bits of useful information. + * The MSB is 0 if it is the last octet of the tag. + */ + for(val = 0, ptr = ((const char *)ptr) + 1, skipped = 2; skipped <= size; + ptr = ((const char *)ptr) + 1, skipped++) { + unsigned int oct = *(const uint8_t *)ptr; + if(oct & 0x80) { + val = (val << 7) | (oct & 0x7F); + /* + * Make sure there are at least 9 bits spare + * at the MS side of a value. + */ + if(val >> ((8 * sizeof(val)) - 9)) { + /* + * We would not be able to accommodate + * any more tag bits. + */ + return -1; + } + } else { + val = (val << 7) | oct; + *tag_r = (val << 2) | tclass; + return skipped; + } + } + + return 0; /* Want more */ +} + +asn_dec_rval_t +CHOICE_decode_oer(const asn_codec_ctx_t *opt_codec_ctx, + const asn_TYPE_descriptor_t *td, + const asn_oer_constraints_t *constraints, void **struct_ptr, + const void *ptr, size_t size) { + /* + * Bring closer parts of structure description. + */ + const asn_CHOICE_specifics_t *specs = + (const asn_CHOICE_specifics_t *)td->specifics; + asn_TYPE_member_t *elements = td->elements; + + /* + * Parts of the structure being constructed. + */ + void *st = *struct_ptr; /* Target structure. */ + asn_struct_ctx_t *ctx; /* Decoder context */ + + ssize_t consumed_myself = 0; /* Consumed bytes from ptr */ + + (void)constraints; + + ASN_DEBUG("Decoding %s as CHOICE", td->name); + + /* + * Create the target structure if it is not present already. + */ + if(st == 0) { + st = *struct_ptr = CALLOC(1, specs->struct_size); + if(st == 0) { + RETURN(RC_FAIL); + } + } + + /* + * Restore parsing context. + */ + ctx = (asn_struct_ctx_t *)((char *)st + specs->ctx_offset); + switch(ctx->phase) { + case 0: { + /* + * Discover the tag. + */ + ber_tlv_tag_t tlv_tag; /* T from TLV */ + ssize_t tag_len; /* Length of TLV's T */ + + tag_len = oer_fetch_tag(ptr, size, &tlv_tag); + switch(tag_len) { + case 0: + ASN__DECODE_STARVED; + case -1: + ASN__DECODE_FAILED; + } + ctx->start = ptr; + + do { + const asn_TYPE_tag2member_t *t2m; + asn_TYPE_tag2member_t key = {0, 0, 0, 0}; + key.el_tag = tlv_tag; + + t2m = (const asn_TYPE_tag2member_t *)bsearch( + &key, specs->tag2el, specs->tag2el_count, + sizeof(specs->tag2el[0]), _search4tag); + if(t2m) { + /* + * Found the element corresponding to the tag. + */ + NEXT_PHASE(ctx); + ctx->step = t2m->el_no; + break; + } else if(specs->ext_start == -1) { + ASN_DEBUG( + "Unexpected tag %s " + "in non-extensible CHOICE %s", + ber_tlv_tag_string(tlv_tag), td->name); + RETURN(RC_FAIL); + } else { + /* Skip open type extension */ + ASN_DEBUG( + "Not implemented skipping open type extension for tag %s", + ber_tlv_tag_string(tlv_tag)); + RETURN(RC_FAIL); + } + } while(0); + + + ADVANCE(tag_len); + } + /* Fall through */ + case 1: { + asn_TYPE_member_t *elm = &elements[ctx->step]; /* CHOICE's element */ + void *memb_ptr; /* Pointer to the member */ + void **memb_ptr2; /* Pointer to that pointer */ + asn_dec_rval_t rval = {0,0}; + + /* + * Compute the position of the member inside a structure, + * and also a type of containment (it may be contained + * as pointer or using inline inclusion). + */ + if(elm->flags & ATF_POINTER) { + /* Member is a pointer to another structure */ + memb_ptr2 = (void **)((char *)st + elm->memb_offset); + } else { + /* + * A pointer to a pointer + * holding the start of the structure + */ + memb_ptr = (char *)st + elm->memb_offset; + memb_ptr2 = &memb_ptr; + } + + /* Set presence to be able to free it properly at any time */ + (void)CHOICE_variant_set_presence(td, st, ctx->step + 1); + + if(specs->ext_start >= 0 && specs->ext_start <= ctx->step) { + ssize_t got = + oer_open_type_get(opt_codec_ctx, elm->type, + elm->encoding_constraints.oer_constraints, + memb_ptr2, ptr, size); + if(got < 0) ASN__DECODE_FAILED; + if(got == 0) ASN__DECODE_STARVED; + rval.code = RC_OK; + rval.consumed = got; + } else { + rval = elm->type->op->oer_decoder( + opt_codec_ctx, elm->type, + elm->encoding_constraints.oer_constraints, memb_ptr2, ptr, + size); + } + rval.consumed += consumed_myself; + switch(rval.code) { + case RC_OK: + NEXT_PHASE(ctx); + case RC_WMORE: + break; + case RC_FAIL: + SET_PHASE(ctx, 3); /* => 3 */ + } + return rval; + } + case 2: + /* Already decoded everything */ + ctx->left = consumed_myself; + RETURN(RC_OK); + case 3: + /* Failed to decode, after all */ + RETURN(RC_FAIL); + } + + RETURN(RC_FAIL); +} + +/* + * X.696 (08/2015) #8.7 Encoding of tags + */ +static ssize_t +oer_put_tag(ber_tlv_tag_t tag, asn_app_consume_bytes_f *cb, void *app_key) { + uint8_t tclass = BER_TAG_CLASS(tag); + ber_tlv_tag_t tval = BER_TAG_VALUE(tag); + + if(tval < 0x3F) { + uint8_t b = (uint8_t)((tclass << 6) | tval); + if(cb(&b, 1, app_key) < 0) { + return -1; + } + return 1; + } else { + uint8_t buf[1 + 2 * sizeof(tval)]; + uint8_t *b = &buf[sizeof(buf)-1]; /* Last addressable */ + size_t encoded; + for(; ; tval >>= 7) { + if(tval >> 7) { + *b-- = 0x80 | (tval & 0x7f); + } else { + *b-- = tval & 0x7f; + break; + } + } + *b = (uint8_t)((tclass << 6) | 0x3F); + encoded = sizeof(buf) - (b - buf); + if(cb(b, encoded, app_key) < 0) { + return -1; + } + return encoded; + } + +} + +/* + * Encode as Canonical OER. + */ +asn_enc_rval_t +CHOICE_encode_oer(const asn_TYPE_descriptor_t *td, + const asn_oer_constraints_t *constraints, const void *sptr, + asn_app_consume_bytes_f *cb, void *app_key) { + const asn_CHOICE_specifics_t *specs = + (const asn_CHOICE_specifics_t *)td->specifics; + asn_TYPE_member_t *elm; /* CHOICE element */ + unsigned present; + const void *memb_ptr; + ber_tlv_tag_t tag; + ssize_t tag_len; + asn_enc_rval_t er = {0, 0, 0}; + + (void)constraints; + + if(!sptr) ASN__ENCODE_FAILED; + + ASN_DEBUG("OER %s encoding as CHOICE", td->name); + + present = CHOICE_variant_get_presence(td, sptr); + if(present == 0 || present > td->elements_count) { + ASN_DEBUG("CHOICE %s member is not selected", td->name); + ASN__ENCODE_FAILED; + } + + elm = &td->elements[present-1]; + if(elm->flags & ATF_POINTER) { + memb_ptr = + *(const void *const *)((const char *)sptr + elm->memb_offset); + if(memb_ptr == 0) { + /* Mandatory element absent */ + ASN__ENCODE_FAILED; + } + } else { + memb_ptr = (const void *)((const char *)sptr + elm->memb_offset); + } + + tag = asn_TYPE_outmost_tag(elm->type, memb_ptr, elm->tag_mode, elm->tag); + if(tag == 0) { + ASN__ENCODE_FAILED; + } + + tag_len = oer_put_tag(tag, cb, app_key); + if(tag_len < 0) { + ASN__ENCODE_FAILED; + } + + if(specs->ext_start >= 0 && (unsigned)specs->ext_start <= (present-1)) { + ssize_t encoded = oer_open_type_put(elm->type, + elm->encoding_constraints.oer_constraints, + memb_ptr, cb, app_key); + if(encoded < 0) ASN__ENCODE_FAILED; + er.encoded = tag_len + encoded; + } else { + er = elm->type->op->oer_encoder( + elm->type, elm->encoding_constraints.oer_constraints, memb_ptr, cb, + app_key); + if(er.encoded >= 0) er.encoded += tag_len; + } + + return er; +} diff --git a/certgen/asncodec/constr_CHOICE_print.c b/certgen/asncodec/constr_CHOICE_print.c index a97202fc23c12e1445277f8ef7111cb62e4db1d6..590260b6339b0b24e9fa9e33ab867a2815932691 100644 --- a/certgen/asncodec/constr_CHOICE_print.c +++ b/certgen/asncodec/constr_CHOICE_print.c @@ -1,48 +1,48 @@ -/* - * Copyright (c) 2017 Lev Walkin . - * All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include - -int -CHOICE_print(const asn_TYPE_descriptor_t *td, const void *sptr, int ilevel, - asn_app_consume_bytes_f *cb, void *app_key) { - const asn_CHOICE_specifics_t *specs = (const asn_CHOICE_specifics_t *)td->specifics; - unsigned present; - - if(!sptr) return (cb("", 8, app_key) < 0) ? -1 : 0; - - /* - * Figure out which CHOICE element is encoded. - */ - present = _fetch_present_idx(sptr, specs->pres_offset,specs->pres_size); - - /* - * Print that element. - */ - if(present > 0 && present <= td->elements_count) { - asn_TYPE_member_t *elm = &td->elements[present-1]; - const void *memb_ptr; - - if(elm->flags & ATF_POINTER) { - memb_ptr = *(const void * const *)((const char *)sptr + elm->memb_offset); - if(!memb_ptr) return (cb("", 8, app_key) < 0) ? -1 : 0; - } else { - memb_ptr = (const void *)((const char *)sptr + elm->memb_offset); - } - - /* Print member's name and stuff */ - if(0) { - if(cb(elm->name, strlen(elm->name), app_key) < 0 - || cb(": ", 2, app_key) < 0) - return -1; - } - - return elm->type->op->print_struct(elm->type, memb_ptr, ilevel, - cb, app_key); - } else { - return (cb("", 8, app_key) < 0) ? -1 : 0; - } -} +/* + * Copyright (c) 2017 Lev Walkin . + * All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include + +int +CHOICE_print(const asn_TYPE_descriptor_t *td, const void *sptr, int ilevel, + asn_app_consume_bytes_f *cb, void *app_key) { + const asn_CHOICE_specifics_t *specs = (const asn_CHOICE_specifics_t *)td->specifics; + unsigned present; + + if(!sptr) return (cb("", 8, app_key) < 0) ? -1 : 0; + + /* + * Figure out which CHOICE element is encoded. + */ + present = _fetch_present_idx(sptr, specs->pres_offset,specs->pres_size); + + /* + * Print that element. + */ + if(present > 0 && present <= td->elements_count) { + asn_TYPE_member_t *elm = &td->elements[present-1]; + const void *memb_ptr; + + if(elm->flags & ATF_POINTER) { + memb_ptr = *(const void * const *)((const char *)sptr + elm->memb_offset); + if(!memb_ptr) return (cb("", 8, app_key) < 0) ? -1 : 0; + } else { + memb_ptr = (const void *)((const char *)sptr + elm->memb_offset); + } + + /* Print member's name and stuff */ + if(0) { + if(cb(elm->name, strlen(elm->name), app_key) < 0 + || cb(": ", 2, app_key) < 0) + return -1; + } + + return elm->type->op->print_struct(elm->type, memb_ptr, ilevel, + cb, app_key); + } else { + return (cb("", 8, app_key) < 0) ? -1 : 0; + } +} diff --git a/certgen/asncodec/constr_CHOICE_xer.c b/certgen/asncodec/constr_CHOICE_xer.c index 45b4290a806f1b7b0eef636b2888cde32c5abfed..43cf1febb3c1cc44d9e8af4272b88bcc9c99e675 100644 --- a/certgen/asncodec/constr_CHOICE_xer.c +++ b/certgen/asncodec/constr_CHOICE_xer.c @@ -1,316 +1,316 @@ -/* - * Copyright (c) 2017 Lev Walkin . - * All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include - -/* - * Return a standardized complex structure. - */ -#undef RETURN -#define RETURN(_code) \ - do { \ - rval.code = _code; \ - rval.consumed = consumed_myself; \ - return rval; \ - } while(0) - -#undef XER_ADVANCE -#define XER_ADVANCE(num_bytes) \ - do { \ - size_t num = num_bytes; \ - buf_ptr = (const void *)(((const char *)buf_ptr) + num); \ - size -= num; \ - consumed_myself += num; \ - } while(0) - -/* - * Decode the XER (XML) data. - */ -asn_dec_rval_t -CHOICE_decode_xer(const asn_codec_ctx_t *opt_codec_ctx, - const asn_TYPE_descriptor_t *td, void **struct_ptr, - const char *opt_mname, const void *buf_ptr, size_t size) { - /* - * Bring closer parts of structure description. - */ - const asn_CHOICE_specifics_t *specs = (const asn_CHOICE_specifics_t *)td->specifics; - const char *xml_tag = opt_mname ? opt_mname : td->xml_tag; - - /* - * Parts of the structure being constructed. - */ - void *st = *struct_ptr; /* Target structure. */ - asn_struct_ctx_t *ctx; /* Decoder context */ - - asn_dec_rval_t rval; /* Return value of a decoder */ - ssize_t consumed_myself = 0; /* Consumed bytes from ptr */ - size_t edx; /* Element index */ - - /* - * Create the target structure if it is not present already. - */ - if(st == 0) { - st = *struct_ptr = CALLOC(1, specs->struct_size); - if(st == 0) RETURN(RC_FAIL); - } - - /* - * Restore parsing context. - */ - ctx = (asn_struct_ctx_t *)((char *)st + specs->ctx_offset); - if(ctx->phase == 0 && !*xml_tag) - ctx->phase = 1; /* Skip the outer tag checking phase */ - - /* - * Phases of XER/XML processing: - * Phase 0: Check that the opening tag matches our expectations. - * Phase 1: Processing body and reacting on closing tag. - * Phase 2: Processing inner type. - * Phase 3: Only waiting for closing tag. - * Phase 4: Skipping unknown extensions. - * Phase 5: PHASED OUT - */ - for(edx = ctx->step; ctx->phase <= 4;) { - pxer_chunk_type_e ch_type; /* XER chunk type */ - ssize_t ch_size; /* Chunk size */ - xer_check_tag_e tcv; /* Tag check value */ - asn_TYPE_member_t *elm; - - /* - * Go inside the member. - */ - if(ctx->phase == 2) { - asn_dec_rval_t tmprval; - void *memb_ptr; /* Pointer to the member */ - void **memb_ptr2; /* Pointer to that pointer */ - unsigned old_present; - - elm = &td->elements[edx]; - - if(elm->flags & ATF_POINTER) { - /* Member is a pointer to another structure */ - memb_ptr2 = (void **)((char *)st - + elm->memb_offset); - } else { - memb_ptr = (char *)st + elm->memb_offset; - memb_ptr2 = &memb_ptr; - } - - /* Start/Continue decoding the inner member */ - tmprval = elm->type->op->xer_decoder(opt_codec_ctx, - elm->type, memb_ptr2, - elm->name, - buf_ptr, size); - XER_ADVANCE(tmprval.consumed); - ASN_DEBUG("XER/CHOICE: itdf: [%s] code=%d", - elm->type->name, tmprval.code); - old_present = _fetch_present_idx(st, - specs->pres_offset, - specs->pres_size); - assert(old_present == 0 || old_present == edx + 1); - /* Record what we've got */ - _set_present_idx(st, - specs->pres_offset, - specs->pres_size, edx + 1); - if(tmprval.code != RC_OK) - RETURN(tmprval.code); - ctx->phase = 3; - /* Fall through */ - } - - /* No need to wait for closing tag; special mode. */ - if(ctx->phase == 3 && !*xml_tag) { - ctx->phase = 5; /* Phase out */ - RETURN(RC_OK); - } - - /* - * Get the next part of the XML stream. - */ - ch_size = xer_next_token(&ctx->context, buf_ptr, size, &ch_type); - if(ch_size == -1) { - RETURN(RC_FAIL); - } else { - switch(ch_type) { - case PXER_WMORE: - RETURN(RC_WMORE); - case PXER_COMMENT: /* Got XML comment */ - case PXER_TEXT: /* Ignore free-standing text */ - XER_ADVANCE(ch_size); /* Skip silently */ - continue; - case PXER_TAG: - break; /* Check the rest down there */ - } - } - - tcv = xer_check_tag(buf_ptr, ch_size, xml_tag); - ASN_DEBUG("XER/CHOICE checked [%c%c%c%c] vs [%s], tcv=%d", - ch_size>0?((const uint8_t *)buf_ptr)[0]:'?', - ch_size>1?((const uint8_t *)buf_ptr)[1]:'?', - ch_size>2?((const uint8_t *)buf_ptr)[2]:'?', - ch_size>3?((const uint8_t *)buf_ptr)[3]:'?', - xml_tag, tcv); - - /* Skip the extensions section */ - if(ctx->phase == 4) { - ASN_DEBUG("skip_unknown(%d, %ld)", - tcv, (long)ctx->left); - switch(xer_skip_unknown(tcv, &ctx->left)) { - case -1: - ctx->phase = 5; - RETURN(RC_FAIL); - case 1: - ctx->phase = 3; - /* Fall through */ - case 0: - XER_ADVANCE(ch_size); - continue; - case 2: - ctx->phase = 3; - break; - } - } - - switch(tcv) { - case XCT_BOTH: - break; /* No CHOICE? */ - case XCT_CLOSING: - if(ctx->phase != 3) - break; - XER_ADVANCE(ch_size); - ctx->phase = 5; /* Phase out */ - RETURN(RC_OK); - case XCT_OPENING: - if(ctx->phase == 0) { - XER_ADVANCE(ch_size); - ctx->phase = 1; /* Processing body phase */ - continue; - } - /* Fall through */ - case XCT_UNKNOWN_OP: - case XCT_UNKNOWN_BO: - - if(ctx->phase != 1) - break; /* Really unexpected */ - - /* - * Search which inner member corresponds to this tag. - */ - for(edx = 0; edx < td->elements_count; edx++) { - elm = &td->elements[edx]; - tcv = xer_check_tag(buf_ptr,ch_size,elm->name); - switch(tcv) { - case XCT_BOTH: - case XCT_OPENING: - /* - * Process this member. - */ - ctx->step = edx; - ctx->phase = 2; - break; - case XCT_UNKNOWN_OP: - case XCT_UNKNOWN_BO: - continue; - default: - edx = td->elements_count; - break; /* Phase out */ - } - break; - } - if(edx != td->elements_count) - continue; - - /* It is expected extension */ - if(specs->ext_start != -1) { - ASN_DEBUG("Got anticipated extension"); - /* - * Check for (XCT_BOTH or XCT_UNKNOWN_BO) - * By using a mask. Only record a pure - * tags. - */ - if(tcv & XCT_CLOSING) { - /* Found without body */ - ctx->phase = 3; /* Terminating */ - } else { - ctx->left = 1; - ctx->phase = 4; /* Skip ...'s */ - } - XER_ADVANCE(ch_size); - continue; - } - - /* Fall through */ - default: - break; - } - - ASN_DEBUG("Unexpected XML tag [%c%c%c%c] in CHOICE [%s]" - " (ph=%d, tag=%s)", - ch_size>0?((const uint8_t *)buf_ptr)[0]:'?', - ch_size>1?((const uint8_t *)buf_ptr)[1]:'?', - ch_size>2?((const uint8_t *)buf_ptr)[2]:'?', - ch_size>3?((const uint8_t *)buf_ptr)[3]:'?', - td->name, ctx->phase, xml_tag); - break; - } - - ctx->phase = 5; /* Phase out, just in case */ - RETURN(RC_FAIL); -} - -asn_enc_rval_t -CHOICE_encode_xer(const asn_TYPE_descriptor_t *td, const void *sptr, int ilevel, - enum xer_encoder_flags_e flags, asn_app_consume_bytes_f *cb, - void *app_key) { - const asn_CHOICE_specifics_t *specs = - (const asn_CHOICE_specifics_t *)td->specifics; - asn_enc_rval_t er = {0,0,0}; - unsigned present = 0; - - if(!sptr) - ASN__ENCODE_FAILED; - - /* - * Figure out which CHOICE element is encoded. - */ - present = _fetch_present_idx(sptr, specs->pres_offset,specs->pres_size); - - if(present == 0 || present > td->elements_count) { - ASN__ENCODE_FAILED; - } else { - asn_enc_rval_t tmper = {0,0,0}; - asn_TYPE_member_t *elm = &td->elements[present-1]; - const void *memb_ptr = NULL; - const char *mname = elm->name; - unsigned int mlen = strlen(mname); - - if(elm->flags & ATF_POINTER) { - memb_ptr = - *(const void *const *)((const char *)sptr + elm->memb_offset); - if(!memb_ptr) ASN__ENCODE_FAILED; - } else { - memb_ptr = (const void *)((const char *)sptr + elm->memb_offset); - } - - er.encoded = 0; - - if(!(flags & XER_F_CANONICAL)) ASN__TEXT_INDENT(1, ilevel); - ASN__CALLBACK3("<", 1, mname, mlen, ">", 1); - - tmper = elm->type->op->xer_encoder(elm->type, memb_ptr, - ilevel + 1, flags, cb, app_key); - if(tmper.encoded == -1) return tmper; - er.encoded += tmper.encoded; - - ASN__CALLBACK3("", 1); - } - - if(!(flags & XER_F_CANONICAL)) ASN__TEXT_INDENT(1, ilevel - 1); - - ASN__ENCODED_OK(er); -cb_failed: - ASN__ENCODE_FAILED; -} +/* + * Copyright (c) 2017 Lev Walkin . + * All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include + +/* + * Return a standardized complex structure. + */ +#undef RETURN +#define RETURN(_code) \ + do { \ + rval.code = _code; \ + rval.consumed = consumed_myself; \ + return rval; \ + } while(0) + +#undef XER_ADVANCE +#define XER_ADVANCE(num_bytes) \ + do { \ + size_t num = num_bytes; \ + buf_ptr = (const void *)(((const char *)buf_ptr) + num); \ + size -= num; \ + consumed_myself += num; \ + } while(0) + +/* + * Decode the XER (XML) data. + */ +asn_dec_rval_t +CHOICE_decode_xer(const asn_codec_ctx_t *opt_codec_ctx, + const asn_TYPE_descriptor_t *td, void **struct_ptr, + const char *opt_mname, const void *buf_ptr, size_t size) { + /* + * Bring closer parts of structure description. + */ + const asn_CHOICE_specifics_t *specs = (const asn_CHOICE_specifics_t *)td->specifics; + const char *xml_tag = opt_mname ? opt_mname : td->xml_tag; + + /* + * Parts of the structure being constructed. + */ + void *st = *struct_ptr; /* Target structure. */ + asn_struct_ctx_t *ctx; /* Decoder context */ + + asn_dec_rval_t rval; /* Return value of a decoder */ + ssize_t consumed_myself = 0; /* Consumed bytes from ptr */ + size_t edx; /* Element index */ + + /* + * Create the target structure if it is not present already. + */ + if(st == 0) { + st = *struct_ptr = CALLOC(1, specs->struct_size); + if(st == 0) RETURN(RC_FAIL); + } + + /* + * Restore parsing context. + */ + ctx = (asn_struct_ctx_t *)((char *)st + specs->ctx_offset); + if(ctx->phase == 0 && !*xml_tag) + ctx->phase = 1; /* Skip the outer tag checking phase */ + + /* + * Phases of XER/XML processing: + * Phase 0: Check that the opening tag matches our expectations. + * Phase 1: Processing body and reacting on closing tag. + * Phase 2: Processing inner type. + * Phase 3: Only waiting for closing tag. + * Phase 4: Skipping unknown extensions. + * Phase 5: PHASED OUT + */ + for(edx = ctx->step; ctx->phase <= 4;) { + pxer_chunk_type_e ch_type; /* XER chunk type */ + ssize_t ch_size; /* Chunk size */ + xer_check_tag_e tcv; /* Tag check value */ + asn_TYPE_member_t *elm; + + /* + * Go inside the member. + */ + if(ctx->phase == 2) { + asn_dec_rval_t tmprval; + void *memb_ptr; /* Pointer to the member */ + void **memb_ptr2; /* Pointer to that pointer */ + unsigned old_present; + + elm = &td->elements[edx]; + + if(elm->flags & ATF_POINTER) { + /* Member is a pointer to another structure */ + memb_ptr2 = (void **)((char *)st + + elm->memb_offset); + } else { + memb_ptr = (char *)st + elm->memb_offset; + memb_ptr2 = &memb_ptr; + } + + /* Start/Continue decoding the inner member */ + tmprval = elm->type->op->xer_decoder(opt_codec_ctx, + elm->type, memb_ptr2, + elm->name, + buf_ptr, size); + XER_ADVANCE(tmprval.consumed); + ASN_DEBUG("XER/CHOICE: itdf: [%s] code=%d", + elm->type->name, tmprval.code); + old_present = _fetch_present_idx(st, + specs->pres_offset, + specs->pres_size); + assert(old_present == 0 || old_present == edx + 1); + /* Record what we've got */ + _set_present_idx(st, + specs->pres_offset, + specs->pres_size, edx + 1); + if(tmprval.code != RC_OK) + RETURN(tmprval.code); + ctx->phase = 3; + /* Fall through */ + } + + /* No need to wait for closing tag; special mode. */ + if(ctx->phase == 3 && !*xml_tag) { + ctx->phase = 5; /* Phase out */ + RETURN(RC_OK); + } + + /* + * Get the next part of the XML stream. + */ + ch_size = xer_next_token(&ctx->context, buf_ptr, size, &ch_type); + if(ch_size == -1) { + RETURN(RC_FAIL); + } else { + switch(ch_type) { + case PXER_WMORE: + RETURN(RC_WMORE); + case PXER_COMMENT: /* Got XML comment */ + case PXER_TEXT: /* Ignore free-standing text */ + XER_ADVANCE(ch_size); /* Skip silently */ + continue; + case PXER_TAG: + break; /* Check the rest down there */ + } + } + + tcv = xer_check_tag(buf_ptr, ch_size, xml_tag); + ASN_DEBUG("XER/CHOICE checked [%c%c%c%c] vs [%s], tcv=%d", + ch_size>0?((const uint8_t *)buf_ptr)[0]:'?', + ch_size>1?((const uint8_t *)buf_ptr)[1]:'?', + ch_size>2?((const uint8_t *)buf_ptr)[2]:'?', + ch_size>3?((const uint8_t *)buf_ptr)[3]:'?', + xml_tag, tcv); + + /* Skip the extensions section */ + if(ctx->phase == 4) { + ASN_DEBUG("skip_unknown(%d, %ld)", + tcv, (long)ctx->left); + switch(xer_skip_unknown(tcv, &ctx->left)) { + case -1: + ctx->phase = 5; + RETURN(RC_FAIL); + case 1: + ctx->phase = 3; + /* Fall through */ + case 0: + XER_ADVANCE(ch_size); + continue; + case 2: + ctx->phase = 3; + break; + } + } + + switch(tcv) { + case XCT_BOTH: + break; /* No CHOICE? */ + case XCT_CLOSING: + if(ctx->phase != 3) + break; + XER_ADVANCE(ch_size); + ctx->phase = 5; /* Phase out */ + RETURN(RC_OK); + case XCT_OPENING: + if(ctx->phase == 0) { + XER_ADVANCE(ch_size); + ctx->phase = 1; /* Processing body phase */ + continue; + } + /* Fall through */ + case XCT_UNKNOWN_OP: + case XCT_UNKNOWN_BO: + + if(ctx->phase != 1) + break; /* Really unexpected */ + + /* + * Search which inner member corresponds to this tag. + */ + for(edx = 0; edx < td->elements_count; edx++) { + elm = &td->elements[edx]; + tcv = xer_check_tag(buf_ptr,ch_size,elm->name); + switch(tcv) { + case XCT_BOTH: + case XCT_OPENING: + /* + * Process this member. + */ + ctx->step = edx; + ctx->phase = 2; + break; + case XCT_UNKNOWN_OP: + case XCT_UNKNOWN_BO: + continue; + default: + edx = td->elements_count; + break; /* Phase out */ + } + break; + } + if(edx != td->elements_count) + continue; + + /* It is expected extension */ + if(specs->ext_start != -1) { + ASN_DEBUG("Got anticipated extension"); + /* + * Check for (XCT_BOTH or XCT_UNKNOWN_BO) + * By using a mask. Only record a pure + * tags. + */ + if(tcv & XCT_CLOSING) { + /* Found without body */ + ctx->phase = 3; /* Terminating */ + } else { + ctx->left = 1; + ctx->phase = 4; /* Skip ...'s */ + } + XER_ADVANCE(ch_size); + continue; + } + + /* Fall through */ + default: + break; + } + + ASN_DEBUG("Unexpected XML tag [%c%c%c%c] in CHOICE [%s]" + " (ph=%d, tag=%s)", + ch_size>0?((const uint8_t *)buf_ptr)[0]:'?', + ch_size>1?((const uint8_t *)buf_ptr)[1]:'?', + ch_size>2?((const uint8_t *)buf_ptr)[2]:'?', + ch_size>3?((const uint8_t *)buf_ptr)[3]:'?', + td->name, ctx->phase, xml_tag); + break; + } + + ctx->phase = 5; /* Phase out, just in case */ + RETURN(RC_FAIL); +} + +asn_enc_rval_t +CHOICE_encode_xer(const asn_TYPE_descriptor_t *td, const void *sptr, int ilevel, + enum xer_encoder_flags_e flags, asn_app_consume_bytes_f *cb, + void *app_key) { + const asn_CHOICE_specifics_t *specs = + (const asn_CHOICE_specifics_t *)td->specifics; + asn_enc_rval_t er = {0,0,0}; + unsigned present = 0; + + if(!sptr) + ASN__ENCODE_FAILED; + + /* + * Figure out which CHOICE element is encoded. + */ + present = _fetch_present_idx(sptr, specs->pres_offset,specs->pres_size); + + if(present == 0 || present > td->elements_count) { + ASN__ENCODE_FAILED; + } else { + asn_enc_rval_t tmper = {0,0,0}; + asn_TYPE_member_t *elm = &td->elements[present-1]; + const void *memb_ptr = NULL; + const char *mname = elm->name; + unsigned int mlen = strlen(mname); + + if(elm->flags & ATF_POINTER) { + memb_ptr = + *(const void *const *)((const char *)sptr + elm->memb_offset); + if(!memb_ptr) ASN__ENCODE_FAILED; + } else { + memb_ptr = (const void *)((const char *)sptr + elm->memb_offset); + } + + er.encoded = 0; + + if(!(flags & XER_F_CANONICAL)) ASN__TEXT_INDENT(1, ilevel); + ASN__CALLBACK3("<", 1, mname, mlen, ">", 1); + + tmper = elm->type->op->xer_encoder(elm->type, memb_ptr, + ilevel + 1, flags, cb, app_key); + if(tmper.encoded == -1) return tmper; + er.encoded += tmper.encoded; + + ASN__CALLBACK3("", 1); + } + + if(!(flags & XER_F_CANONICAL)) ASN__TEXT_INDENT(1, ilevel - 1); + + ASN__ENCODED_OK(er); +cb_failed: + ASN__ENCODE_FAILED; +} diff --git a/certgen/asncodec/constr_SEQUENCE.c b/certgen/asncodec/constr_SEQUENCE.c index 8397d0c1bd1d60caa0aaa7084c255fc165112eec..68413e2a6ac3a956f68b95640e65bacf46b9fac7 100644 --- a/certgen/asncodec/constr_SEQUENCE.c +++ b/certgen/asncodec/constr_SEQUENCE.c @@ -1,197 +1,197 @@ -/* - * Copyright (c) 2003-2017 Lev Walkin . - * All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include - -asn_TYPE_operation_t asn_OP_SEQUENCE = { - SEQUENCE_free, -#if !defined(ASN_DISABLE_PRINT_SUPPORT) - SEQUENCE_print, -#else - 0, -#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ - SEQUENCE_compare, -#if !defined(ASN_DISABLE_BER_SUPPORT) - SEQUENCE_decode_ber, - SEQUENCE_encode_der, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ -#if !defined(ASN_DISABLE_XER_SUPPORT) - SEQUENCE_decode_xer, - SEQUENCE_encode_xer, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ -#if !defined(ASN_DISABLE_JER_SUPPORT) - SEQUENCE_encode_jer, -#else - 0, -#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ -#if !defined(ASN_DISABLE_OER_SUPPORT) - SEQUENCE_decode_oer, - SEQUENCE_encode_oer, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ -#if !defined(ASN_DISABLE_UPER_SUPPORT) - SEQUENCE_decode_uper, - SEQUENCE_encode_uper, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ -#if !defined(ASN_DISABLE_APER_SUPPORT) - SEQUENCE_decode_aper, - SEQUENCE_encode_aper, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ -#if !defined(ASN_DISABLE_RFILL_SUPPORT) - SEQUENCE_random_fill, -#else - 0, -#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ - 0 /* Use generic outmost tag fetcher */ -}; - -void -SEQUENCE_free(const asn_TYPE_descriptor_t *td, void *sptr, - enum asn_struct_free_method method) { - size_t edx; - const asn_SEQUENCE_specifics_t *specs = - (const asn_SEQUENCE_specifics_t *)td->specifics; - asn_struct_ctx_t *ctx; /* Decoder context */ - - if(!td || !sptr) - return; - - ASN_DEBUG("Freeing %s as SEQUENCE", td->name); - - for(edx = 0; edx < td->elements_count; edx++) { - asn_TYPE_member_t *elm = &td->elements[edx]; - void *memb_ptr; - if(elm->flags & ATF_POINTER) { - memb_ptr = *(void **)((char *)sptr + elm->memb_offset); - if(memb_ptr) - ASN_STRUCT_FREE(*elm->type, memb_ptr); - } else { - memb_ptr = (void *)((char *)sptr + elm->memb_offset); - ASN_STRUCT_FREE_CONTENTS_ONLY(*elm->type, memb_ptr); - } - } - - /* Clean parsing context */ - ctx = (asn_struct_ctx_t *)((char *)sptr + specs->ctx_offset); - FREEMEM(ctx->ptr); - - switch(method) { - case ASFM_FREE_EVERYTHING: - FREEMEM(sptr); - break; - case ASFM_FREE_UNDERLYING: - break; - case ASFM_FREE_UNDERLYING_AND_RESET: - memset( - sptr, 0, - ((const asn_SEQUENCE_specifics_t *)(td->specifics))->struct_size); - break; - } -} - -int -SEQUENCE_constraint(const asn_TYPE_descriptor_t *td, const void *sptr, - asn_app_constraint_failed_f *ctfailcb, void *app_key) { - size_t edx; - - if(!sptr) { - ASN__CTFAIL(app_key, td, sptr, - "%s: value not given (%s:%d)", - td->name, __FILE__, __LINE__); - return -1; - } - - /* - * Iterate over structure members and check their validity. - */ - for(edx = 0; edx < td->elements_count; edx++) { - asn_TYPE_member_t *elm = &td->elements[edx]; - const void *memb_ptr; - asn_constr_check_f *constr; - int ret; - - if(elm->flags & ATF_POINTER) { - memb_ptr = *(const void * const *)((const char *)sptr + elm->memb_offset); - if(!memb_ptr) { - if(elm->optional) - continue; - ASN__CTFAIL(app_key, td, sptr, - "%s: mandatory element %s absent (%s:%d)", - td->name, elm->name, __FILE__, __LINE__); - return -1; - } - } else { - memb_ptr = (const void *)((const char *)sptr + elm->memb_offset); - } - - constr = elm->encoding_constraints.general_constraints; - if(!constr) - constr = elm->type->encoding_constraints.general_constraints; - - ret = constr(elm->type, memb_ptr, ctfailcb, app_key); - if(ret) return ret; - } - - return 0; -} - -int -SEQUENCE_compare(const asn_TYPE_descriptor_t *td, const void *aptr, - const void *bptr) { - size_t edx; - - for(edx = 0; edx < td->elements_count; edx++) { - asn_TYPE_member_t *elm = &td->elements[edx]; - const void *amemb; - const void *bmemb; - int ret; - - if(elm->flags & ATF_POINTER) { - amemb = - *(const void *const *)((const char *)aptr + elm->memb_offset); - bmemb = - *(const void *const *)((const char *)bptr + elm->memb_offset); - if(!amemb) { - if(!bmemb) continue; - if(elm->default_value_cmp - && elm->default_value_cmp(bmemb) == 0) { - /* A is absent, but B is present and equal to DEFAULT */ - continue; - } - return -1; - } else if(!bmemb) { - if(elm->default_value_cmp - && elm->default_value_cmp(amemb) == 0) { - /* B is absent, but A is present and equal to DEFAULT */ - continue; - } - return 1; - } - } else { - amemb = (const void *)((const char *)aptr + elm->memb_offset); - bmemb = (const void *)((const char *)bptr + elm->memb_offset); - } - - ret = elm->type->op->compare_struct(elm->type, amemb, bmemb); - if(ret != 0) return ret; - } - - return 0; -} +/* + * Copyright (c) 2003-2017 Lev Walkin . + * All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include + +asn_TYPE_operation_t asn_OP_SEQUENCE = { + SEQUENCE_free, +#if !defined(ASN_DISABLE_PRINT_SUPPORT) + SEQUENCE_print, +#else + 0, +#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ + SEQUENCE_compare, +#if !defined(ASN_DISABLE_BER_SUPPORT) + SEQUENCE_decode_ber, + SEQUENCE_encode_der, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ +#if !defined(ASN_DISABLE_XER_SUPPORT) + SEQUENCE_decode_xer, + SEQUENCE_encode_xer, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ +#if !defined(ASN_DISABLE_JER_SUPPORT) + SEQUENCE_encode_jer, +#else + 0, +#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ +#if !defined(ASN_DISABLE_OER_SUPPORT) + SEQUENCE_decode_oer, + SEQUENCE_encode_oer, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ +#if !defined(ASN_DISABLE_UPER_SUPPORT) + SEQUENCE_decode_uper, + SEQUENCE_encode_uper, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ +#if !defined(ASN_DISABLE_APER_SUPPORT) + SEQUENCE_decode_aper, + SEQUENCE_encode_aper, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ +#if !defined(ASN_DISABLE_RFILL_SUPPORT) + SEQUENCE_random_fill, +#else + 0, +#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ + 0 /* Use generic outmost tag fetcher */ +}; + +void +SEQUENCE_free(const asn_TYPE_descriptor_t *td, void *sptr, + enum asn_struct_free_method method) { + size_t edx; + const asn_SEQUENCE_specifics_t *specs = + (const asn_SEQUENCE_specifics_t *)td->specifics; + asn_struct_ctx_t *ctx; /* Decoder context */ + + if(!td || !sptr) + return; + + ASN_DEBUG("Freeing %s as SEQUENCE", td->name); + + for(edx = 0; edx < td->elements_count; edx++) { + asn_TYPE_member_t *elm = &td->elements[edx]; + void *memb_ptr; + if(elm->flags & ATF_POINTER) { + memb_ptr = *(void **)((char *)sptr + elm->memb_offset); + if(memb_ptr) + ASN_STRUCT_FREE(*elm->type, memb_ptr); + } else { + memb_ptr = (void *)((char *)sptr + elm->memb_offset); + ASN_STRUCT_FREE_CONTENTS_ONLY(*elm->type, memb_ptr); + } + } + + /* Clean parsing context */ + ctx = (asn_struct_ctx_t *)((char *)sptr + specs->ctx_offset); + FREEMEM(ctx->ptr); + + switch(method) { + case ASFM_FREE_EVERYTHING: + FREEMEM(sptr); + break; + case ASFM_FREE_UNDERLYING: + break; + case ASFM_FREE_UNDERLYING_AND_RESET: + memset( + sptr, 0, + ((const asn_SEQUENCE_specifics_t *)(td->specifics))->struct_size); + break; + } +} + +int +SEQUENCE_constraint(const asn_TYPE_descriptor_t *td, const void *sptr, + asn_app_constraint_failed_f *ctfailcb, void *app_key) { + size_t edx; + + if(!sptr) { + ASN__CTFAIL(app_key, td, sptr, + "%s: value not given (%s:%d)", + td->name, __FILE__, __LINE__); + return -1; + } + + /* + * Iterate over structure members and check their validity. + */ + for(edx = 0; edx < td->elements_count; edx++) { + asn_TYPE_member_t *elm = &td->elements[edx]; + const void *memb_ptr; + asn_constr_check_f *constr; + int ret; + + if(elm->flags & ATF_POINTER) { + memb_ptr = *(const void * const *)((const char *)sptr + elm->memb_offset); + if(!memb_ptr) { + if(elm->optional) + continue; + ASN__CTFAIL(app_key, td, sptr, + "%s: mandatory element %s absent (%s:%d)", + td->name, elm->name, __FILE__, __LINE__); + return -1; + } + } else { + memb_ptr = (const void *)((const char *)sptr + elm->memb_offset); + } + + constr = elm->encoding_constraints.general_constraints; + if(!constr) + constr = elm->type->encoding_constraints.general_constraints; + + ret = constr(elm->type, memb_ptr, ctfailcb, app_key); + if(ret) return ret; + } + + return 0; +} + +int +SEQUENCE_compare(const asn_TYPE_descriptor_t *td, const void *aptr, + const void *bptr) { + size_t edx; + + for(edx = 0; edx < td->elements_count; edx++) { + asn_TYPE_member_t *elm = &td->elements[edx]; + const void *amemb; + const void *bmemb; + int ret; + + if(elm->flags & ATF_POINTER) { + amemb = + *(const void *const *)((const char *)aptr + elm->memb_offset); + bmemb = + *(const void *const *)((const char *)bptr + elm->memb_offset); + if(!amemb) { + if(!bmemb) continue; + if(elm->default_value_cmp + && elm->default_value_cmp(bmemb) == 0) { + /* A is absent, but B is present and equal to DEFAULT */ + continue; + } + return -1; + } else if(!bmemb) { + if(elm->default_value_cmp + && elm->default_value_cmp(amemb) == 0) { + /* B is absent, but A is present and equal to DEFAULT */ + continue; + } + return 1; + } + } else { + amemb = (const void *)((const char *)aptr + elm->memb_offset); + bmemb = (const void *)((const char *)bptr + elm->memb_offset); + } + + ret = elm->type->op->compare_struct(elm->type, amemb, bmemb); + if(ret != 0) return ret; + } + + return 0; +} diff --git a/certgen/asncodec/constr_SEQUENCE.h b/certgen/asncodec/constr_SEQUENCE.h index 5ecfd8f22f9846568a90933f5eb04aee671b6bc3..f72c312709349fd0aae7bfbfa7831469dc1f609a 100644 --- a/certgen/asncodec/constr_SEQUENCE.h +++ b/certgen/asncodec/constr_SEQUENCE.h @@ -1,95 +1,95 @@ -/*- - * Copyright (c) 2003-2017 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#ifndef _CONSTR_SEQUENCE_H_ -#define _CONSTR_SEQUENCE_H_ - -#include - -#ifdef __cplusplus -extern "C" { -#endif - -typedef struct asn_SEQUENCE_specifics_s { - /* - * Target structure description. - */ - unsigned struct_size; /* Size of the target structure. */ - unsigned ctx_offset; /* Offset of the asn_struct_ctx_t member */ - - /* - * Tags to members mapping table (sorted). - */ - const asn_TYPE_tag2member_t *tag2el; - unsigned tag2el_count; - - /* - * Optional members of the extensions root (roms) or additions (aoms). - * Meaningful for PER. - */ - const int *oms; /* Optional MemberS */ - unsigned roms_count; /* Root optional members count */ - unsigned aoms_count; /* Additions optional members count */ - - /* - * Description of an extensions group. - * Root components are clustered at the beginning of the structure, - * whereas extensions are clustered at the end. -1 means not extensible. - */ - signed first_extension; /* First extension addition */ -} asn_SEQUENCE_specifics_t; - - -/* - * A set specialized functions dealing with the SEQUENCE type. - */ -asn_struct_free_f SEQUENCE_free; - -#if !defined(ASN_DISABLE_PRINT_SUPPORT) -asn_struct_print_f SEQUENCE_print; -#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ - -asn_struct_compare_f SEQUENCE_compare; - -asn_constr_check_f SEQUENCE_constraint; - -#if !defined(ASN_DISABLE_BER_SUPPORT) -ber_type_decoder_f SEQUENCE_decode_ber; -der_type_encoder_f SEQUENCE_encode_der; -#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ - -#if !defined(ASN_DISABLE_XER_SUPPORT) -xer_type_decoder_f SEQUENCE_decode_xer; -xer_type_encoder_f SEQUENCE_encode_xer; -#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ - -#if !defined(ASN_DISABLE_JER_SUPPORT) -jer_type_encoder_f SEQUENCE_encode_jer; -#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ - -#if !defined(ASN_DISABLE_OER_SUPPORT) -oer_type_decoder_f SEQUENCE_decode_oer; -oer_type_encoder_f SEQUENCE_encode_oer; -#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ - -#if !defined(ASN_DISABLE_UPER_SUPPORT) -per_type_decoder_f SEQUENCE_decode_uper; -per_type_encoder_f SEQUENCE_encode_uper; -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ -#if !defined(ASN_DISABLE_APER_SUPPORT) -per_type_decoder_f SEQUENCE_decode_aper; -per_type_encoder_f SEQUENCE_encode_aper; -#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ - -#if !defined(ASN_DISABLE_RFILL_SUPPORT) -asn_random_fill_f SEQUENCE_random_fill; -#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ - -extern asn_TYPE_operation_t asn_OP_SEQUENCE; - -#ifdef __cplusplus -} -#endif - -#endif /* _CONSTR_SEQUENCE_H_ */ +/*- + * Copyright (c) 2003-2017 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#ifndef _CONSTR_SEQUENCE_H_ +#define _CONSTR_SEQUENCE_H_ + +#include + +#ifdef __cplusplus +extern "C" { +#endif + +typedef struct asn_SEQUENCE_specifics_s { + /* + * Target structure description. + */ + unsigned struct_size; /* Size of the target structure. */ + unsigned ctx_offset; /* Offset of the asn_struct_ctx_t member */ + + /* + * Tags to members mapping table (sorted). + */ + const asn_TYPE_tag2member_t *tag2el; + unsigned tag2el_count; + + /* + * Optional members of the extensions root (roms) or additions (aoms). + * Meaningful for PER. + */ + const int *oms; /* Optional MemberS */ + unsigned roms_count; /* Root optional members count */ + unsigned aoms_count; /* Additions optional members count */ + + /* + * Description of an extensions group. + * Root components are clustered at the beginning of the structure, + * whereas extensions are clustered at the end. -1 means not extensible. + */ + signed first_extension; /* First extension addition */ +} asn_SEQUENCE_specifics_t; + + +/* + * A set specialized functions dealing with the SEQUENCE type. + */ +asn_struct_free_f SEQUENCE_free; + +#if !defined(ASN_DISABLE_PRINT_SUPPORT) +asn_struct_print_f SEQUENCE_print; +#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ + +asn_struct_compare_f SEQUENCE_compare; + +asn_constr_check_f SEQUENCE_constraint; + +#if !defined(ASN_DISABLE_BER_SUPPORT) +ber_type_decoder_f SEQUENCE_decode_ber; +der_type_encoder_f SEQUENCE_encode_der; +#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ + +#if !defined(ASN_DISABLE_XER_SUPPORT) +xer_type_decoder_f SEQUENCE_decode_xer; +xer_type_encoder_f SEQUENCE_encode_xer; +#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ + +#if !defined(ASN_DISABLE_JER_SUPPORT) +jer_type_encoder_f SEQUENCE_encode_jer; +#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ + +#if !defined(ASN_DISABLE_OER_SUPPORT) +oer_type_decoder_f SEQUENCE_decode_oer; +oer_type_encoder_f SEQUENCE_encode_oer; +#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ + +#if !defined(ASN_DISABLE_UPER_SUPPORT) +per_type_decoder_f SEQUENCE_decode_uper; +per_type_encoder_f SEQUENCE_encode_uper; +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ +#if !defined(ASN_DISABLE_APER_SUPPORT) +per_type_decoder_f SEQUENCE_decode_aper; +per_type_encoder_f SEQUENCE_encode_aper; +#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ + +#if !defined(ASN_DISABLE_RFILL_SUPPORT) +asn_random_fill_f SEQUENCE_random_fill; +#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ + +extern asn_TYPE_operation_t asn_OP_SEQUENCE; + +#ifdef __cplusplus +} +#endif + +#endif /* _CONSTR_SEQUENCE_H_ */ diff --git a/certgen/asncodec/constr_SEQUENCE_OF.c b/certgen/asncodec/constr_SEQUENCE_OF.c index 9c5d6cded323d5614df481595ec569299223a5f1..773e2d1941f8339fe15812e6b9dfd3a4da6b296f 100644 --- a/certgen/asncodec/constr_SEQUENCE_OF.c +++ b/certgen/asncodec/constr_SEQUENCE_OF.c @@ -1,92 +1,92 @@ -/*- - * Copyright (c) 2003, 2004, 2006 Lev Walkin . - * All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include -#include - -asn_TYPE_operation_t asn_OP_SEQUENCE_OF = { - SEQUENCE_OF_free, -#if !defined(ASN_DISABLE_PRINT_SUPPORT) - SEQUENCE_OF_print, -#else - 0, -#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ - SEQUENCE_OF_compare, -#if !defined(ASN_DISABLE_BER_SUPPORT) - SEQUENCE_OF_decode_ber, - SEQUENCE_OF_encode_der, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ -#if !defined(ASN_DISABLE_XER_SUPPORT) - SEQUENCE_OF_decode_xer, - SEQUENCE_OF_encode_xer, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ -#if !defined(ASN_DISABLE_JER_SUPPORT) - SEQUENCE_OF_encode_jer, -#else - 0, -#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ -#if !defined(ASN_DISABLE_OER_SUPPORT) - SEQUENCE_OF_decode_oer, /* Same as SET OF decoder. */ - SEQUENCE_OF_encode_oer, /* Same as SET OF encoder */ -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ -#if !defined(ASN_DISABLE_UPER_SUPPORT) - SEQUENCE_OF_decode_uper, /* Same as SET OF decoder */ - SEQUENCE_OF_encode_uper, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ -#if !defined(ASN_DISABLE_APER_SUPPORT) - SEQUENCE_OF_decode_aper, - SEQUENCE_OF_encode_aper, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ -#if !defined(ASN_DISABLE_RFILL_SUPPORT) - SEQUENCE_OF_random_fill, -#else - 0, -#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ - 0 /* Use generic outmost tag fetcher */ -}; - -int -SEQUENCE_OF_compare(const asn_TYPE_descriptor_t *td, const void *aptr, - const void *bptr) { - const asn_anonymous_sequence_ *a = _A_CSEQUENCE_FROM_VOID(aptr); - const asn_anonymous_sequence_ *b = _A_CSEQUENCE_FROM_VOID(bptr); - ssize_t idx; - - if(a && b) { - ssize_t common_length = (a->count < b->count ? a->count : b->count); - for(idx = 0; idx < common_length; idx++) { - int ret = td->elements->type->op->compare_struct( - td->elements->type, a->array[idx], b->array[idx]); - if(ret) return ret; - } - - if(idx < b->count) /* more elements in b */ - return -1; /* a is shorter, so put it first */ - if(idx < a->count) return 1; - - } else if(!a) { - return -1; - } else if(!b) { - return 1; - } - - return 0; -} +/*- + * Copyright (c) 2003, 2004, 2006 Lev Walkin . + * All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include +#include + +asn_TYPE_operation_t asn_OP_SEQUENCE_OF = { + SEQUENCE_OF_free, +#if !defined(ASN_DISABLE_PRINT_SUPPORT) + SEQUENCE_OF_print, +#else + 0, +#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ + SEQUENCE_OF_compare, +#if !defined(ASN_DISABLE_BER_SUPPORT) + SEQUENCE_OF_decode_ber, + SEQUENCE_OF_encode_der, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ +#if !defined(ASN_DISABLE_XER_SUPPORT) + SEQUENCE_OF_decode_xer, + SEQUENCE_OF_encode_xer, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ +#if !defined(ASN_DISABLE_JER_SUPPORT) + SEQUENCE_OF_encode_jer, +#else + 0, +#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ +#if !defined(ASN_DISABLE_OER_SUPPORT) + SEQUENCE_OF_decode_oer, /* Same as SET OF decoder. */ + SEQUENCE_OF_encode_oer, /* Same as SET OF encoder */ +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ +#if !defined(ASN_DISABLE_UPER_SUPPORT) + SEQUENCE_OF_decode_uper, /* Same as SET OF decoder */ + SEQUENCE_OF_encode_uper, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ +#if !defined(ASN_DISABLE_APER_SUPPORT) + SEQUENCE_OF_decode_aper, + SEQUENCE_OF_encode_aper, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ +#if !defined(ASN_DISABLE_RFILL_SUPPORT) + SEQUENCE_OF_random_fill, +#else + 0, +#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ + 0 /* Use generic outmost tag fetcher */ +}; + +int +SEQUENCE_OF_compare(const asn_TYPE_descriptor_t *td, const void *aptr, + const void *bptr) { + const asn_anonymous_sequence_ *a = _A_CSEQUENCE_FROM_VOID(aptr); + const asn_anonymous_sequence_ *b = _A_CSEQUENCE_FROM_VOID(bptr); + ssize_t idx; + + if(a && b) { + ssize_t common_length = (a->count < b->count ? a->count : b->count); + for(idx = 0; idx < common_length; idx++) { + int ret = td->elements->type->op->compare_struct( + td->elements->type, a->array[idx], b->array[idx]); + if(ret) return ret; + } + + if(idx < b->count) /* more elements in b */ + return -1; /* a is shorter, so put it first */ + if(idx < a->count) return 1; + + } else if(!a) { + return -1; + } else if(!b) { + return 1; + } + + return 0; +} diff --git a/certgen/asncodec/constr_SEQUENCE_OF.h b/certgen/asncodec/constr_SEQUENCE_OF.h index 1768582bf1b8e994ab5247d2f3b05753c6cc1d0e..443ffca1af4c6ea86e768fb60629c13bae8c7bb7 100644 --- a/certgen/asncodec/constr_SEQUENCE_OF.h +++ b/certgen/asncodec/constr_SEQUENCE_OF.h @@ -1,67 +1,67 @@ -/*- - * Copyright (c) 2003-2017 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#ifndef _CONSTR_SEQUENCE_OF_H_ -#define _CONSTR_SEQUENCE_OF_H_ - -#include -#include /* Implemented using SET OF */ - -#ifdef __cplusplus -extern "C" { -#endif - -/* - * A set specialized functions dealing with the SEQUENCE OF type. - * Generally implemented using SET OF. - */ -#define SEQUENCE_OF_free SET_OF_free - -#if !defined(ASN_DISABLE_PRINT_SUPPORT) -#define SEQUENCE_OF_print SET_OF_print -#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ - -asn_struct_compare_f SEQUENCE_OF_compare; - -#define SEQUENCE_OF_constraint SET_OF_constraint - -#if !defined(ASN_DISABLE_BER_SUPPORT) -#define SEQUENCE_OF_decode_ber SET_OF_decode_ber -der_type_encoder_f SEQUENCE_OF_encode_der; -#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ - -#if !defined(ASN_DISABLE_XER_SUPPORT) -#define SEQUENCE_OF_decode_xer SET_OF_decode_xer -xer_type_encoder_f SEQUENCE_OF_encode_xer; -#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ - -#if !defined(ASN_DISABLE_JER_SUPPORT) -jer_type_encoder_f SEQUENCE_OF_encode_jer; -#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ - -#if !defined(ASN_DISABLE_OER_SUPPORT) -#define SEQUENCE_OF_decode_oer SET_OF_decode_oer -#define SEQUENCE_OF_encode_oer SET_OF_encode_oer -#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ - -#if !defined(ASN_DISABLE_UPER_SUPPORT) -#define SEQUENCE_OF_decode_uper SET_OF_decode_uper -per_type_encoder_f SEQUENCE_OF_encode_uper; -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ -#if !defined(ASN_DISABLE_APER_SUPPORT) -#define SEQUENCE_OF_decode_aper SET_OF_decode_aper -per_type_encoder_f SEQUENCE_OF_encode_aper; -#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ - -#if !defined(ASN_DISABLE_RFILL_SUPPORT) -#define SEQUENCE_OF_random_fill SET_OF_random_fill -#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ - -extern asn_TYPE_operation_t asn_OP_SEQUENCE_OF; - -#ifdef __cplusplus -} -#endif - -#endif /* _CONSTR_SET_OF_H_ */ +/*- + * Copyright (c) 2003-2017 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#ifndef _CONSTR_SEQUENCE_OF_H_ +#define _CONSTR_SEQUENCE_OF_H_ + +#include +#include /* Implemented using SET OF */ + +#ifdef __cplusplus +extern "C" { +#endif + +/* + * A set specialized functions dealing with the SEQUENCE OF type. + * Generally implemented using SET OF. + */ +#define SEQUENCE_OF_free SET_OF_free + +#if !defined(ASN_DISABLE_PRINT_SUPPORT) +#define SEQUENCE_OF_print SET_OF_print +#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ + +asn_struct_compare_f SEQUENCE_OF_compare; + +#define SEQUENCE_OF_constraint SET_OF_constraint + +#if !defined(ASN_DISABLE_BER_SUPPORT) +#define SEQUENCE_OF_decode_ber SET_OF_decode_ber +der_type_encoder_f SEQUENCE_OF_encode_der; +#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ + +#if !defined(ASN_DISABLE_XER_SUPPORT) +#define SEQUENCE_OF_decode_xer SET_OF_decode_xer +xer_type_encoder_f SEQUENCE_OF_encode_xer; +#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ + +#if !defined(ASN_DISABLE_JER_SUPPORT) +jer_type_encoder_f SEQUENCE_OF_encode_jer; +#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ + +#if !defined(ASN_DISABLE_OER_SUPPORT) +#define SEQUENCE_OF_decode_oer SET_OF_decode_oer +#define SEQUENCE_OF_encode_oer SET_OF_encode_oer +#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ + +#if !defined(ASN_DISABLE_UPER_SUPPORT) +#define SEQUENCE_OF_decode_uper SET_OF_decode_uper +per_type_encoder_f SEQUENCE_OF_encode_uper; +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ +#if !defined(ASN_DISABLE_APER_SUPPORT) +#define SEQUENCE_OF_decode_aper SET_OF_decode_aper +per_type_encoder_f SEQUENCE_OF_encode_aper; +#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ + +#if !defined(ASN_DISABLE_RFILL_SUPPORT) +#define SEQUENCE_OF_random_fill SET_OF_random_fill +#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ + +extern asn_TYPE_operation_t asn_OP_SEQUENCE_OF; + +#ifdef __cplusplus +} +#endif + +#endif /* _CONSTR_SET_OF_H_ */ diff --git a/certgen/asncodec/constr_SEQUENCE_OF_xer.c b/certgen/asncodec/constr_SEQUENCE_OF_xer.c index 7bd32367792fcd606da13770ec58fbf39cff41c2..f320dc672feb7eee927e1e3793f143b31503e0ae 100644 --- a/certgen/asncodec/constr_SEQUENCE_OF_xer.c +++ b/certgen/asncodec/constr_SEQUENCE_OF_xer.c @@ -1,60 +1,60 @@ -/* - * Copyright (c) 2017 Lev Walkin . - * All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include -#include - -asn_enc_rval_t -SEQUENCE_OF_encode_xer(const asn_TYPE_descriptor_t *td, const void *sptr, - int ilevel, enum xer_encoder_flags_e flags, - asn_app_consume_bytes_f *cb, void *app_key) { - asn_enc_rval_t er = {0,0,0}; - const asn_SET_OF_specifics_t *specs = (const asn_SET_OF_specifics_t *)td->specifics; - const asn_TYPE_member_t *elm = td->elements; - const asn_anonymous_sequence_ *list = _A_CSEQUENCE_FROM_VOID(sptr); - const char *mname = specs->as_XMLValueList - ? 0 - : ((*elm->name) ? elm->name : elm->type->xml_tag); - size_t mlen = mname ? strlen(mname) : 0; - int xcan = (flags & XER_F_CANONICAL); - int i; - - if(!sptr) ASN__ENCODE_FAILED; - - er.encoded = 0; - - for(i = 0; i < list->count; i++) { - asn_enc_rval_t tmper = {0,0,0}; - void *memb_ptr = list->array[i]; - if(!memb_ptr) continue; - - if(mname) { - if(!xcan) ASN__TEXT_INDENT(1, ilevel); - ASN__CALLBACK3("<", 1, mname, mlen, ">", 1); - } - - tmper = elm->type->op->xer_encoder(elm->type, memb_ptr, ilevel + 1, - flags, cb, app_key); - if(tmper.encoded == -1) return tmper; - er.encoded += tmper.encoded; - if(tmper.encoded == 0 && specs->as_XMLValueList) { - const char *name = elm->type->xml_tag; - size_t len = strlen(name); - if(!xcan) ASN__TEXT_INDENT(1, ilevel + 1); - ASN__CALLBACK3("<", 1, name, len, "/>", 2); - } - - if(mname) { - ASN__CALLBACK3("", 1); - } - } - - if(!xcan) ASN__TEXT_INDENT(1, ilevel - 1); - - ASN__ENCODED_OK(er); -cb_failed: - ASN__ENCODE_FAILED; -} +/* + * Copyright (c) 2017 Lev Walkin . + * All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include +#include + +asn_enc_rval_t +SEQUENCE_OF_encode_xer(const asn_TYPE_descriptor_t *td, const void *sptr, + int ilevel, enum xer_encoder_flags_e flags, + asn_app_consume_bytes_f *cb, void *app_key) { + asn_enc_rval_t er = {0,0,0}; + const asn_SET_OF_specifics_t *specs = (const asn_SET_OF_specifics_t *)td->specifics; + const asn_TYPE_member_t *elm = td->elements; + const asn_anonymous_sequence_ *list = _A_CSEQUENCE_FROM_VOID(sptr); + const char *mname = specs->as_XMLValueList + ? 0 + : ((*elm->name) ? elm->name : elm->type->xml_tag); + size_t mlen = mname ? strlen(mname) : 0; + int xcan = (flags & XER_F_CANONICAL); + int i; + + if(!sptr) ASN__ENCODE_FAILED; + + er.encoded = 0; + + for(i = 0; i < list->count; i++) { + asn_enc_rval_t tmper = {0,0,0}; + void *memb_ptr = list->array[i]; + if(!memb_ptr) continue; + + if(mname) { + if(!xcan) ASN__TEXT_INDENT(1, ilevel); + ASN__CALLBACK3("<", 1, mname, mlen, ">", 1); + } + + tmper = elm->type->op->xer_encoder(elm->type, memb_ptr, ilevel + 1, + flags, cb, app_key); + if(tmper.encoded == -1) return tmper; + er.encoded += tmper.encoded; + if(tmper.encoded == 0 && specs->as_XMLValueList) { + const char *name = elm->type->xml_tag; + size_t len = strlen(name); + if(!xcan) ASN__TEXT_INDENT(1, ilevel + 1); + ASN__CALLBACK3("<", 1, name, len, "/>", 2); + } + + if(mname) { + ASN__CALLBACK3("", 1); + } + } + + if(!xcan) ASN__TEXT_INDENT(1, ilevel - 1); + + ASN__ENCODED_OK(er); +cb_failed: + ASN__ENCODE_FAILED; +} diff --git a/certgen/asncodec/constr_SEQUENCE_oer.c b/certgen/asncodec/constr_SEQUENCE_oer.c index b28690428658fb15bf544f2dc75f9998b06963ce..405b96442fee5053c0aff7ef52dea045c3d986eb 100644 --- a/certgen/asncodec/constr_SEQUENCE_oer.c +++ b/certgen/asncodec/constr_SEQUENCE_oer.c @@ -1,559 +1,559 @@ -/* - * Copyright (c) 2017 Lev Walkin . - * All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include -#include -#include - -/* - * This macro "eats" the part of the buffer which is definitely "consumed", - * i.e. was correctly converted into local representation or rightfully skipped. - */ -#undef ADVANCE -#define ADVANCE(num_bytes) \ - do { \ - size_t num = num_bytes; \ - ptr = ((const char *)ptr) + num; \ - size -= num; \ - consumed_myself += num; \ - } while(0) - -/* - * Switch to the next phase of parsing. - */ -#undef NEXT_PHASE -#undef PHASE_OUT -#define NEXT_PHASE(ctx) \ - do { \ - ctx->phase++; \ - ctx->step = 0; \ - } while(0) - -/* - * Check whether we are inside the extensions group. - */ -#define IN_EXTENSION_GROUP(specs, memb_idx) \ - ((specs)->first_extension >= 0 \ - && (unsigned)(specs)->first_extension <= (memb_idx)) - -#define IN_ROOT_GROUP_PRED(edx) \ - edx < (specs->first_extension < 0 ? td->elements_count \ - : (size_t)specs->first_extension) - -#define FOR_IN_ROOT_GROUP(edx) for(edx = 0; IN_ROOT_GROUP_PRED(edx); edx++) - -/* - * Return a standardized complex structure. - */ -#undef RETURN -#define RETURN(_code) do { \ - rval.code = _code; \ - rval.consumed = consumed_myself;\ - return rval; \ - } while(0) - -/* - * Return pointer to a member. - */ -static void ** -element_ptrptr(void *struct_ptr, asn_TYPE_member_t *elm, void **tmp_save_ptr) { - if(elm->flags & ATF_POINTER) { - /* Member is a pointer to another structure */ - return (void **)((char *)struct_ptr + elm->memb_offset); - } else { - assert(tmp_save_ptr); - *tmp_save_ptr = (void *)((char *)struct_ptr + elm->memb_offset); - return tmp_save_ptr; - } -} - -static const void * -element_ptr(const void *struct_ptr, const asn_TYPE_member_t *elm) { - if(elm->flags & ATF_POINTER) { - /* Member is a pointer to another structure */ - return *(const void *const *)((const char *)struct_ptr - + elm->memb_offset); - } else { - return (const void *)((const char *)struct_ptr + elm->memb_offset); - } -} - -asn_dec_rval_t -SEQUENCE_decode_oer(const asn_codec_ctx_t *opt_codec_ctx, - const asn_TYPE_descriptor_t *td, - const asn_oer_constraints_t *constraints, void **struct_ptr, - const void *ptr, size_t size) { - const asn_SEQUENCE_specifics_t *specs = - (const asn_SEQUENCE_specifics_t *)td->specifics; - asn_dec_rval_t rval = {RC_OK, 0}; - void *st = *struct_ptr; /* Target structure */ - asn_struct_ctx_t *ctx; /* Decoder context */ - size_t consumed_myself = 0; /* Consumed bytes from ptr. */ - - (void)constraints; - - if(ASN__STACK_OVERFLOW_CHECK(opt_codec_ctx)) - ASN__DECODE_FAILED; - - /* - * Create the target structure if it is not present already. - */ - if(st == 0) { - st = *struct_ptr = CALLOC(1, specs->struct_size); - if(st == 0) { - RETURN(RC_FAIL); - } - } - - /* - * Restore parsing context. - */ - ctx = (asn_struct_ctx_t *)((char *)st + specs->ctx_offset); - - /* - * Start to parse where left previously. - */ - switch(ctx->phase) { - case 0: { - /* - * Fetch preamble. - */ - asn_bit_data_t *preamble; - int has_extensions_bit = (specs->first_extension >= 0); - size_t preamble_bits = (has_extensions_bit + specs->roms_count); - size_t preamble_bytes = ((7 + preamble_bits) >> 3); - - ASN_DEBUG("OER SEQUENCE %s Decoding PHASE 0", td->name); - - ASN_DEBUG( - "Expecting preamble bits %" ASN_PRI_SIZE " for %s (including %d extension bits)", - preamble_bits, td->name, has_extensions_bit); - ctx->start = ptr; - if(preamble_bytes > size) { - ASN__DECODE_STARVED; - } - - preamble = asn_bit_data_new_contiguous(ptr, preamble_bits); - if(!preamble) { - RETURN(RC_FAIL); - } - preamble->nboff = has_extensions_bit; - ctx->ptr = preamble; - ADVANCE(preamble_bytes); - } - NEXT_PHASE(ctx); - /* FALL THROUGH */ - case 1: { - /* Decode components of the extension root */ - asn_bit_data_t *preamble = ctx->ptr; - size_t edx; - - ASN_DEBUG("OER SEQUENCE %s Decoding PHASE 1 (Root)", td->name); - - assert(preamble); - - for(edx = (ctx->step >> 1); IN_ROOT_GROUP_PRED(edx); - edx++, ctx->step = (ctx->step & ~1) + 2) { - asn_TYPE_member_t *elm = &td->elements[edx]; - - ASN_DEBUG("Decoding %s->%s", td->name, elm->name); - - assert(!IN_EXTENSION_GROUP(specs, edx)); - - if(ctx->step & 1) { - goto microphase2_decode_continues; - } - - - if(elm->optional) { - int32_t present = asn_get_few_bits(preamble, 1); - if(present < 0) { - ASN_DEBUG("Presence map ended prematurely: %d", present); - RETURN(RC_FAIL); - } else if(present == 0) { - if(elm->default_value_set) { - /* Fill-in DEFAULT */ - void *tmp; - if(elm->default_value_set( - element_ptrptr(st, elm, &tmp))) { - RETURN(RC_FAIL); - } - } - /* The member is not present. */ - continue; - } - /* Present OPTIONAL or DEFAULT component. */ - } - - /* - * MICROPHASE 2: Invoke the member-specific decoder. - */ - ctx->step |= 1; /* Confirm entering next microphase */ - microphase2_decode_continues: - if(elm->flags & ATF_OPEN_TYPE) { - rval = OPEN_TYPE_oer_get(opt_codec_ctx, td, st, elm, ptr, size); - } else { - void *save_memb_ptr; /* Temporary reference. */ - void **memb_ptr2; /* Pointer to a pointer to a memmber */ - - memb_ptr2 = element_ptrptr(st, elm, &save_memb_ptr); - - rval = elm->type->op->oer_decoder( - opt_codec_ctx, elm->type, - elm->encoding_constraints.oer_constraints, memb_ptr2, ptr, - size); - } - switch(rval.code) { - case RC_OK: - ctx->left = consumed_myself; - ADVANCE(rval.consumed); - break; - case RC_WMORE: - ASN_DEBUG("More bytes needed at element %s \"%s\"", td->name, - elm->name); - ADVANCE(rval.consumed); - RETURN(RC_WMORE); - case RC_FAIL: - ASN_DEBUG("Decoding failed at element %s \"%s\"", td->name, - elm->name); - RETURN(RC_FAIL); - } - } /* for(all root members) */ - - } - NEXT_PHASE(ctx); - /* FALL THROUGH */ - case 2: - assert(ctx->ptr); - { - /* Cleanup preamble. */ - asn_bit_data_t *preamble = ctx->ptr; - asn_bit_data_t *extadds; - int has_extensions_bit = (specs->first_extension >= 0); - int extensions_present = - has_extensions_bit - && (preamble->buffer == NULL - || (((const uint8_t *)preamble->buffer)[0] & 0x80)); - uint8_t unused_bits; - size_t len = 0; - ssize_t len_len; - - ASN_DEBUG("OER SEQUENCE %s Decoding PHASE 2", td->name); - - preamble->buffer = 0; /* Will do extensions_present==1 next time. */ - - if(!extensions_present) { - ctx->phase = 10; - ctx->left = consumed_myself; - RETURN(RC_OK); - } - - /* - * X.696 (08/2015) #16.1 (c), #16.4 - * Read in the extension addition presence bitmap. - */ - - len_len = oer_fetch_length(ptr, size, &len); - if(len_len > 0) { - ADVANCE(len_len); - } else if(len_len < 0) { - RETURN(RC_FAIL); - } else { - RETURN(RC_WMORE); - } - - if(len == 0) { - /* 16.4.1-2 */ - RETURN(RC_FAIL); - } else if(len > size) { - RETURN(RC_WMORE); - } - - /* Account for unused bits */ - unused_bits = 0x7 & *(const uint8_t *)ptr; - ADVANCE(1); - len--; - if(unused_bits && len == 0) { - RETURN(RC_FAIL); - } - - /* Get the extensions map */ - extadds = asn_bit_data_new_contiguous(ptr, len * 8 - unused_bits); - if(!extadds) { - RETURN(RC_FAIL); - } - FREEMEM(preamble); - ctx->ptr = extadds; - ADVANCE(len); - } - NEXT_PHASE(ctx); - ctx->step = - (specs->first_extension < 0 ? td->elements_count - : (size_t)specs->first_extension); - /* Fall through */ - case 3: - ASN_DEBUG("OER SEQUENCE %s Decoding PHASE 3 (Extensions)", td->name); - for(; ctx->step < (signed)td->elements_count; ctx->step++) { - asn_bit_data_t *extadds = ctx->ptr; - size_t edx = ctx->step; - asn_TYPE_member_t *elm = &td->elements[edx]; - void *tmp_memb_ptr; - void **memb_ptr2 = element_ptrptr(st, elm, &tmp_memb_ptr); - - switch(asn_get_few_bits(extadds, 1)) { - case -1: - /* - * Not every one of our extensions is known to the remote side. - * Continue filling in their defaults though. - */ - /* Fall through */ - case 0: - /* Fill-in DEFAULT */ - if(elm->default_value_set - && elm->default_value_set(memb_ptr2)) { - RETURN(RC_FAIL); - } - continue; - case 1: { - /* Read OER open type */ - ssize_t ot_size = - oer_open_type_get(opt_codec_ctx, elm->type, - elm->encoding_constraints.oer_constraints, - memb_ptr2, ptr, size); - assert(ot_size <= (ssize_t)size); - if(ot_size > 0) { - ADVANCE(ot_size); - } else if(ot_size < 0) { - RETURN(RC_FAIL); - } else { - /* Roll back open type parsing */ - asn_get_undo(extadds, 1); - RETURN(RC_WMORE); - } - break; - } - default: - RETURN(RC_FAIL); - } - } - - NEXT_PHASE(ctx); - /* Fall through */ - case 4: - ASN_DEBUG("OER SEQUENCE %s Decoding PHASE 4", td->name); - /* Read in the rest of Open Types while ignoring them */ - for(;;) { - asn_bit_data_t *extadds = ctx->ptr; - switch(asn_get_few_bits(extadds, 1)) { - case 0: - continue; - case 1: { - ssize_t skipped = oer_open_type_skip(ptr, size); - if(skipped > 0) { - ADVANCE(skipped); - } else if(skipped < 0) { - RETURN(RC_FAIL); - } else { - asn_get_undo(extadds, 1); - RETURN(RC_WMORE); - } - continue; - } - case -1: - /* No more Open Type encoded components */ - break; - default: - RETURN(RC_FAIL); - } - break; - } - } - ctx->left = consumed_myself; - RETURN(RC_OK); -} - -/* - * Encode as Canonical OER. - */ -asn_enc_rval_t -SEQUENCE_encode_oer(const asn_TYPE_descriptor_t *td, - const asn_oer_constraints_t *constraints, const void *sptr, - asn_app_consume_bytes_f *cb, void *app_key) { - const asn_SEQUENCE_specifics_t *specs = (const asn_SEQUENCE_specifics_t *)td->specifics; - size_t computed_size = 0; - int has_extensions_bit = (specs->first_extension >= 0); - size_t preamble_bits = (has_extensions_bit + specs->roms_count); - uint32_t has_extensions = 0; - size_t edx; - int ret; - - (void)constraints; - - if(preamble_bits) { - asn_bit_outp_t preamble; - - memset(&preamble, 0, sizeof(preamble)); - preamble.output = cb; - preamble.op_key = app_key; - - if(has_extensions_bit) { - for(edx = specs->first_extension; edx < td->elements_count; edx++) { - asn_TYPE_member_t *elm = &td->elements[edx]; - const void *memb_ptr = element_ptr(sptr, elm); - if(memb_ptr) { - if(elm->default_value_cmp - && elm->default_value_cmp(memb_ptr) == 0) { - /* Do not encode default values in extensions */ - } else { - has_extensions = 1; - break; - } - } - } - ret = asn_put_few_bits(&preamble, has_extensions, 1); - assert(ret == 0); - if(ret < 0) { - ASN__ENCODE_FAILED; - } - } - - /* - * Encode optional components bitmap. - */ - if(specs->roms_count) { - FOR_IN_ROOT_GROUP(edx) { - asn_TYPE_member_t *elm = &td->elements[edx]; - - if(IN_EXTENSION_GROUP(specs, edx)) break; - - if(elm->optional) { - const void *memb_ptr = element_ptr(sptr, elm); - uint32_t has_component = memb_ptr != NULL; - if(has_component && elm->default_value_cmp - && elm->default_value_cmp(memb_ptr) == 0) { - has_component = 0; - } - ret = asn_put_few_bits(&preamble, has_component, 1); - if(ret < 0) { - ASN__ENCODE_FAILED; - } - } - } - } - - asn_put_aligned_flush(&preamble); - computed_size += preamble.flushed_bytes; - } /* if(preamble_bits) */ - - /* - * Put root components and extensions root. - */ - for(edx = 0; edx < td->elements_count; edx++) { - asn_TYPE_member_t *elm = &td->elements[edx]; - asn_enc_rval_t er = {0,0,0}; - const void *memb_ptr; - - if(IN_EXTENSION_GROUP(specs, edx)) break; - - memb_ptr = element_ptr(sptr, elm); - if(memb_ptr) { - if(elm->default_value_cmp - && elm->default_value_cmp(memb_ptr) == 0) { - /* Skip default values in encoding */ - continue; - } - } else { - if(elm->optional) continue; - /* Mandatory element is missing */ - ASN__ENCODE_FAILED; - } - if(!elm->type->op->oer_encoder) { - ASN_DEBUG("OER encoder is not defined for type %s", elm->type->name); - ASN__ENCODE_FAILED; - } - er = elm->type->op->oer_encoder( - elm->type, elm->encoding_constraints.oer_constraints, memb_ptr, cb, - app_key); - if(er.encoded == -1) { - ASN_DEBUG("... while encoding %s member \"%s\"\n", td->name, - elm->name); - return er; - } - computed_size += er.encoded; - } - - /* - * Before encode extensions, encode extensions additions presence bitmap - # X.696 (08/2015) #16.4. - */ - if(has_extensions) { - asn_bit_outp_t extadds; - - /* Special case allowing us to use exactly one byte for #8.6 */ - size_t aoms_length_bits = specs->aoms_count; - size_t aoms_length_bytes = (7 + aoms_length_bits) >> 3; - uint8_t unused_bits = 0x07 & (8 - (aoms_length_bits & 0x07)); - - assert(1 + aoms_length_bytes <= 127); - - memset(&extadds, 0, sizeof(extadds)); - extadds.output = cb; - extadds.op_key = app_key; - - /* #8.6 length determinant */ - ret = asn_put_few_bits(&extadds, (1 + aoms_length_bytes), 8); - if(ret < 0) ASN__ENCODE_FAILED; - - /* Number of unused bytes, #16.4.2 */ - ret = asn_put_few_bits(&extadds, unused_bits, 8); - if(ret < 0) ASN__ENCODE_FAILED; - - /* Encode presence bitmap #16.4.3 */ - for(edx = specs->first_extension; edx < td->elements_count; edx++) { - asn_TYPE_member_t *elm = &td->elements[edx]; - const void *memb_ptr = element_ptr(sptr, elm); - if(memb_ptr && elm->default_value_cmp - && elm->default_value_cmp(memb_ptr) == 0) { - memb_ptr = 0; /* Do not encode default value. */ - } - ret |= asn_put_few_bits(&extadds, memb_ptr ? 1 : 0, 1); - } - if(ret < 0) ASN__ENCODE_FAILED; - - asn_put_aligned_flush(&extadds); - computed_size += extadds.flushed_bytes; - - /* Now, encode extensions */ - for(edx = specs->first_extension; edx < td->elements_count; edx++) { - asn_TYPE_member_t *elm = &td->elements[edx]; - const void *memb_ptr = element_ptr(sptr, elm); - - if(memb_ptr) { - if(elm->default_value_cmp - && elm->default_value_cmp(memb_ptr) == 0) { - /* Do not encode default value. */ - } else { - ssize_t wrote = oer_open_type_put( - elm->type, elm->encoding_constraints.oer_constraints, - memb_ptr, cb, app_key); - if(wrote == -1) { - ASN__ENCODE_FAILED; - } - computed_size += wrote; - } - } else if(!elm->optional) { - ASN__ENCODE_FAILED; - } - } - } /* if(has_extensions) */ - - - { - asn_enc_rval_t er = {0, 0, 0}; - er.encoded = computed_size; - ASN__ENCODED_OK(er); - } -} +/* + * Copyright (c) 2017 Lev Walkin . + * All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include +#include +#include + +/* + * This macro "eats" the part of the buffer which is definitely "consumed", + * i.e. was correctly converted into local representation or rightfully skipped. + */ +#undef ADVANCE +#define ADVANCE(num_bytes) \ + do { \ + size_t num = num_bytes; \ + ptr = ((const char *)ptr) + num; \ + size -= num; \ + consumed_myself += num; \ + } while(0) + +/* + * Switch to the next phase of parsing. + */ +#undef NEXT_PHASE +#undef PHASE_OUT +#define NEXT_PHASE(ctx) \ + do { \ + ctx->phase++; \ + ctx->step = 0; \ + } while(0) + +/* + * Check whether we are inside the extensions group. + */ +#define IN_EXTENSION_GROUP(specs, memb_idx) \ + ((specs)->first_extension >= 0 \ + && (unsigned)(specs)->first_extension <= (memb_idx)) + +#define IN_ROOT_GROUP_PRED(edx) \ + edx < (specs->first_extension < 0 ? td->elements_count \ + : (size_t)specs->first_extension) + +#define FOR_IN_ROOT_GROUP(edx) for(edx = 0; IN_ROOT_GROUP_PRED(edx); edx++) + +/* + * Return a standardized complex structure. + */ +#undef RETURN +#define RETURN(_code) do { \ + rval.code = _code; \ + rval.consumed = consumed_myself;\ + return rval; \ + } while(0) + +/* + * Return pointer to a member. + */ +static void ** +element_ptrptr(void *struct_ptr, asn_TYPE_member_t *elm, void **tmp_save_ptr) { + if(elm->flags & ATF_POINTER) { + /* Member is a pointer to another structure */ + return (void **)((char *)struct_ptr + elm->memb_offset); + } else { + assert(tmp_save_ptr); + *tmp_save_ptr = (void *)((char *)struct_ptr + elm->memb_offset); + return tmp_save_ptr; + } +} + +static const void * +element_ptr(const void *struct_ptr, const asn_TYPE_member_t *elm) { + if(elm->flags & ATF_POINTER) { + /* Member is a pointer to another structure */ + return *(const void *const *)((const char *)struct_ptr + + elm->memb_offset); + } else { + return (const void *)((const char *)struct_ptr + elm->memb_offset); + } +} + +asn_dec_rval_t +SEQUENCE_decode_oer(const asn_codec_ctx_t *opt_codec_ctx, + const asn_TYPE_descriptor_t *td, + const asn_oer_constraints_t *constraints, void **struct_ptr, + const void *ptr, size_t size) { + const asn_SEQUENCE_specifics_t *specs = + (const asn_SEQUENCE_specifics_t *)td->specifics; + asn_dec_rval_t rval = {RC_OK, 0}; + void *st = *struct_ptr; /* Target structure */ + asn_struct_ctx_t *ctx; /* Decoder context */ + size_t consumed_myself = 0; /* Consumed bytes from ptr. */ + + (void)constraints; + + if(ASN__STACK_OVERFLOW_CHECK(opt_codec_ctx)) + ASN__DECODE_FAILED; + + /* + * Create the target structure if it is not present already. + */ + if(st == 0) { + st = *struct_ptr = CALLOC(1, specs->struct_size); + if(st == 0) { + RETURN(RC_FAIL); + } + } + + /* + * Restore parsing context. + */ + ctx = (asn_struct_ctx_t *)((char *)st + specs->ctx_offset); + + /* + * Start to parse where left previously. + */ + switch(ctx->phase) { + case 0: { + /* + * Fetch preamble. + */ + asn_bit_data_t *preamble; + int has_extensions_bit = (specs->first_extension >= 0); + size_t preamble_bits = (has_extensions_bit + specs->roms_count); + size_t preamble_bytes = ((7 + preamble_bits) >> 3); + + ASN_DEBUG("OER SEQUENCE %s Decoding PHASE 0", td->name); + + ASN_DEBUG( + "Expecting preamble bits %" ASN_PRI_SIZE " for %s (including %d extension bits)", + preamble_bits, td->name, has_extensions_bit); + ctx->start = ptr; + if(preamble_bytes > size) { + ASN__DECODE_STARVED; + } + + preamble = asn_bit_data_new_contiguous(ptr, preamble_bits); + if(!preamble) { + RETURN(RC_FAIL); + } + preamble->nboff = has_extensions_bit; + ctx->ptr = preamble; + ADVANCE(preamble_bytes); + } + NEXT_PHASE(ctx); + /* FALL THROUGH */ + case 1: { + /* Decode components of the extension root */ + asn_bit_data_t *preamble = ctx->ptr; + size_t edx; + + ASN_DEBUG("OER SEQUENCE %s Decoding PHASE 1 (Root)", td->name); + + assert(preamble); + + for(edx = (ctx->step >> 1); IN_ROOT_GROUP_PRED(edx); + edx++, ctx->step = (ctx->step & ~1) + 2) { + asn_TYPE_member_t *elm = &td->elements[edx]; + + ASN_DEBUG("Decoding %s->%s", td->name, elm->name); + + assert(!IN_EXTENSION_GROUP(specs, edx)); + + if(ctx->step & 1) { + goto microphase2_decode_continues; + } + + + if(elm->optional) { + int32_t present = asn_get_few_bits(preamble, 1); + if(present < 0) { + ASN_DEBUG("Presence map ended prematurely: %d", present); + RETURN(RC_FAIL); + } else if(present == 0) { + if(elm->default_value_set) { + /* Fill-in DEFAULT */ + void *tmp; + if(elm->default_value_set( + element_ptrptr(st, elm, &tmp))) { + RETURN(RC_FAIL); + } + } + /* The member is not present. */ + continue; + } + /* Present OPTIONAL or DEFAULT component. */ + } + + /* + * MICROPHASE 2: Invoke the member-specific decoder. + */ + ctx->step |= 1; /* Confirm entering next microphase */ + microphase2_decode_continues: + if(elm->flags & ATF_OPEN_TYPE) { + rval = OPEN_TYPE_oer_get(opt_codec_ctx, td, st, elm, ptr, size); + } else { + void *save_memb_ptr; /* Temporary reference. */ + void **memb_ptr2; /* Pointer to a pointer to a memmber */ + + memb_ptr2 = element_ptrptr(st, elm, &save_memb_ptr); + + rval = elm->type->op->oer_decoder( + opt_codec_ctx, elm->type, + elm->encoding_constraints.oer_constraints, memb_ptr2, ptr, + size); + } + switch(rval.code) { + case RC_OK: + ctx->left = consumed_myself; + ADVANCE(rval.consumed); + break; + case RC_WMORE: + ASN_DEBUG("More bytes needed at element %s \"%s\"", td->name, + elm->name); + ADVANCE(rval.consumed); + RETURN(RC_WMORE); + case RC_FAIL: + ASN_DEBUG("Decoding failed at element %s \"%s\"", td->name, + elm->name); + RETURN(RC_FAIL); + } + } /* for(all root members) */ + + } + NEXT_PHASE(ctx); + /* FALL THROUGH */ + case 2: + assert(ctx->ptr); + { + /* Cleanup preamble. */ + asn_bit_data_t *preamble = ctx->ptr; + asn_bit_data_t *extadds; + int has_extensions_bit = (specs->first_extension >= 0); + int extensions_present = + has_extensions_bit + && (preamble->buffer == NULL + || (((const uint8_t *)preamble->buffer)[0] & 0x80)); + uint8_t unused_bits; + size_t len = 0; + ssize_t len_len; + + ASN_DEBUG("OER SEQUENCE %s Decoding PHASE 2", td->name); + + preamble->buffer = 0; /* Will do extensions_present==1 next time. */ + + if(!extensions_present) { + ctx->phase = 10; + ctx->left = consumed_myself; + RETURN(RC_OK); + } + + /* + * X.696 (08/2015) #16.1 (c), #16.4 + * Read in the extension addition presence bitmap. + */ + + len_len = oer_fetch_length(ptr, size, &len); + if(len_len > 0) { + ADVANCE(len_len); + } else if(len_len < 0) { + RETURN(RC_FAIL); + } else { + RETURN(RC_WMORE); + } + + if(len == 0) { + /* 16.4.1-2 */ + RETURN(RC_FAIL); + } else if(len > size) { + RETURN(RC_WMORE); + } + + /* Account for unused bits */ + unused_bits = 0x7 & *(const uint8_t *)ptr; + ADVANCE(1); + len--; + if(unused_bits && len == 0) { + RETURN(RC_FAIL); + } + + /* Get the extensions map */ + extadds = asn_bit_data_new_contiguous(ptr, len * 8 - unused_bits); + if(!extadds) { + RETURN(RC_FAIL); + } + FREEMEM(preamble); + ctx->ptr = extadds; + ADVANCE(len); + } + NEXT_PHASE(ctx); + ctx->step = + (specs->first_extension < 0 ? td->elements_count + : (size_t)specs->first_extension); + /* Fall through */ + case 3: + ASN_DEBUG("OER SEQUENCE %s Decoding PHASE 3 (Extensions)", td->name); + for(; ctx->step < (signed)td->elements_count; ctx->step++) { + asn_bit_data_t *extadds = ctx->ptr; + size_t edx = ctx->step; + asn_TYPE_member_t *elm = &td->elements[edx]; + void *tmp_memb_ptr; + void **memb_ptr2 = element_ptrptr(st, elm, &tmp_memb_ptr); + + switch(asn_get_few_bits(extadds, 1)) { + case -1: + /* + * Not every one of our extensions is known to the remote side. + * Continue filling in their defaults though. + */ + /* Fall through */ + case 0: + /* Fill-in DEFAULT */ + if(elm->default_value_set + && elm->default_value_set(memb_ptr2)) { + RETURN(RC_FAIL); + } + continue; + case 1: { + /* Read OER open type */ + ssize_t ot_size = + oer_open_type_get(opt_codec_ctx, elm->type, + elm->encoding_constraints.oer_constraints, + memb_ptr2, ptr, size); + assert(ot_size <= (ssize_t)size); + if(ot_size > 0) { + ADVANCE(ot_size); + } else if(ot_size < 0) { + RETURN(RC_FAIL); + } else { + /* Roll back open type parsing */ + asn_get_undo(extadds, 1); + RETURN(RC_WMORE); + } + break; + } + default: + RETURN(RC_FAIL); + } + } + + NEXT_PHASE(ctx); + /* Fall through */ + case 4: + ASN_DEBUG("OER SEQUENCE %s Decoding PHASE 4", td->name); + /* Read in the rest of Open Types while ignoring them */ + for(;;) { + asn_bit_data_t *extadds = ctx->ptr; + switch(asn_get_few_bits(extadds, 1)) { + case 0: + continue; + case 1: { + ssize_t skipped = oer_open_type_skip(ptr, size); + if(skipped > 0) { + ADVANCE(skipped); + } else if(skipped < 0) { + RETURN(RC_FAIL); + } else { + asn_get_undo(extadds, 1); + RETURN(RC_WMORE); + } + continue; + } + case -1: + /* No more Open Type encoded components */ + break; + default: + RETURN(RC_FAIL); + } + break; + } + } + ctx->left = consumed_myself; + RETURN(RC_OK); +} + +/* + * Encode as Canonical OER. + */ +asn_enc_rval_t +SEQUENCE_encode_oer(const asn_TYPE_descriptor_t *td, + const asn_oer_constraints_t *constraints, const void *sptr, + asn_app_consume_bytes_f *cb, void *app_key) { + const asn_SEQUENCE_specifics_t *specs = (const asn_SEQUENCE_specifics_t *)td->specifics; + size_t computed_size = 0; + int has_extensions_bit = (specs->first_extension >= 0); + size_t preamble_bits = (has_extensions_bit + specs->roms_count); + uint32_t has_extensions = 0; + size_t edx; + int ret; + + (void)constraints; + + if(preamble_bits) { + asn_bit_outp_t preamble; + + memset(&preamble, 0, sizeof(preamble)); + preamble.output = cb; + preamble.op_key = app_key; + + if(has_extensions_bit) { + for(edx = specs->first_extension; edx < td->elements_count; edx++) { + asn_TYPE_member_t *elm = &td->elements[edx]; + const void *memb_ptr = element_ptr(sptr, elm); + if(memb_ptr) { + if(elm->default_value_cmp + && elm->default_value_cmp(memb_ptr) == 0) { + /* Do not encode default values in extensions */ + } else { + has_extensions = 1; + break; + } + } + } + ret = asn_put_few_bits(&preamble, has_extensions, 1); + assert(ret == 0); + if(ret < 0) { + ASN__ENCODE_FAILED; + } + } + + /* + * Encode optional components bitmap. + */ + if(specs->roms_count) { + FOR_IN_ROOT_GROUP(edx) { + asn_TYPE_member_t *elm = &td->elements[edx]; + + if(IN_EXTENSION_GROUP(specs, edx)) break; + + if(elm->optional) { + const void *memb_ptr = element_ptr(sptr, elm); + uint32_t has_component = memb_ptr != NULL; + if(has_component && elm->default_value_cmp + && elm->default_value_cmp(memb_ptr) == 0) { + has_component = 0; + } + ret = asn_put_few_bits(&preamble, has_component, 1); + if(ret < 0) { + ASN__ENCODE_FAILED; + } + } + } + } + + asn_put_aligned_flush(&preamble); + computed_size += preamble.flushed_bytes; + } /* if(preamble_bits) */ + + /* + * Put root components and extensions root. + */ + for(edx = 0; edx < td->elements_count; edx++) { + asn_TYPE_member_t *elm = &td->elements[edx]; + asn_enc_rval_t er = {0,0,0}; + const void *memb_ptr; + + if(IN_EXTENSION_GROUP(specs, edx)) break; + + memb_ptr = element_ptr(sptr, elm); + if(memb_ptr) { + if(elm->default_value_cmp + && elm->default_value_cmp(memb_ptr) == 0) { + /* Skip default values in encoding */ + continue; + } + } else { + if(elm->optional) continue; + /* Mandatory element is missing */ + ASN__ENCODE_FAILED; + } + if(!elm->type->op->oer_encoder) { + ASN_DEBUG("OER encoder is not defined for type %s", elm->type->name); + ASN__ENCODE_FAILED; + } + er = elm->type->op->oer_encoder( + elm->type, elm->encoding_constraints.oer_constraints, memb_ptr, cb, + app_key); + if(er.encoded == -1) { + ASN_DEBUG("... while encoding %s member \"%s\"\n", td->name, + elm->name); + return er; + } + computed_size += er.encoded; + } + + /* + * Before encode extensions, encode extensions additions presence bitmap + # X.696 (08/2015) #16.4. + */ + if(has_extensions) { + asn_bit_outp_t extadds; + + /* Special case allowing us to use exactly one byte for #8.6 */ + size_t aoms_length_bits = specs->aoms_count; + size_t aoms_length_bytes = (7 + aoms_length_bits) >> 3; + uint8_t unused_bits = 0x07 & (8 - (aoms_length_bits & 0x07)); + + assert(1 + aoms_length_bytes <= 127); + + memset(&extadds, 0, sizeof(extadds)); + extadds.output = cb; + extadds.op_key = app_key; + + /* #8.6 length determinant */ + ret = asn_put_few_bits(&extadds, (1 + aoms_length_bytes), 8); + if(ret < 0) ASN__ENCODE_FAILED; + + /* Number of unused bytes, #16.4.2 */ + ret = asn_put_few_bits(&extadds, unused_bits, 8); + if(ret < 0) ASN__ENCODE_FAILED; + + /* Encode presence bitmap #16.4.3 */ + for(edx = specs->first_extension; edx < td->elements_count; edx++) { + asn_TYPE_member_t *elm = &td->elements[edx]; + const void *memb_ptr = element_ptr(sptr, elm); + if(memb_ptr && elm->default_value_cmp + && elm->default_value_cmp(memb_ptr) == 0) { + memb_ptr = 0; /* Do not encode default value. */ + } + ret |= asn_put_few_bits(&extadds, memb_ptr ? 1 : 0, 1); + } + if(ret < 0) ASN__ENCODE_FAILED; + + asn_put_aligned_flush(&extadds); + computed_size += extadds.flushed_bytes; + + /* Now, encode extensions */ + for(edx = specs->first_extension; edx < td->elements_count; edx++) { + asn_TYPE_member_t *elm = &td->elements[edx]; + const void *memb_ptr = element_ptr(sptr, elm); + + if(memb_ptr) { + if(elm->default_value_cmp + && elm->default_value_cmp(memb_ptr) == 0) { + /* Do not encode default value. */ + } else { + ssize_t wrote = oer_open_type_put( + elm->type, elm->encoding_constraints.oer_constraints, + memb_ptr, cb, app_key); + if(wrote == -1) { + ASN__ENCODE_FAILED; + } + computed_size += wrote; + } + } else if(!elm->optional) { + ASN__ENCODE_FAILED; + } + } + } /* if(has_extensions) */ + + + { + asn_enc_rval_t er = {0, 0, 0}; + er.encoded = computed_size; + ASN__ENCODED_OK(er); + } +} diff --git a/certgen/asncodec/constr_SEQUENCE_print.c b/certgen/asncodec/constr_SEQUENCE_print.c index 7f9e231a40fe382ad847cdbd8660a832d8f21310..d92a00ec2fccd778029f299f2cee05e3b13aa743 100644 --- a/certgen/asncodec/constr_SEQUENCE_print.c +++ b/certgen/asncodec/constr_SEQUENCE_print.c @@ -1,55 +1,55 @@ -/* - * Copyright (c) 2017 Lev Walkin . - * All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include - -int -SEQUENCE_print(const asn_TYPE_descriptor_t *td, const void *sptr, int ilevel, - asn_app_consume_bytes_f *cb, void *app_key) { - size_t edx; - int ret; - - if(!sptr) return (cb("", 8, app_key) < 0) ? -1 : 0; - - /* Dump preamble */ - if(cb(td->name, strlen(td->name), app_key) < 0 - || cb(" ::= {", 6, app_key) < 0) - return -1; - - for(edx = 0; edx < td->elements_count; edx++) { - asn_TYPE_member_t *elm = &td->elements[edx]; - const void *memb_ptr; - - if(elm->flags & ATF_POINTER) { - memb_ptr = *(const void * const *)((const char *)sptr + elm->memb_offset); - if(!memb_ptr) { - if(elm->optional) continue; - /* Print line */ - /* Fall through */ - } - } else { - memb_ptr = (const void *)((const char *)sptr + elm->memb_offset); - } - - /* Indentation */ - _i_INDENT(1); - - /* Print the member's name and stuff */ - if(cb(elm->name, strlen(elm->name), app_key) < 0 - || cb(": ", 2, app_key) < 0) - return -1; - - /* Print the member itself */ - ret = elm->type->op->print_struct(elm->type, memb_ptr, ilevel + 1, - cb, app_key); - if(ret) return ret; - } - - ilevel--; - _i_INDENT(1); - - return (cb("}", 1, app_key) < 0) ? -1 : 0; -} +/* + * Copyright (c) 2017 Lev Walkin . + * All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include + +int +SEQUENCE_print(const asn_TYPE_descriptor_t *td, const void *sptr, int ilevel, + asn_app_consume_bytes_f *cb, void *app_key) { + size_t edx; + int ret; + + if(!sptr) return (cb("", 8, app_key) < 0) ? -1 : 0; + + /* Dump preamble */ + if(cb(td->name, strlen(td->name), app_key) < 0 + || cb(" ::= {", 6, app_key) < 0) + return -1; + + for(edx = 0; edx < td->elements_count; edx++) { + asn_TYPE_member_t *elm = &td->elements[edx]; + const void *memb_ptr; + + if(elm->flags & ATF_POINTER) { + memb_ptr = *(const void * const *)((const char *)sptr + elm->memb_offset); + if(!memb_ptr) { + if(elm->optional) continue; + /* Print line */ + /* Fall through */ + } + } else { + memb_ptr = (const void *)((const char *)sptr + elm->memb_offset); + } + + /* Indentation */ + _i_INDENT(1); + + /* Print the member's name and stuff */ + if(cb(elm->name, strlen(elm->name), app_key) < 0 + || cb(": ", 2, app_key) < 0) + return -1; + + /* Print the member itself */ + ret = elm->type->op->print_struct(elm->type, memb_ptr, ilevel + 1, + cb, app_key); + if(ret) return ret; + } + + ilevel--; + _i_INDENT(1); + + return (cb("}", 1, app_key) < 0) ? -1 : 0; +} diff --git a/certgen/asncodec/constr_SEQUENCE_xer.c b/certgen/asncodec/constr_SEQUENCE_xer.c index c6475f78a479d63ef96f0cfa6a6ae177db11e580..4feb151c0fad3c9372ab7136dbfea7135d0b362e 100644 --- a/certgen/asncodec/constr_SEQUENCE_xer.c +++ b/certgen/asncodec/constr_SEQUENCE_xer.c @@ -1,348 +1,348 @@ -/* - * Copyright (c) 2017 Lev Walkin . - * All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include -#include - -/* - * Return a standardized complex structure. - */ -#undef RETURN -#define RETURN(_code) \ - do { \ - rval.code = _code; \ - rval.consumed = consumed_myself; \ - return rval; \ - } while(0) - -/* - * Check whether we are inside the extensions group. - */ -#define IN_EXTENSION_GROUP(specs, memb_idx) \ - ((specs)->first_extension >= 0 \ - && (unsigned)(specs)->first_extension <= (memb_idx)) - -#undef XER_ADVANCE -#define XER_ADVANCE(num_bytes) \ - do { \ - size_t num = (num_bytes); \ - ptr = ((const char *)ptr) + num; \ - size -= num; \ - consumed_myself += num; \ - } while(0) - -/* - * Decode the XER (XML) data. - */ -asn_dec_rval_t -SEQUENCE_decode_xer(const asn_codec_ctx_t *opt_codec_ctx, - const asn_TYPE_descriptor_t *td, void **struct_ptr, - const char *opt_mname, const void *ptr, size_t size) { - /* - * Bring closer parts of structure description. - */ - const asn_SEQUENCE_specifics_t *specs - = (const asn_SEQUENCE_specifics_t *)td->specifics; - asn_TYPE_member_t *elements = td->elements; - const char *xml_tag = opt_mname ? opt_mname : td->xml_tag; - - /* - * ... and parts of the structure being constructed. - */ - void *st = *struct_ptr; /* Target structure. */ - asn_struct_ctx_t *ctx; /* Decoder context */ - - asn_dec_rval_t rval; /* Return value from a decoder */ - ssize_t consumed_myself = 0; /* Consumed bytes from ptr */ - size_t edx; /* Element index */ - - /* - * Create the target structure if it is not present already. - */ - if(st == 0) { - st = *struct_ptr = CALLOC(1, specs->struct_size); - if(st == 0) RETURN(RC_FAIL); - } - - /* - * Restore parsing context. - */ - ctx = (asn_struct_ctx_t *)((char *)st + specs->ctx_offset); - - - /* - * Phases of XER/XML processing: - * Phase 0: Check that the opening tag matches our expectations. - * Phase 1: Processing body and reacting on closing tag. - * Phase 2: Processing inner type. - * Phase 3: Skipping unknown extensions. - * Phase 4: PHASED OUT - */ - for(edx = ctx->step; ctx->phase <= 3;) { - pxer_chunk_type_e ch_type; /* XER chunk type */ - ssize_t ch_size; /* Chunk size */ - xer_check_tag_e tcv; /* Tag check value */ - asn_TYPE_member_t *elm; - - /* - * Go inside the inner member of a sequence. - */ - if(ctx->phase == 2) { - asn_dec_rval_t tmprval; - void *memb_ptr_dontuse; /* Pointer to the member */ - void **memb_ptr2; /* Pointer to that pointer */ - - elm = &td->elements[edx]; - - if(elm->flags & ATF_POINTER) { - /* Member is a pointer to another structure */ - memb_ptr2 = (void **)((char *)st + elm->memb_offset); - } else { - memb_ptr_dontuse = (char *)st + elm->memb_offset; - memb_ptr2 = &memb_ptr_dontuse; /* Only use of memb_ptr_dontuse */ - } - - if(elm->flags & ATF_OPEN_TYPE) { - tmprval = OPEN_TYPE_xer_get(opt_codec_ctx, td, st, elm, ptr, size); - } else { - /* Invoke the inner type decoder, m.b. multiple times */ - tmprval = elm->type->op->xer_decoder(opt_codec_ctx, - elm->type, memb_ptr2, elm->name, - ptr, size); - } - XER_ADVANCE(tmprval.consumed); - if(tmprval.code != RC_OK) - RETURN(tmprval.code); - ctx->phase = 1; /* Back to body processing */ - ctx->step = ++edx; - ASN_DEBUG("XER/SEQUENCE phase => %d, step => %d", - ctx->phase, ctx->step); - /* Fall through */ - } - - /* - * Get the next part of the XML stream. - */ - ch_size = xer_next_token(&ctx->context, ptr, size, - &ch_type); - if(ch_size == -1) { - RETURN(RC_FAIL); - } else { - switch(ch_type) { - case PXER_WMORE: - RETURN(RC_WMORE); - case PXER_COMMENT: /* Got XML comment */ - case PXER_TEXT: /* Ignore free-standing text */ - XER_ADVANCE(ch_size); /* Skip silently */ - continue; - case PXER_TAG: - break; /* Check the rest down there */ - } - } - - tcv = xer_check_tag(ptr, ch_size, xml_tag); - ASN_DEBUG("XER/SEQUENCE: tcv = %d, ph=%d [%s]", - tcv, ctx->phase, xml_tag); - - /* Skip the extensions section */ - if(ctx->phase == 3) { - switch(xer_skip_unknown(tcv, &ctx->left)) { - case -1: - ctx->phase = 4; - RETURN(RC_FAIL); - case 0: - XER_ADVANCE(ch_size); - continue; - case 1: - XER_ADVANCE(ch_size); - ctx->phase = 1; - continue; - case 2: - ctx->phase = 1; - break; - } - } - - switch(tcv) { - case XCT_CLOSING: - if(ctx->phase == 0) break; - ctx->phase = 0; - /* Fall through */ - case XCT_BOTH: - if(ctx->phase == 0) { - if(edx >= td->elements_count || - /* Explicit OPTIONAL specs reaches the end */ - (edx + elements[edx].optional == td->elements_count) || - /* All extensions are optional */ - IN_EXTENSION_GROUP(specs, edx)) { - XER_ADVANCE(ch_size); - ctx->phase = 4; /* Phase out */ - RETURN(RC_OK); - } else { - ASN_DEBUG("Premature end of XER SEQUENCE"); - RETURN(RC_FAIL); - } - } - /* Fall through */ - case XCT_OPENING: - if(ctx->phase == 0) { - XER_ADVANCE(ch_size); - ctx->phase = 1; /* Processing body phase */ - continue; - } - /* Fall through */ - case XCT_UNKNOWN_OP: - case XCT_UNKNOWN_BO: - - ASN_DEBUG("XER/SEQUENCE: tcv=%d, ph=%d, edx=%" ASN_PRI_SIZE "", - tcv, ctx->phase, edx); - if(ctx->phase != 1) { - break; /* Really unexpected */ - } - - if(edx < td->elements_count) { - /* - * Search which member corresponds to this tag. - */ - size_t n; - size_t edx_end = edx + elements[edx].optional + 1; - if(edx_end > td->elements_count) - edx_end = td->elements_count; - for(n = edx; n < edx_end; n++) { - elm = &td->elements[n]; - tcv = xer_check_tag(ptr, ch_size, elm->name); - switch(tcv) { - case XCT_BOTH: - case XCT_OPENING: - /* - * Process this member. - */ - ctx->step = edx = n; - ctx->phase = 2; - break; - case XCT_UNKNOWN_OP: - case XCT_UNKNOWN_BO: - continue; - default: - n = edx_end; - break; /* Phase out */ - } - break; - } - if(n != edx_end) - continue; - } else { - ASN_DEBUG("Out of defined members: %" ASN_PRI_SIZE "/%u", - edx, td->elements_count); - } - - /* It is expected extension */ - if(IN_EXTENSION_GROUP(specs, - edx + (edx < td->elements_count - ? elements[edx].optional : 0))) { - ASN_DEBUG("Got anticipated extension at %" ASN_PRI_SIZE "", - edx); - /* - * Check for (XCT_BOTH or XCT_UNKNOWN_BO) - * By using a mask. Only record a pure - * tags. - */ - if(tcv & XCT_CLOSING) { - /* Found without body */ - } else { - ctx->left = 1; - ctx->phase = 3; /* Skip ...'s */ - } - XER_ADVANCE(ch_size); - continue; - } - - /* Fall through */ - default: - break; - } - - ASN_DEBUG("Unexpected XML tag in SEQUENCE [%c%c%c%c%c%c]", - size>0?((const char *)ptr)[0]:'.', - size>1?((const char *)ptr)[1]:'.', - size>2?((const char *)ptr)[2]:'.', - size>3?((const char *)ptr)[3]:'.', - size>4?((const char *)ptr)[4]:'.', - size>5?((const char *)ptr)[5]:'.'); - break; - } - - ctx->phase = 4; /* "Phase out" on hard failure */ - RETURN(RC_FAIL); -} - -asn_enc_rval_t -SEQUENCE_encode_xer(const asn_TYPE_descriptor_t *td, const void *sptr, - int ilevel, enum xer_encoder_flags_e flags, - asn_app_consume_bytes_f *cb, void *app_key) { - asn_enc_rval_t er = {0,0,0}; - int xcan = (flags & XER_F_CANONICAL); - asn_TYPE_descriptor_t *tmp_def_val_td = 0; - void *tmp_def_val = 0; - size_t edx; - - if(!sptr) ASN__ENCODE_FAILED; - - er.encoded = 0; - - for(edx = 0; edx < td->elements_count; edx++) { - asn_enc_rval_t tmper = {0,0,0}; - asn_TYPE_member_t *elm = &td->elements[edx]; - const void *memb_ptr; - const char *mname = elm->name; - unsigned int mlen = strlen(mname); - - if(elm->flags & ATF_POINTER) { - memb_ptr = - *(const void *const *)((const char *)sptr + elm->memb_offset); - if(!memb_ptr) { - assert(tmp_def_val == 0); - if(elm->default_value_set) { - if(elm->default_value_set(&tmp_def_val)) { - ASN__ENCODE_FAILED; - } else { - memb_ptr = tmp_def_val; - tmp_def_val_td = elm->type; - } - } else if(elm->optional) { - continue; - } else { - /* Mandatory element is missing */ - ASN__ENCODE_FAILED; - } - } - } else { - memb_ptr = (const void *)((const char *)sptr + elm->memb_offset); - } - - if(!xcan) ASN__TEXT_INDENT(1, ilevel); - ASN__CALLBACK3("<", 1, mname, mlen, ">", 1); - - /* Print the member itself */ - tmper = elm->type->op->xer_encoder(elm->type, memb_ptr, ilevel + 1, - flags, cb, app_key); - if(tmp_def_val) { - ASN_STRUCT_FREE(*tmp_def_val_td, tmp_def_val); - tmp_def_val = 0; - } - if(tmper.encoded == -1) return tmper; - er.encoded += tmper.encoded; - - ASN__CALLBACK3("", 1); - } - - if(!xcan) ASN__TEXT_INDENT(1, ilevel - 1); - - ASN__ENCODED_OK(er); -cb_failed: - if(tmp_def_val) ASN_STRUCT_FREE(*tmp_def_val_td, tmp_def_val); - ASN__ENCODE_FAILED; -} +/* + * Copyright (c) 2017 Lev Walkin . + * All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include +#include + +/* + * Return a standardized complex structure. + */ +#undef RETURN +#define RETURN(_code) \ + do { \ + rval.code = _code; \ + rval.consumed = consumed_myself; \ + return rval; \ + } while(0) + +/* + * Check whether we are inside the extensions group. + */ +#define IN_EXTENSION_GROUP(specs, memb_idx) \ + ((specs)->first_extension >= 0 \ + && (unsigned)(specs)->first_extension <= (memb_idx)) + +#undef XER_ADVANCE +#define XER_ADVANCE(num_bytes) \ + do { \ + size_t num = (num_bytes); \ + ptr = ((const char *)ptr) + num; \ + size -= num; \ + consumed_myself += num; \ + } while(0) + +/* + * Decode the XER (XML) data. + */ +asn_dec_rval_t +SEQUENCE_decode_xer(const asn_codec_ctx_t *opt_codec_ctx, + const asn_TYPE_descriptor_t *td, void **struct_ptr, + const char *opt_mname, const void *ptr, size_t size) { + /* + * Bring closer parts of structure description. + */ + const asn_SEQUENCE_specifics_t *specs + = (const asn_SEQUENCE_specifics_t *)td->specifics; + asn_TYPE_member_t *elements = td->elements; + const char *xml_tag = opt_mname ? opt_mname : td->xml_tag; + + /* + * ... and parts of the structure being constructed. + */ + void *st = *struct_ptr; /* Target structure. */ + asn_struct_ctx_t *ctx; /* Decoder context */ + + asn_dec_rval_t rval; /* Return value from a decoder */ + ssize_t consumed_myself = 0; /* Consumed bytes from ptr */ + size_t edx; /* Element index */ + + /* + * Create the target structure if it is not present already. + */ + if(st == 0) { + st = *struct_ptr = CALLOC(1, specs->struct_size); + if(st == 0) RETURN(RC_FAIL); + } + + /* + * Restore parsing context. + */ + ctx = (asn_struct_ctx_t *)((char *)st + specs->ctx_offset); + + + /* + * Phases of XER/XML processing: + * Phase 0: Check that the opening tag matches our expectations. + * Phase 1: Processing body and reacting on closing tag. + * Phase 2: Processing inner type. + * Phase 3: Skipping unknown extensions. + * Phase 4: PHASED OUT + */ + for(edx = ctx->step; ctx->phase <= 3;) { + pxer_chunk_type_e ch_type; /* XER chunk type */ + ssize_t ch_size; /* Chunk size */ + xer_check_tag_e tcv; /* Tag check value */ + asn_TYPE_member_t *elm; + + /* + * Go inside the inner member of a sequence. + */ + if(ctx->phase == 2) { + asn_dec_rval_t tmprval; + void *memb_ptr_dontuse; /* Pointer to the member */ + void **memb_ptr2; /* Pointer to that pointer */ + + elm = &td->elements[edx]; + + if(elm->flags & ATF_POINTER) { + /* Member is a pointer to another structure */ + memb_ptr2 = (void **)((char *)st + elm->memb_offset); + } else { + memb_ptr_dontuse = (char *)st + elm->memb_offset; + memb_ptr2 = &memb_ptr_dontuse; /* Only use of memb_ptr_dontuse */ + } + + if(elm->flags & ATF_OPEN_TYPE) { + tmprval = OPEN_TYPE_xer_get(opt_codec_ctx, td, st, elm, ptr, size); + } else { + /* Invoke the inner type decoder, m.b. multiple times */ + tmprval = elm->type->op->xer_decoder(opt_codec_ctx, + elm->type, memb_ptr2, elm->name, + ptr, size); + } + XER_ADVANCE(tmprval.consumed); + if(tmprval.code != RC_OK) + RETURN(tmprval.code); + ctx->phase = 1; /* Back to body processing */ + ctx->step = ++edx; + ASN_DEBUG("XER/SEQUENCE phase => %d, step => %d", + ctx->phase, ctx->step); + /* Fall through */ + } + + /* + * Get the next part of the XML stream. + */ + ch_size = xer_next_token(&ctx->context, ptr, size, + &ch_type); + if(ch_size == -1) { + RETURN(RC_FAIL); + } else { + switch(ch_type) { + case PXER_WMORE: + RETURN(RC_WMORE); + case PXER_COMMENT: /* Got XML comment */ + case PXER_TEXT: /* Ignore free-standing text */ + XER_ADVANCE(ch_size); /* Skip silently */ + continue; + case PXER_TAG: + break; /* Check the rest down there */ + } + } + + tcv = xer_check_tag(ptr, ch_size, xml_tag); + ASN_DEBUG("XER/SEQUENCE: tcv = %d, ph=%d [%s]", + tcv, ctx->phase, xml_tag); + + /* Skip the extensions section */ + if(ctx->phase == 3) { + switch(xer_skip_unknown(tcv, &ctx->left)) { + case -1: + ctx->phase = 4; + RETURN(RC_FAIL); + case 0: + XER_ADVANCE(ch_size); + continue; + case 1: + XER_ADVANCE(ch_size); + ctx->phase = 1; + continue; + case 2: + ctx->phase = 1; + break; + } + } + + switch(tcv) { + case XCT_CLOSING: + if(ctx->phase == 0) break; + ctx->phase = 0; + /* Fall through */ + case XCT_BOTH: + if(ctx->phase == 0) { + if(edx >= td->elements_count || + /* Explicit OPTIONAL specs reaches the end */ + (edx + elements[edx].optional == td->elements_count) || + /* All extensions are optional */ + IN_EXTENSION_GROUP(specs, edx)) { + XER_ADVANCE(ch_size); + ctx->phase = 4; /* Phase out */ + RETURN(RC_OK); + } else { + ASN_DEBUG("Premature end of XER SEQUENCE"); + RETURN(RC_FAIL); + } + } + /* Fall through */ + case XCT_OPENING: + if(ctx->phase == 0) { + XER_ADVANCE(ch_size); + ctx->phase = 1; /* Processing body phase */ + continue; + } + /* Fall through */ + case XCT_UNKNOWN_OP: + case XCT_UNKNOWN_BO: + + ASN_DEBUG("XER/SEQUENCE: tcv=%d, ph=%d, edx=%" ASN_PRI_SIZE "", + tcv, ctx->phase, edx); + if(ctx->phase != 1) { + break; /* Really unexpected */ + } + + if(edx < td->elements_count) { + /* + * Search which member corresponds to this tag. + */ + size_t n; + size_t edx_end = edx + elements[edx].optional + 1; + if(edx_end > td->elements_count) + edx_end = td->elements_count; + for(n = edx; n < edx_end; n++) { + elm = &td->elements[n]; + tcv = xer_check_tag(ptr, ch_size, elm->name); + switch(tcv) { + case XCT_BOTH: + case XCT_OPENING: + /* + * Process this member. + */ + ctx->step = edx = n; + ctx->phase = 2; + break; + case XCT_UNKNOWN_OP: + case XCT_UNKNOWN_BO: + continue; + default: + n = edx_end; + break; /* Phase out */ + } + break; + } + if(n != edx_end) + continue; + } else { + ASN_DEBUG("Out of defined members: %" ASN_PRI_SIZE "/%u", + edx, td->elements_count); + } + + /* It is expected extension */ + if(IN_EXTENSION_GROUP(specs, + edx + (edx < td->elements_count + ? elements[edx].optional : 0))) { + ASN_DEBUG("Got anticipated extension at %" ASN_PRI_SIZE "", + edx); + /* + * Check for (XCT_BOTH or XCT_UNKNOWN_BO) + * By using a mask. Only record a pure + * tags. + */ + if(tcv & XCT_CLOSING) { + /* Found without body */ + } else { + ctx->left = 1; + ctx->phase = 3; /* Skip ...'s */ + } + XER_ADVANCE(ch_size); + continue; + } + + /* Fall through */ + default: + break; + } + + ASN_DEBUG("Unexpected XML tag in SEQUENCE [%c%c%c%c%c%c]", + size>0?((const char *)ptr)[0]:'.', + size>1?((const char *)ptr)[1]:'.', + size>2?((const char *)ptr)[2]:'.', + size>3?((const char *)ptr)[3]:'.', + size>4?((const char *)ptr)[4]:'.', + size>5?((const char *)ptr)[5]:'.'); + break; + } + + ctx->phase = 4; /* "Phase out" on hard failure */ + RETURN(RC_FAIL); +} + +asn_enc_rval_t +SEQUENCE_encode_xer(const asn_TYPE_descriptor_t *td, const void *sptr, + int ilevel, enum xer_encoder_flags_e flags, + asn_app_consume_bytes_f *cb, void *app_key) { + asn_enc_rval_t er = {0,0,0}; + int xcan = (flags & XER_F_CANONICAL); + asn_TYPE_descriptor_t *tmp_def_val_td = 0; + void *tmp_def_val = 0; + size_t edx; + + if(!sptr) ASN__ENCODE_FAILED; + + er.encoded = 0; + + for(edx = 0; edx < td->elements_count; edx++) { + asn_enc_rval_t tmper = {0,0,0}; + asn_TYPE_member_t *elm = &td->elements[edx]; + const void *memb_ptr; + const char *mname = elm->name; + unsigned int mlen = strlen(mname); + + if(elm->flags & ATF_POINTER) { + memb_ptr = + *(const void *const *)((const char *)sptr + elm->memb_offset); + if(!memb_ptr) { + assert(tmp_def_val == 0); + if(elm->default_value_set) { + if(elm->default_value_set(&tmp_def_val)) { + ASN__ENCODE_FAILED; + } else { + memb_ptr = tmp_def_val; + tmp_def_val_td = elm->type; + } + } else if(elm->optional) { + continue; + } else { + /* Mandatory element is missing */ + ASN__ENCODE_FAILED; + } + } + } else { + memb_ptr = (const void *)((const char *)sptr + elm->memb_offset); + } + + if(!xcan) ASN__TEXT_INDENT(1, ilevel); + ASN__CALLBACK3("<", 1, mname, mlen, ">", 1); + + /* Print the member itself */ + tmper = elm->type->op->xer_encoder(elm->type, memb_ptr, ilevel + 1, + flags, cb, app_key); + if(tmp_def_val) { + ASN_STRUCT_FREE(*tmp_def_val_td, tmp_def_val); + tmp_def_val = 0; + } + if(tmper.encoded == -1) return tmper; + er.encoded += tmper.encoded; + + ASN__CALLBACK3("", 1); + } + + if(!xcan) ASN__TEXT_INDENT(1, ilevel - 1); + + ASN__ENCODED_OK(er); +cb_failed: + if(tmp_def_val) ASN_STRUCT_FREE(*tmp_def_val_td, tmp_def_val); + ASN__ENCODE_FAILED; +} diff --git a/certgen/asncodec/constr_SET_OF.c b/certgen/asncodec/constr_SET_OF.c index 97a7cac0cc3638323deb5557257fe39134f44b02..75fb53f2a8a28318387740b2b7d3b00357946073 100644 --- a/certgen/asncodec/constr_SET_OF.c +++ b/certgen/asncodec/constr_SET_OF.c @@ -1,371 +1,371 @@ -/* - * Copyright (c) 2003-2017 Lev Walkin . - * All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include - -asn_TYPE_operation_t asn_OP_SET_OF = { - SET_OF_free, -#if !defined(ASN_DISABLE_PRINT_SUPPORT) - SET_OF_print, -#else - 0, -#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ - SET_OF_compare, -#if !defined(ASN_DISABLE_BER_SUPPORT) - SET_OF_decode_ber, - SET_OF_encode_der, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ -#if !defined(ASN_DISABLE_XER_SUPPORT) - SET_OF_decode_xer, - SET_OF_encode_xer, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ -#if !defined(ASN_DISABLE_JER_SUPPORT) - SET_OF_encode_jer, -#else - 0, -#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ -#if !defined(ASN_DISABLE_OER_SUPPORT) - SET_OF_decode_oer, - SET_OF_encode_oer, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ -#if !defined(ASN_DISABLE_UPER_SUPPORT) - SET_OF_decode_uper, - SET_OF_encode_uper, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ -#if !defined(ASN_DISABLE_APER_SUPPORT) - SET_OF_decode_aper, - SET_OF_encode_aper, -#else - 0, - 0, -#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ -#if !defined(ASN_DISABLE_RFILL_SUPPORT) - SET_OF_random_fill, -#else - 0, -#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ - 0 /* Use generic outmost tag fetcher */ -}; - -/* Append bytes to the above structure */ -static int _el_addbytes(const void *buffer, size_t size, void *el_buf_ptr) { - struct _el_buffer *el_buf = (struct _el_buffer *)el_buf_ptr; - - if(el_buf->length + size > el_buf->allocated_size) { - size_t new_size = el_buf->allocated_size ? el_buf->allocated_size : 8; - void *p; - - do { - new_size <<= 2; - } while(el_buf->length + size > new_size); - - p = REALLOC(el_buf->buf, new_size); - if(p) { - el_buf->buf = p; - el_buf->allocated_size = new_size; - } else { - return -1; - } - } - - memcpy(el_buf->buf + el_buf->length, buffer, size); - - el_buf->length += size; - return 0; -} - -static void assert_unused_bits(const struct _el_buffer* p) { - if(p->length) { - assert((p->buf[p->length-1] & ~(0xff << p->bits_unused)) == 0); - } else { - assert(p->bits_unused == 0); - } -} - -static int _el_buf_cmp(const void *ap, const void *bp) { - const struct _el_buffer *a = (const struct _el_buffer *)ap; - const struct _el_buffer *b = (const struct _el_buffer *)bp; - size_t common_len; - int ret = 0; - - if(a->length < b->length) - common_len = a->length; - else - common_len = b->length; - - if (a->buf && b->buf) { - ret = memcmp(a->buf, b->buf, common_len); - } - if(ret == 0) { - if(a->length < b->length) - ret = -1; - else if(a->length > b->length) - ret = 1; - /* Ignore unused bits. */ - assert_unused_bits(a); - assert_unused_bits(b); - } - - return ret; -} - -void -SET_OF__encode_sorted_free(struct _el_buffer *el_buf, size_t count) { - size_t i; - - for(i = 0; i < count; i++) { - FREEMEM(el_buf[i].buf); - } - - FREEMEM(el_buf); -} - -struct _el_buffer * -SET_OF__encode_sorted(const asn_TYPE_member_t *elm, - const asn_anonymous_set_ *list, - enum SET_OF__encode_method method) { - struct _el_buffer *encoded_els; - int edx; - - encoded_els = - (struct _el_buffer *)CALLOC(list->count, sizeof(encoded_els[0])); - if(encoded_els == NULL) { - return NULL; - } - - /* - * Encode all members. - */ - for(edx = 0; edx < list->count; edx++) { - const void *memb_ptr = list->array[edx]; - struct _el_buffer *encoding_el = &encoded_els[edx]; - asn_enc_rval_t erval = {0,0,0}; - - if(!memb_ptr) break; - - /* - * Encode the member into the prepared space. - */ - switch(method) { -#if !defined(ASN_DISABLE_BER_SUPPORT) - case SOES_DER: - erval = elm->type->op->der_encoder(elm->type, memb_ptr, 0, elm->tag, - _el_addbytes, encoding_el); - break; -#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ -#if !defined(ASN_DISABLE_UPER_SUPPORT) - case SOES_CUPER: - erval = uper_encode(elm->type, - elm->encoding_constraints.per_constraints, - memb_ptr, _el_addbytes, encoding_el); - if(erval.encoded != -1) { - size_t extra_bits = erval.encoded % 8; - assert(encoding_el->length == (size_t)(erval.encoded + 7) / 8); - encoding_el->bits_unused = (8 - extra_bits) & 0x7; - } - break; -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ -#if !defined(ASN_DISABLE_APER_SUPPORT) - case SOES_CAPER: - erval = aper_encode(elm->type, - elm->encoding_constraints.per_constraints, - memb_ptr, _el_addbytes, encoding_el); - if(erval.encoded != -1) { - size_t extra_bits = erval.encoded % 8; - assert(encoding_el->length == (size_t)(erval.encoded + 7) / 8); - encoding_el->bits_unused = (8 - extra_bits) & 0x7; - } - break; -#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ - - default: - assert(!"Unreachable"); - break; - } - if(erval.encoded < 0) break; - } - - if(edx == list->count) { - /* - * Sort the encoded elements according to their encoding. - */ - qsort(encoded_els, list->count, sizeof(encoded_els[0]), _el_buf_cmp); - - return encoded_els; - } else { - SET_OF__encode_sorted_free(encoded_els, edx); - return NULL; - } -} - -void -SET_OF_free(const asn_TYPE_descriptor_t *td, void *ptr, - enum asn_struct_free_method method) { - if(td && ptr) { - const asn_SET_OF_specifics_t *specs; - asn_TYPE_member_t *elm = td->elements; - asn_anonymous_set_ *list = _A_SET_FROM_VOID(ptr); - asn_struct_ctx_t *ctx; /* Decoder context */ - int i; - - /* - * Could not use set_of_empty() because of (*free) - * incompatibility. - */ - for(i = 0; i < list->count; i++) { - void *memb_ptr = list->array[i]; - if(memb_ptr) - ASN_STRUCT_FREE(*elm->type, memb_ptr); - } - list->count = 0; /* No meaningful elements left */ - - asn_set_empty(list); /* Remove (list->array) */ - - specs = (const asn_SET_OF_specifics_t *)td->specifics; - ctx = (asn_struct_ctx_t *)((char *)ptr + specs->ctx_offset); - if(ctx->ptr) { - ASN_STRUCT_FREE(*elm->type, ctx->ptr); - ctx->ptr = 0; - } - - switch(method) { - case ASFM_FREE_EVERYTHING: - FREEMEM(ptr); - break; - case ASFM_FREE_UNDERLYING: - break; - case ASFM_FREE_UNDERLYING_AND_RESET: - memset(ptr, 0, specs->struct_size); - break; - } - } -} - -int -SET_OF_constraint(const asn_TYPE_descriptor_t *td, const void *sptr, - asn_app_constraint_failed_f *ctfailcb, void *app_key) { - const asn_TYPE_member_t *elm = td->elements; - asn_constr_check_f *constr; - const asn_anonymous_set_ *list = _A_CSET_FROM_VOID(sptr); - int i; - - if(!sptr) { - ASN__CTFAIL(app_key, td, sptr, - "%s: value not given (%s:%d)", - td->name, __FILE__, __LINE__); - return -1; - } - - constr = elm->encoding_constraints.general_constraints; - if(!constr) constr = elm->type->encoding_constraints.general_constraints; - - /* - * Iterate over the members of an array. - * Validate each in turn, until one fails. - */ - for(i = 0; i < list->count; i++) { - const void *memb_ptr = list->array[i]; - int ret; - - if(!memb_ptr) continue; - - ret = constr(elm->type, memb_ptr, ctfailcb, app_key); - if(ret) return ret; - } - - return 0; -} - -struct comparable_ptr { - const asn_TYPE_descriptor_t *td; - const void *sptr; -}; - -static int -SET_OF__compare_cb(const void *aptr, const void *bptr) { - const struct comparable_ptr *a = aptr; - const struct comparable_ptr *b = bptr; - assert(a->td == b->td); - return a->td->op->compare_struct(a->td, a->sptr, b->sptr); -} - -int -SET_OF_compare(const asn_TYPE_descriptor_t *td, const void *aptr, - const void *bptr) { - const asn_anonymous_set_ *a = _A_CSET_FROM_VOID(aptr); - const asn_anonymous_set_ *b = _A_CSET_FROM_VOID(bptr); - - if(a && b) { - struct comparable_ptr *asorted; - struct comparable_ptr *bsorted; - ssize_t common_length; - ssize_t idx; - - if(a->count == 0) { - if(b->count) return -1; - return 0; - } else if(b->count == 0) { - return 1; - } - - asorted = MALLOC(a->count * sizeof(asorted[0])); - bsorted = MALLOC(b->count * sizeof(bsorted[0])); - if(!asorted || !bsorted) { - FREEMEM(asorted); - FREEMEM(bsorted); - return -1; - } - - for(idx = 0; idx < a->count; idx++) { - asorted[idx].td = td->elements->type; - asorted[idx].sptr = a->array[idx]; - } - - for(idx = 0; idx < b->count; idx++) { - bsorted[idx].td = td->elements->type; - bsorted[idx].sptr = b->array[idx]; - } - - qsort(asorted, a->count, sizeof(asorted[0]), SET_OF__compare_cb); - qsort(bsorted, b->count, sizeof(bsorted[0]), SET_OF__compare_cb); - - common_length = (a->count < b->count ? a->count : b->count); - for(idx = 0; idx < common_length; idx++) { - int ret = td->elements->type->op->compare_struct( - td->elements->type, asorted[idx].sptr, bsorted[idx].sptr); - if(ret) { - FREEMEM(asorted); - FREEMEM(bsorted); - return ret; - } - } - - FREEMEM(asorted); - FREEMEM(bsorted); - - if(idx < b->count) /* more elements in b */ - return -1; /* a is shorter, so put it first */ - if(idx < a->count) return 1; - } else if(!a) { - return -1; - } else if(!b) { - return 1; - } - - return 0; -} +/* + * Copyright (c) 2003-2017 Lev Walkin . + * All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include + +asn_TYPE_operation_t asn_OP_SET_OF = { + SET_OF_free, +#if !defined(ASN_DISABLE_PRINT_SUPPORT) + SET_OF_print, +#else + 0, +#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ + SET_OF_compare, +#if !defined(ASN_DISABLE_BER_SUPPORT) + SET_OF_decode_ber, + SET_OF_encode_der, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ +#if !defined(ASN_DISABLE_XER_SUPPORT) + SET_OF_decode_xer, + SET_OF_encode_xer, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ +#if !defined(ASN_DISABLE_JER_SUPPORT) + SET_OF_encode_jer, +#else + 0, +#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ +#if !defined(ASN_DISABLE_OER_SUPPORT) + SET_OF_decode_oer, + SET_OF_encode_oer, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ +#if !defined(ASN_DISABLE_UPER_SUPPORT) + SET_OF_decode_uper, + SET_OF_encode_uper, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ +#if !defined(ASN_DISABLE_APER_SUPPORT) + SET_OF_decode_aper, + SET_OF_encode_aper, +#else + 0, + 0, +#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ +#if !defined(ASN_DISABLE_RFILL_SUPPORT) + SET_OF_random_fill, +#else + 0, +#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ + 0 /* Use generic outmost tag fetcher */ +}; + +/* Append bytes to the above structure */ +static int _el_addbytes(const void *buffer, size_t size, void *el_buf_ptr) { + struct _el_buffer *el_buf = (struct _el_buffer *)el_buf_ptr; + + if(el_buf->length + size > el_buf->allocated_size) { + size_t new_size = el_buf->allocated_size ? el_buf->allocated_size : 8; + void *p; + + do { + new_size <<= 2; + } while(el_buf->length + size > new_size); + + p = REALLOC(el_buf->buf, new_size); + if(p) { + el_buf->buf = p; + el_buf->allocated_size = new_size; + } else { + return -1; + } + } + + memcpy(el_buf->buf + el_buf->length, buffer, size); + + el_buf->length += size; + return 0; +} + +static void assert_unused_bits(const struct _el_buffer* p) { + if(p->length) { + assert((p->buf[p->length-1] & ~(0xff << p->bits_unused)) == 0); + } else { + assert(p->bits_unused == 0); + } +} + +static int _el_buf_cmp(const void *ap, const void *bp) { + const struct _el_buffer *a = (const struct _el_buffer *)ap; + const struct _el_buffer *b = (const struct _el_buffer *)bp; + size_t common_len; + int ret = 0; + + if(a->length < b->length) + common_len = a->length; + else + common_len = b->length; + + if (a->buf && b->buf) { + ret = memcmp(a->buf, b->buf, common_len); + } + if(ret == 0) { + if(a->length < b->length) + ret = -1; + else if(a->length > b->length) + ret = 1; + /* Ignore unused bits. */ + assert_unused_bits(a); + assert_unused_bits(b); + } + + return ret; +} + +void +SET_OF__encode_sorted_free(struct _el_buffer *el_buf, size_t count) { + size_t i; + + for(i = 0; i < count; i++) { + FREEMEM(el_buf[i].buf); + } + + FREEMEM(el_buf); +} + +struct _el_buffer * +SET_OF__encode_sorted(const asn_TYPE_member_t *elm, + const asn_anonymous_set_ *list, + enum SET_OF__encode_method method) { + struct _el_buffer *encoded_els; + int edx; + + encoded_els = + (struct _el_buffer *)CALLOC(list->count, sizeof(encoded_els[0])); + if(encoded_els == NULL) { + return NULL; + } + + /* + * Encode all members. + */ + for(edx = 0; edx < list->count; edx++) { + const void *memb_ptr = list->array[edx]; + struct _el_buffer *encoding_el = &encoded_els[edx]; + asn_enc_rval_t erval = {0,0,0}; + + if(!memb_ptr) break; + + /* + * Encode the member into the prepared space. + */ + switch(method) { +#if !defined(ASN_DISABLE_BER_SUPPORT) + case SOES_DER: + erval = elm->type->op->der_encoder(elm->type, memb_ptr, 0, elm->tag, + _el_addbytes, encoding_el); + break; +#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ +#if !defined(ASN_DISABLE_UPER_SUPPORT) + case SOES_CUPER: + erval = uper_encode(elm->type, + elm->encoding_constraints.per_constraints, + memb_ptr, _el_addbytes, encoding_el); + if(erval.encoded != -1) { + size_t extra_bits = erval.encoded % 8; + assert(encoding_el->length == (size_t)(erval.encoded + 7) / 8); + encoding_el->bits_unused = (8 - extra_bits) & 0x7; + } + break; +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ +#if !defined(ASN_DISABLE_APER_SUPPORT) + case SOES_CAPER: + erval = aper_encode(elm->type, + elm->encoding_constraints.per_constraints, + memb_ptr, _el_addbytes, encoding_el); + if(erval.encoded != -1) { + size_t extra_bits = erval.encoded % 8; + assert(encoding_el->length == (size_t)(erval.encoded + 7) / 8); + encoding_el->bits_unused = (8 - extra_bits) & 0x7; + } + break; +#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ + + default: + assert(!"Unreachable"); + break; + } + if(erval.encoded < 0) break; + } + + if(edx == list->count) { + /* + * Sort the encoded elements according to their encoding. + */ + qsort(encoded_els, list->count, sizeof(encoded_els[0]), _el_buf_cmp); + + return encoded_els; + } else { + SET_OF__encode_sorted_free(encoded_els, edx); + return NULL; + } +} + +void +SET_OF_free(const asn_TYPE_descriptor_t *td, void *ptr, + enum asn_struct_free_method method) { + if(td && ptr) { + const asn_SET_OF_specifics_t *specs; + asn_TYPE_member_t *elm = td->elements; + asn_anonymous_set_ *list = _A_SET_FROM_VOID(ptr); + asn_struct_ctx_t *ctx; /* Decoder context */ + int i; + + /* + * Could not use set_of_empty() because of (*free) + * incompatibility. + */ + for(i = 0; i < list->count; i++) { + void *memb_ptr = list->array[i]; + if(memb_ptr) + ASN_STRUCT_FREE(*elm->type, memb_ptr); + } + list->count = 0; /* No meaningful elements left */ + + asn_set_empty(list); /* Remove (list->array) */ + + specs = (const asn_SET_OF_specifics_t *)td->specifics; + ctx = (asn_struct_ctx_t *)((char *)ptr + specs->ctx_offset); + if(ctx->ptr) { + ASN_STRUCT_FREE(*elm->type, ctx->ptr); + ctx->ptr = 0; + } + + switch(method) { + case ASFM_FREE_EVERYTHING: + FREEMEM(ptr); + break; + case ASFM_FREE_UNDERLYING: + break; + case ASFM_FREE_UNDERLYING_AND_RESET: + memset(ptr, 0, specs->struct_size); + break; + } + } +} + +int +SET_OF_constraint(const asn_TYPE_descriptor_t *td, const void *sptr, + asn_app_constraint_failed_f *ctfailcb, void *app_key) { + const asn_TYPE_member_t *elm = td->elements; + asn_constr_check_f *constr; + const asn_anonymous_set_ *list = _A_CSET_FROM_VOID(sptr); + int i; + + if(!sptr) { + ASN__CTFAIL(app_key, td, sptr, + "%s: value not given (%s:%d)", + td->name, __FILE__, __LINE__); + return -1; + } + + constr = elm->encoding_constraints.general_constraints; + if(!constr) constr = elm->type->encoding_constraints.general_constraints; + + /* + * Iterate over the members of an array. + * Validate each in turn, until one fails. + */ + for(i = 0; i < list->count; i++) { + const void *memb_ptr = list->array[i]; + int ret; + + if(!memb_ptr) continue; + + ret = constr(elm->type, memb_ptr, ctfailcb, app_key); + if(ret) return ret; + } + + return 0; +} + +struct comparable_ptr { + const asn_TYPE_descriptor_t *td; + const void *sptr; +}; + +static int +SET_OF__compare_cb(const void *aptr, const void *bptr) { + const struct comparable_ptr *a = aptr; + const struct comparable_ptr *b = bptr; + assert(a->td == b->td); + return a->td->op->compare_struct(a->td, a->sptr, b->sptr); +} + +int +SET_OF_compare(const asn_TYPE_descriptor_t *td, const void *aptr, + const void *bptr) { + const asn_anonymous_set_ *a = _A_CSET_FROM_VOID(aptr); + const asn_anonymous_set_ *b = _A_CSET_FROM_VOID(bptr); + + if(a && b) { + struct comparable_ptr *asorted; + struct comparable_ptr *bsorted; + ssize_t common_length; + ssize_t idx; + + if(a->count == 0) { + if(b->count) return -1; + return 0; + } else if(b->count == 0) { + return 1; + } + + asorted = MALLOC(a->count * sizeof(asorted[0])); + bsorted = MALLOC(b->count * sizeof(bsorted[0])); + if(!asorted || !bsorted) { + FREEMEM(asorted); + FREEMEM(bsorted); + return -1; + } + + for(idx = 0; idx < a->count; idx++) { + asorted[idx].td = td->elements->type; + asorted[idx].sptr = a->array[idx]; + } + + for(idx = 0; idx < b->count; idx++) { + bsorted[idx].td = td->elements->type; + bsorted[idx].sptr = b->array[idx]; + } + + qsort(asorted, a->count, sizeof(asorted[0]), SET_OF__compare_cb); + qsort(bsorted, b->count, sizeof(bsorted[0]), SET_OF__compare_cb); + + common_length = (a->count < b->count ? a->count : b->count); + for(idx = 0; idx < common_length; idx++) { + int ret = td->elements->type->op->compare_struct( + td->elements->type, asorted[idx].sptr, bsorted[idx].sptr); + if(ret) { + FREEMEM(asorted); + FREEMEM(bsorted); + return ret; + } + } + + FREEMEM(asorted); + FREEMEM(bsorted); + + if(idx < b->count) /* more elements in b */ + return -1; /* a is shorter, so put it first */ + if(idx < a->count) return 1; + } else if(!a) { + return -1; + } else if(!b) { + return 1; + } + + return 0; +} diff --git a/certgen/asncodec/constr_SET_OF.h b/certgen/asncodec/constr_SET_OF.h index 0e9dd39a19b497866b630f21f7cb2b6310824549..4d34c6cb99703da430ff440e8a618f5e524db9e1 100644 --- a/certgen/asncodec/constr_SET_OF.h +++ b/certgen/asncodec/constr_SET_OF.h @@ -1,102 +1,102 @@ -/*- - * Copyright (c) 2003-2017 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#ifndef CONSTR_SET_OF_H -#define CONSTR_SET_OF_H - -#include -#include - -#ifdef __cplusplus -extern "C" { -#endif - -typedef struct asn_SET_OF_specifics_s { - /* - * Target structure description. - */ - unsigned struct_size; /* Size of the target structure. */ - unsigned ctx_offset; /* Offset of the asn_struct_ctx_t member */ - - /* XER-specific stuff */ - int as_XMLValueList; /* The member type must be encoded like this */ -} asn_SET_OF_specifics_t; - -/* - * A set specialized functions dealing with the SET OF type. - */ -asn_struct_free_f SET_OF_free; - -#if !defined(ASN_DISABLE_PRINT_SUPPORT) -asn_struct_print_f SET_OF_print; -#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ - -asn_struct_compare_f SET_OF_compare; - -asn_constr_check_f SET_OF_constraint; - -#if !defined(ASN_DISABLE_BER_SUPPORT) -ber_type_decoder_f SET_OF_decode_ber; -der_type_encoder_f SET_OF_encode_der; -#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ - -#if !defined(ASN_DISABLE_XER_SUPPORT) -xer_type_decoder_f SET_OF_decode_xer; -xer_type_encoder_f SET_OF_encode_xer; -#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ - -#if !defined(ASN_DISABLE_JER_SUPPORT) -jer_type_encoder_f SET_OF_encode_jer; -#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ - -#if !defined(ASN_DISABLE_OER_SUPPORT) -oer_type_decoder_f SET_OF_decode_oer; -oer_type_encoder_f SET_OF_encode_oer; -#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ - -#if !defined(ASN_DISABLE_UPER_SUPPORT) -per_type_decoder_f SET_OF_decode_uper; -per_type_encoder_f SET_OF_encode_uper; -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ -#if !defined(ASN_DISABLE_APER_SUPPORT) -per_type_decoder_f SET_OF_decode_aper; -per_type_encoder_f SET_OF_encode_aper; -#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ - -#if !defined(ASN_DISABLE_RFILL_SUPPORT) -asn_random_fill_f SET_OF_random_fill; -#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ - -extern asn_TYPE_operation_t asn_OP_SET_OF; - -/* - * Internally visible buffer holding a single encoded element. - */ -struct _el_buffer { - uint8_t *buf; - size_t length; - size_t allocated_size; - unsigned bits_unused; -}; - -enum SET_OF__encode_method { - SOES_DER, /* Distinguished Encoding Rules */ - SOES_CUPER, /* Canonical Unaligned Packed Encoding Rules */ - SOES_CAPER /* Canonical Aligned Packed Encoding Rules */ -}; - -struct _el_buffer * SET_OF__encode_sorted( - const asn_TYPE_member_t *elm, - const asn_anonymous_set_ *list, - enum SET_OF__encode_method method); - -void SET_OF__encode_sorted_free( - struct _el_buffer *el_buf, - size_t count); - -#ifdef __cplusplus -} -#endif - -#endif /* CONSTR_SET_OF_H */ +/*- + * Copyright (c) 2003-2017 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#ifndef CONSTR_SET_OF_H +#define CONSTR_SET_OF_H + +#include +#include + +#ifdef __cplusplus +extern "C" { +#endif + +typedef struct asn_SET_OF_specifics_s { + /* + * Target structure description. + */ + unsigned struct_size; /* Size of the target structure. */ + unsigned ctx_offset; /* Offset of the asn_struct_ctx_t member */ + + /* XER-specific stuff */ + int as_XMLValueList; /* The member type must be encoded like this */ +} asn_SET_OF_specifics_t; + +/* + * A set specialized functions dealing with the SET OF type. + */ +asn_struct_free_f SET_OF_free; + +#if !defined(ASN_DISABLE_PRINT_SUPPORT) +asn_struct_print_f SET_OF_print; +#endif /* !defined(ASN_DISABLE_PRINT_SUPPORT) */ + +asn_struct_compare_f SET_OF_compare; + +asn_constr_check_f SET_OF_constraint; + +#if !defined(ASN_DISABLE_BER_SUPPORT) +ber_type_decoder_f SET_OF_decode_ber; +der_type_encoder_f SET_OF_encode_der; +#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ + +#if !defined(ASN_DISABLE_XER_SUPPORT) +xer_type_decoder_f SET_OF_decode_xer; +xer_type_encoder_f SET_OF_encode_xer; +#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ + +#if !defined(ASN_DISABLE_JER_SUPPORT) +jer_type_encoder_f SET_OF_encode_jer; +#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ + +#if !defined(ASN_DISABLE_OER_SUPPORT) +oer_type_decoder_f SET_OF_decode_oer; +oer_type_encoder_f SET_OF_encode_oer; +#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ + +#if !defined(ASN_DISABLE_UPER_SUPPORT) +per_type_decoder_f SET_OF_decode_uper; +per_type_encoder_f SET_OF_encode_uper; +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) */ +#if !defined(ASN_DISABLE_APER_SUPPORT) +per_type_decoder_f SET_OF_decode_aper; +per_type_encoder_f SET_OF_encode_aper; +#endif /* !defined(ASN_DISABLE_APER_SUPPORT) */ + +#if !defined(ASN_DISABLE_RFILL_SUPPORT) +asn_random_fill_f SET_OF_random_fill; +#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ + +extern asn_TYPE_operation_t asn_OP_SET_OF; + +/* + * Internally visible buffer holding a single encoded element. + */ +struct _el_buffer { + uint8_t *buf; + size_t length; + size_t allocated_size; + unsigned bits_unused; +}; + +enum SET_OF__encode_method { + SOES_DER, /* Distinguished Encoding Rules */ + SOES_CUPER, /* Canonical Unaligned Packed Encoding Rules */ + SOES_CAPER /* Canonical Aligned Packed Encoding Rules */ +}; + +struct _el_buffer * SET_OF__encode_sorted( + const asn_TYPE_member_t *elm, + const asn_anonymous_set_ *list, + enum SET_OF__encode_method method); + +void SET_OF__encode_sorted_free( + struct _el_buffer *el_buf, + size_t count); + +#ifdef __cplusplus +} +#endif + +#endif /* CONSTR_SET_OF_H */ diff --git a/certgen/asncodec/constr_SET_OF_oer.c b/certgen/asncodec/constr_SET_OF_oer.c index a0f0140dc256272225ca04f79b0af5d2c3efc4d2..836d681169f6f679656f65a77974e89b5d9c1153 100644 --- a/certgen/asncodec/constr_SET_OF_oer.c +++ b/certgen/asncodec/constr_SET_OF_oer.c @@ -1,281 +1,281 @@ -/* - * Copyright (c) 2017 Lev Walkin . - * All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include -#include -#include - -/* - * This macro "eats" the part of the buffer which is definitely "consumed", - * i.e. was correctly converted into local representation or rightfully skipped. - */ -#undef ADVANCE -#define ADVANCE(num_bytes) \ - do { \ - size_t num = num_bytes; \ - ptr = ((const char *)ptr) + num; \ - size -= num; \ - consumed_myself += num; \ - } while(0) - -/* - * Switch to the next phase of parsing. - */ -#undef NEXT_PHASE -#define NEXT_PHASE(ctx) \ - do { \ - ctx->phase++; \ - ctx->step = 0; \ - } while(0) -#undef SET_PHASE -#define SET_PHASE(ctx, value) \ - do { \ - ctx->phase = value; \ - ctx->step = 0; \ - } while(0) - -/* - * Return a standardized complex structure. - */ -#undef RETURN -#define RETURN(_code) \ - do { \ - asn_dec_rval_t _rval; \ - _rval.code = _code; \ - _rval.consumed = consumed_myself; \ - return _rval; \ - } while(0) - -/* - * The SEQUENCE OF and SET OF values utilize a "quantity field". - * It is is a pointless combination of #8.6 (length determinant, capable - * of encoding tiny and huge numbers in the shortest possible number of octets) - * and the variable sized integer. What could have been encoded by #8.6 alone - * is required to be encoded by #8.6 followed by that number of unsigned octets. - * This doesn't make too much sense. It seems that the original version of OER - * standard have been using the unconstrained unsigned integer as a quantity - * field, and this legacy have gone through ISO/ITU-T standardization process. - */ -static ssize_t -oer_fetch_quantity(const void *ptr, size_t size, size_t *qty_r) { - const uint8_t *b; - const uint8_t *bend; - size_t len = 0; - size_t qty; - - ssize_t len_len = oer_fetch_length(ptr, size, &len); - if(len_len <= 0) { - *qty_r = 0; - return len_len; - } - - if((len_len + len) > size) { - *qty_r = 0; - return 0; - } - - b = (const uint8_t *)ptr + len_len; - bend = b + len; - - /* Skip the leading 0-bytes */ - for(; b < bend && *b == 0; b++) { - } - - if((bend - b) > (ssize_t)sizeof(size_t)) { - /* Length is not representable by the native size_t type */ - *qty_r = 0; - return -1; - } - - for(qty = 0; b < bend; b++) { - qty = (qty << 8) + *b; - } - - if(qty > RSIZE_MAX) { /* A bit of C11 validation */ - *qty_r = 0; - return -1; - } - - *qty_r = qty; - assert((size_t)len_len + len == (size_t)(bend - (const uint8_t *)ptr)); - return len_len + len; -} - -asn_dec_rval_t -SET_OF_decode_oer(const asn_codec_ctx_t *opt_codec_ctx, - const asn_TYPE_descriptor_t *td, - const asn_oer_constraints_t *constraints, void **struct_ptr, - const void *ptr, size_t size) { - const asn_SET_OF_specifics_t *specs = (const asn_SET_OF_specifics_t *)td->specifics; - asn_dec_rval_t rval = {RC_OK, 0}; - void *st = *struct_ptr; /* Target structure */ - asn_struct_ctx_t *ctx; /* Decoder context */ - size_t consumed_myself = 0; /* Consumed bytes from ptr. */ - - (void)constraints; - - if(ASN__STACK_OVERFLOW_CHECK(opt_codec_ctx)) - ASN__DECODE_FAILED; - - /* - * Create the target structure if it is not present already. - */ - if(st == 0) { - st = *struct_ptr = CALLOC(1, specs->struct_size); - if(st == 0) { - RETURN(RC_FAIL); - } - } - - /* - * Restore parsing context. - */ - ctx = (asn_struct_ctx_t *)((char *)st + specs->ctx_offset); - - /* - * Start to parse where left previously. - */ - switch(ctx->phase) { - case 0: { - /* - * Fetch number of elements to decode. - */ - size_t length = 0; - size_t len_size = oer_fetch_quantity(ptr, size, &length); - switch(len_size) { - case 0: - RETURN(RC_WMORE); - case -1: - RETURN(RC_FAIL); - default: - ADVANCE(len_size); - ctx->left = length; - } - } - NEXT_PHASE(ctx); - /* FALL THROUGH */ - case 1: { - /* Decode components of the extension root */ - asn_TYPE_member_t *elm = td->elements; - asn_anonymous_set_ *list = _A_SET_FROM_VOID(st); - const void *base_ptr = ptr; - ber_tlv_len_t base_ctx_left = ctx->left; - - assert(td->elements_count == 1); - - ASN_DEBUG("OER SET OF %s Decoding PHASE 1", td->name); - - for(; ctx->left > 0; ctx->left--) { - asn_dec_rval_t rv = elm->type->op->oer_decoder( - opt_codec_ctx, elm->type, - elm->encoding_constraints.oer_constraints, &ctx->ptr, ptr, - size); - ADVANCE(rv.consumed); - switch(rv.code) { - case RC_OK: - if(ASN_SET_ADD(list, ctx->ptr) != 0) { - RETURN(RC_FAIL); - } else { - ctx->ptr = 0; - /* - * This check is to avoid compression bomb with - * specs like SEQUENCE/SET OF NULL which don't - * consume data at all. - */ - if(rv.consumed == 0 && base_ptr == ptr - && (base_ctx_left - ctx->left) > 200) { - ASN__DECODE_FAILED; - } - break; - } - case RC_WMORE: - RETURN(RC_WMORE); - case RC_FAIL: - ASN_STRUCT_FREE(*elm->type, ctx->ptr); - ctx->ptr = 0; - SET_PHASE(ctx, 3); - RETURN(RC_FAIL); - } - } - /* Decoded decently. */ - NEXT_PHASE(ctx); - } - /* Fall through */ - case 2: - /* Ignore fully decoded */ - assert(ctx->left == 0); - RETURN(RC_OK); - case 3: - /* Failed to decode. */ - RETURN(RC_FAIL); - } - - return rval; -} - -static ssize_t -oer_put_quantity(size_t qty, asn_app_consume_bytes_f *cb, void *app_key) { - uint8_t buf[1 + sizeof(size_t)]; - uint8_t *b = &buf[sizeof(size_t)]; /* Last addressable */ - size_t encoded; - - do { - *b-- = qty; - qty >>= 8; - } while(qty); - - *b = sizeof(buf) - (b-buf) - 1; - encoded = sizeof(buf) - (b-buf); - if(cb(b, encoded, app_key) < 0) - return -1; - return encoded; -} - -/* - * Encode as Canonical OER. - */ -asn_enc_rval_t -SET_OF_encode_oer(const asn_TYPE_descriptor_t *td, - const asn_oer_constraints_t *constraints, const void *sptr, - asn_app_consume_bytes_f *cb, void *app_key) { - const asn_TYPE_member_t *elm; - const asn_anonymous_set_ *list; - size_t computed_size = 0; - ssize_t qty_len; - int n; - - (void)constraints; - - if(!sptr) ASN__ENCODE_FAILED; - - elm = td->elements; - list = _A_CSET_FROM_VOID(sptr); - - qty_len = oer_put_quantity(list->count, cb, app_key); - if(qty_len < 0) { - ASN__ENCODE_FAILED; - } - computed_size += qty_len; - - for(n = 0; n < list->count; n++) { - void *memb_ptr = list->array[n]; - asn_enc_rval_t er = {0,0,0}; - er = elm->type->op->oer_encoder( - elm->type, elm->encoding_constraints.oer_constraints, memb_ptr, cb, - app_key); - if(er.encoded < 0) { - return er; - } else { - computed_size += er.encoded; - } - } - - { - asn_enc_rval_t erval = {0,0,0}; - erval.encoded = computed_size; - ASN__ENCODED_OK(erval); - } -} +/* + * Copyright (c) 2017 Lev Walkin . + * All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include +#include +#include + +/* + * This macro "eats" the part of the buffer which is definitely "consumed", + * i.e. was correctly converted into local representation or rightfully skipped. + */ +#undef ADVANCE +#define ADVANCE(num_bytes) \ + do { \ + size_t num = num_bytes; \ + ptr = ((const char *)ptr) + num; \ + size -= num; \ + consumed_myself += num; \ + } while(0) + +/* + * Switch to the next phase of parsing. + */ +#undef NEXT_PHASE +#define NEXT_PHASE(ctx) \ + do { \ + ctx->phase++; \ + ctx->step = 0; \ + } while(0) +#undef SET_PHASE +#define SET_PHASE(ctx, value) \ + do { \ + ctx->phase = value; \ + ctx->step = 0; \ + } while(0) + +/* + * Return a standardized complex structure. + */ +#undef RETURN +#define RETURN(_code) \ + do { \ + asn_dec_rval_t _rval; \ + _rval.code = _code; \ + _rval.consumed = consumed_myself; \ + return _rval; \ + } while(0) + +/* + * The SEQUENCE OF and SET OF values utilize a "quantity field". + * It is is a pointless combination of #8.6 (length determinant, capable + * of encoding tiny and huge numbers in the shortest possible number of octets) + * and the variable sized integer. What could have been encoded by #8.6 alone + * is required to be encoded by #8.6 followed by that number of unsigned octets. + * This doesn't make too much sense. It seems that the original version of OER + * standard have been using the unconstrained unsigned integer as a quantity + * field, and this legacy have gone through ISO/ITU-T standardization process. + */ +static ssize_t +oer_fetch_quantity(const void *ptr, size_t size, size_t *qty_r) { + const uint8_t *b; + const uint8_t *bend; + size_t len = 0; + size_t qty; + + ssize_t len_len = oer_fetch_length(ptr, size, &len); + if(len_len <= 0) { + *qty_r = 0; + return len_len; + } + + if((len_len + len) > size) { + *qty_r = 0; + return 0; + } + + b = (const uint8_t *)ptr + len_len; + bend = b + len; + + /* Skip the leading 0-bytes */ + for(; b < bend && *b == 0; b++) { + } + + if((bend - b) > (ssize_t)sizeof(size_t)) { + /* Length is not representable by the native size_t type */ + *qty_r = 0; + return -1; + } + + for(qty = 0; b < bend; b++) { + qty = (qty << 8) + *b; + } + + if(qty > RSIZE_MAX) { /* A bit of C11 validation */ + *qty_r = 0; + return -1; + } + + *qty_r = qty; + assert((size_t)len_len + len == (size_t)(bend - (const uint8_t *)ptr)); + return len_len + len; +} + +asn_dec_rval_t +SET_OF_decode_oer(const asn_codec_ctx_t *opt_codec_ctx, + const asn_TYPE_descriptor_t *td, + const asn_oer_constraints_t *constraints, void **struct_ptr, + const void *ptr, size_t size) { + const asn_SET_OF_specifics_t *specs = (const asn_SET_OF_specifics_t *)td->specifics; + asn_dec_rval_t rval = {RC_OK, 0}; + void *st = *struct_ptr; /* Target structure */ + asn_struct_ctx_t *ctx; /* Decoder context */ + size_t consumed_myself = 0; /* Consumed bytes from ptr. */ + + (void)constraints; + + if(ASN__STACK_OVERFLOW_CHECK(opt_codec_ctx)) + ASN__DECODE_FAILED; + + /* + * Create the target structure if it is not present already. + */ + if(st == 0) { + st = *struct_ptr = CALLOC(1, specs->struct_size); + if(st == 0) { + RETURN(RC_FAIL); + } + } + + /* + * Restore parsing context. + */ + ctx = (asn_struct_ctx_t *)((char *)st + specs->ctx_offset); + + /* + * Start to parse where left previously. + */ + switch(ctx->phase) { + case 0: { + /* + * Fetch number of elements to decode. + */ + size_t length = 0; + size_t len_size = oer_fetch_quantity(ptr, size, &length); + switch(len_size) { + case 0: + RETURN(RC_WMORE); + case -1: + RETURN(RC_FAIL); + default: + ADVANCE(len_size); + ctx->left = length; + } + } + NEXT_PHASE(ctx); + /* FALL THROUGH */ + case 1: { + /* Decode components of the extension root */ + asn_TYPE_member_t *elm = td->elements; + asn_anonymous_set_ *list = _A_SET_FROM_VOID(st); + const void *base_ptr = ptr; + ber_tlv_len_t base_ctx_left = ctx->left; + + assert(td->elements_count == 1); + + ASN_DEBUG("OER SET OF %s Decoding PHASE 1", td->name); + + for(; ctx->left > 0; ctx->left--) { + asn_dec_rval_t rv = elm->type->op->oer_decoder( + opt_codec_ctx, elm->type, + elm->encoding_constraints.oer_constraints, &ctx->ptr, ptr, + size); + ADVANCE(rv.consumed); + switch(rv.code) { + case RC_OK: + if(ASN_SET_ADD(list, ctx->ptr) != 0) { + RETURN(RC_FAIL); + } else { + ctx->ptr = 0; + /* + * This check is to avoid compression bomb with + * specs like SEQUENCE/SET OF NULL which don't + * consume data at all. + */ + if(rv.consumed == 0 && base_ptr == ptr + && (base_ctx_left - ctx->left) > 200) { + ASN__DECODE_FAILED; + } + break; + } + case RC_WMORE: + RETURN(RC_WMORE); + case RC_FAIL: + ASN_STRUCT_FREE(*elm->type, ctx->ptr); + ctx->ptr = 0; + SET_PHASE(ctx, 3); + RETURN(RC_FAIL); + } + } + /* Decoded decently. */ + NEXT_PHASE(ctx); + } + /* Fall through */ + case 2: + /* Ignore fully decoded */ + assert(ctx->left == 0); + RETURN(RC_OK); + case 3: + /* Failed to decode. */ + RETURN(RC_FAIL); + } + + return rval; +} + +static ssize_t +oer_put_quantity(size_t qty, asn_app_consume_bytes_f *cb, void *app_key) { + uint8_t buf[1 + sizeof(size_t)]; + uint8_t *b = &buf[sizeof(size_t)]; /* Last addressable */ + size_t encoded; + + do { + *b-- = qty; + qty >>= 8; + } while(qty); + + *b = sizeof(buf) - (b-buf) - 1; + encoded = sizeof(buf) - (b-buf); + if(cb(b, encoded, app_key) < 0) + return -1; + return encoded; +} + +/* + * Encode as Canonical OER. + */ +asn_enc_rval_t +SET_OF_encode_oer(const asn_TYPE_descriptor_t *td, + const asn_oer_constraints_t *constraints, const void *sptr, + asn_app_consume_bytes_f *cb, void *app_key) { + const asn_TYPE_member_t *elm; + const asn_anonymous_set_ *list; + size_t computed_size = 0; + ssize_t qty_len; + int n; + + (void)constraints; + + if(!sptr) ASN__ENCODE_FAILED; + + elm = td->elements; + list = _A_CSET_FROM_VOID(sptr); + + qty_len = oer_put_quantity(list->count, cb, app_key); + if(qty_len < 0) { + ASN__ENCODE_FAILED; + } + computed_size += qty_len; + + for(n = 0; n < list->count; n++) { + void *memb_ptr = list->array[n]; + asn_enc_rval_t er = {0,0,0}; + er = elm->type->op->oer_encoder( + elm->type, elm->encoding_constraints.oer_constraints, memb_ptr, cb, + app_key); + if(er.encoded < 0) { + return er; + } else { + computed_size += er.encoded; + } + } + + { + asn_enc_rval_t erval = {0,0,0}; + erval.encoded = computed_size; + ASN__ENCODED_OK(erval); + } +} diff --git a/certgen/asncodec/constr_SET_OF_print.c b/certgen/asncodec/constr_SET_OF_print.c index 748dba7677eea6b286b24e25babc75c469645a7b..f5d394c555847060723c462e5fc25b35aa6086a0 100644 --- a/certgen/asncodec/constr_SET_OF_print.c +++ b/certgen/asncodec/constr_SET_OF_print.c @@ -1,39 +1,39 @@ -/* - * Copyright (c) 2017 Lev Walkin . - * All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include - -int -SET_OF_print(const asn_TYPE_descriptor_t *td, const void *sptr, int ilevel, - asn_app_consume_bytes_f *cb, void *app_key) { - asn_TYPE_member_t *elm = td->elements; - const asn_anonymous_set_ *list = _A_CSET_FROM_VOID(sptr); - int ret; - int i; - - if(!sptr) return (cb("", 8, app_key) < 0) ? -1 : 0; - - /* Dump preamble */ - if(cb(td->name, strlen(td->name), app_key) < 0 - || cb(" ::= {", 6, app_key) < 0) - return -1; - - for(i = 0; i < list->count; i++) { - const void *memb_ptr = list->array[i]; - if(!memb_ptr) continue; - - _i_INDENT(1); - - ret = elm->type->op->print_struct(elm->type, memb_ptr, - ilevel + 1, cb, app_key); - if(ret) return ret; - } - - ilevel--; - _i_INDENT(1); - - return (cb("}", 1, app_key) < 0) ? -1 : 0; -} +/* + * Copyright (c) 2017 Lev Walkin . + * All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include + +int +SET_OF_print(const asn_TYPE_descriptor_t *td, const void *sptr, int ilevel, + asn_app_consume_bytes_f *cb, void *app_key) { + asn_TYPE_member_t *elm = td->elements; + const asn_anonymous_set_ *list = _A_CSET_FROM_VOID(sptr); + int ret; + int i; + + if(!sptr) return (cb("", 8, app_key) < 0) ? -1 : 0; + + /* Dump preamble */ + if(cb(td->name, strlen(td->name), app_key) < 0 + || cb(" ::= {", 6, app_key) < 0) + return -1; + + for(i = 0; i < list->count; i++) { + const void *memb_ptr = list->array[i]; + if(!memb_ptr) continue; + + _i_INDENT(1); + + ret = elm->type->op->print_struct(elm->type, memb_ptr, + ilevel + 1, cb, app_key); + if(ret) return ret; + } + + ilevel--; + _i_INDENT(1); + + return (cb("}", 1, app_key) < 0) ? -1 : 0; +} diff --git a/certgen/asncodec/constr_SET_OF_xer.c b/certgen/asncodec/constr_SET_OF_xer.c index 1d97e5be3d73500efd30781c9b2e74e5460942ed..fb4ddfbe3aff6c1f4535d6d4d4ce6b82315107bd 100644 --- a/certgen/asncodec/constr_SET_OF_xer.c +++ b/certgen/asncodec/constr_SET_OF_xer.c @@ -1,314 +1,314 @@ -/* - * Copyright (c) 2017 Lev Walkin . - * All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include - -/* - * Return a standardized complex structure. - */ -#undef RETURN -#define RETURN(_code) \ - do { \ - rval.code = _code; \ - rval.consumed = consumed_myself; \ - return rval; \ - } while(0) - -#undef XER_ADVANCE -#define XER_ADVANCE(num_bytes) \ - do { \ - size_t num = num_bytes; \ - buf_ptr = ((const char *)buf_ptr) + num; \ - size -= num; \ - consumed_myself += num; \ - } while(0) - -/* - * Decode the XER (XML) data. - */ -asn_dec_rval_t -SET_OF_decode_xer(const asn_codec_ctx_t *opt_codec_ctx, - const asn_TYPE_descriptor_t *td, void **struct_ptr, - const char *opt_mname, const void *buf_ptr, size_t size) { - /* - * Bring closer parts of structure description. - */ - const asn_SET_OF_specifics_t *specs = (const asn_SET_OF_specifics_t *)td->specifics; - const asn_TYPE_member_t *element = td->elements; - const char *elm_tag; - const char *xml_tag = opt_mname ? opt_mname : td->xml_tag; - - /* - * ... and parts of the structure being constructed. - */ - void *st = *struct_ptr; /* Target structure. */ - asn_struct_ctx_t *ctx; /* Decoder context */ - - asn_dec_rval_t rval = {RC_OK, 0}; /* Return value from a decoder */ - ssize_t consumed_myself = 0; /* Consumed bytes from ptr */ - - /* - * Create the target structure if it is not present already. - */ - if(st == 0) { - st = *struct_ptr = CALLOC(1, specs->struct_size); - if(st == 0) RETURN(RC_FAIL); - } - - /* Which tag is expected for the downstream */ - if(specs->as_XMLValueList) { - elm_tag = (specs->as_XMLValueList == 1) ? 0 : ""; - } else { - elm_tag = (*element->name) - ? element->name : element->type->xml_tag; - } - - /* - * Restore parsing context. - */ - ctx = (asn_struct_ctx_t *)((char *)st + specs->ctx_offset); - - /* - * Phases of XER/XML processing: - * Phase 0: Check that the opening tag matches our expectations. - * Phase 1: Processing body and reacting on closing tag. - * Phase 2: Processing inner type. - */ - for(; ctx->phase <= 2;) { - pxer_chunk_type_e ch_type; /* XER chunk type */ - ssize_t ch_size; /* Chunk size */ - xer_check_tag_e tcv; /* Tag check value */ - - /* - * Go inside the inner member of a set. - */ - if(ctx->phase == 2) { - asn_dec_rval_t tmprval = {RC_OK, 0}; - - /* Invoke the inner type decoder, m.b. multiple times */ - ASN_DEBUG("XER/SET OF element [%s]", elm_tag); - tmprval = element->type->op->xer_decoder(opt_codec_ctx, - element->type, - &ctx->ptr, elm_tag, - buf_ptr, size); - if(tmprval.code == RC_OK) { - asn_anonymous_set_ *list = _A_SET_FROM_VOID(st); - if(ASN_SET_ADD(list, ctx->ptr) != 0) - RETURN(RC_FAIL); - ctx->ptr = 0; - XER_ADVANCE(tmprval.consumed); - } else { - XER_ADVANCE(tmprval.consumed); - RETURN(tmprval.code); - } - ctx->phase = 1; /* Back to body processing */ - ASN_DEBUG("XER/SET OF phase => %d", ctx->phase); - /* Fall through */ - } - - /* - * Get the next part of the XML stream. - */ - ch_size = xer_next_token(&ctx->context, - buf_ptr, size, &ch_type); - if(ch_size == -1) { - RETURN(RC_FAIL); - } else { - switch(ch_type) { - case PXER_WMORE: - RETURN(RC_WMORE); - case PXER_COMMENT: /* Got XML comment */ - case PXER_TEXT: /* Ignore free-standing text */ - XER_ADVANCE(ch_size); /* Skip silently */ - continue; - case PXER_TAG: - break; /* Check the rest down there */ - } - } - - tcv = xer_check_tag(buf_ptr, ch_size, xml_tag); - ASN_DEBUG("XER/SET OF: tcv = %d, ph=%d t=%s", - tcv, ctx->phase, xml_tag); - switch(tcv) { - case XCT_CLOSING: - if(ctx->phase == 0) break; - ctx->phase = 0; - /* Fall through */ - case XCT_BOTH: - if(ctx->phase == 0) { - /* No more things to decode */ - XER_ADVANCE(ch_size); - ctx->phase = 3; /* Phase out */ - RETURN(RC_OK); - } - /* Fall through */ - case XCT_OPENING: - if(ctx->phase == 0) { - XER_ADVANCE(ch_size); - ctx->phase = 1; /* Processing body phase */ - continue; - } - /* Fall through */ - case XCT_UNKNOWN_OP: - case XCT_UNKNOWN_BO: - - ASN_DEBUG("XER/SET OF: tcv=%d, ph=%d", tcv, ctx->phase); - if(ctx->phase == 1) { - /* - * Process a single possible member. - */ - ctx->phase = 2; - continue; - } - /* Fall through */ - default: - break; - } - - ASN_DEBUG("Unexpected XML tag in SET OF"); - break; - } - - ctx->phase = 3; /* "Phase out" on hard failure */ - RETURN(RC_FAIL); -} - -typedef struct xer_tmp_enc_s { - void *buffer; - size_t offset; - size_t size; -} xer_tmp_enc_t; - -static int -SET_OF_encode_xer_callback(const void *buffer, size_t size, void *key) { - xer_tmp_enc_t *t = (xer_tmp_enc_t *)key; - if(t->offset + size >= t->size) { - size_t newsize = (t->size << 2) + size; - void *p = REALLOC(t->buffer, newsize); - if(!p) return -1; - t->buffer = p; - t->size = newsize; - } - memcpy((char *)t->buffer + t->offset, buffer, size); - t->offset += size; - return 0; -} - -static int -SET_OF_xer_order(const void *aptr, const void *bptr) { - const xer_tmp_enc_t *a = (const xer_tmp_enc_t *)aptr; - const xer_tmp_enc_t *b = (const xer_tmp_enc_t *)bptr; - size_t minlen = a->offset; - int ret; - if(b->offset < minlen) minlen = b->offset; - /* Well-formed UTF-8 has this nice lexicographical property... */ - ret = memcmp(a->buffer, b->buffer, minlen); - if(ret != 0) return ret; - if(a->offset == b->offset) - return 0; - if(a->offset == minlen) - return -1; - return 1; -} - -asn_enc_rval_t -SET_OF_encode_xer(const asn_TYPE_descriptor_t *td, const void *sptr, int ilevel, - enum xer_encoder_flags_e flags, asn_app_consume_bytes_f *cb, - void *app_key) { - asn_enc_rval_t er = {0,0,0}; - const asn_SET_OF_specifics_t *specs = (const asn_SET_OF_specifics_t *)td->specifics; - const asn_TYPE_member_t *elm = td->elements; - const asn_anonymous_set_ *list = _A_CSET_FROM_VOID(sptr); - const char *mname = specs->as_XMLValueList - ? 0 : ((*elm->name) ? elm->name : elm->type->xml_tag); - size_t mlen = mname ? strlen(mname) : 0; - int xcan = (flags & XER_F_CANONICAL); - xer_tmp_enc_t *encs = 0; - size_t encs_count = 0; - void *original_app_key = app_key; - asn_app_consume_bytes_f *original_cb = cb; - int i; - - if(!sptr) ASN__ENCODE_FAILED; - - if(xcan) { - encs = (xer_tmp_enc_t *)MALLOC(list->count * sizeof(encs[0])); - if(!encs) ASN__ENCODE_FAILED; - cb = SET_OF_encode_xer_callback; - } - - er.encoded = 0; - - for(i = 0; i < list->count; i++) { - asn_enc_rval_t tmper = {0,0,0}; - - void *memb_ptr = list->array[i]; - if(!memb_ptr) continue; - - if(encs) { - memset(&encs[encs_count], 0, sizeof(encs[0])); - app_key = &encs[encs_count]; - encs_count++; - } - - if(mname) { - if(!xcan) ASN__TEXT_INDENT(1, ilevel); - ASN__CALLBACK3("<", 1, mname, mlen, ">", 1); - } - - if(!xcan && specs->as_XMLValueList == 1) - ASN__TEXT_INDENT(1, ilevel + 1); - tmper = elm->type->op->xer_encoder(elm->type, memb_ptr, - ilevel + (specs->as_XMLValueList != 2), - flags, cb, app_key); - if(tmper.encoded == -1) return tmper; - er.encoded += tmper.encoded; - if(tmper.encoded == 0 && specs->as_XMLValueList) { - const char *name = elm->type->xml_tag; - size_t len = strlen(name); - ASN__CALLBACK3("<", 1, name, len, "/>", 2); - } - - if(mname) { - ASN__CALLBACK3("", 1); - } - - } - - if(!xcan) ASN__TEXT_INDENT(1, ilevel - 1); - - if(encs) { - xer_tmp_enc_t *enc = encs; - xer_tmp_enc_t *end = encs + encs_count; - ssize_t control_size = 0; - - er.encoded = 0; - cb = original_cb; - app_key = original_app_key; - qsort(encs, encs_count, sizeof(encs[0]), SET_OF_xer_order); - - for(; enc < end; enc++) { - ASN__CALLBACK(enc->buffer, enc->offset); - FREEMEM(enc->buffer); - enc->buffer = 0; - control_size += enc->offset; - } - assert(control_size == er.encoded); - } - - goto cleanup; -cb_failed: - ASN__ENCODE_FAILED; -cleanup: - if(encs) { - size_t n; - for(n = 0; n < encs_count; n++) { - FREEMEM(encs[n].buffer); - } - FREEMEM(encs); - } - ASN__ENCODED_OK(er); -} +/* + * Copyright (c) 2017 Lev Walkin . + * All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include + +/* + * Return a standardized complex structure. + */ +#undef RETURN +#define RETURN(_code) \ + do { \ + rval.code = _code; \ + rval.consumed = consumed_myself; \ + return rval; \ + } while(0) + +#undef XER_ADVANCE +#define XER_ADVANCE(num_bytes) \ + do { \ + size_t num = num_bytes; \ + buf_ptr = ((const char *)buf_ptr) + num; \ + size -= num; \ + consumed_myself += num; \ + } while(0) + +/* + * Decode the XER (XML) data. + */ +asn_dec_rval_t +SET_OF_decode_xer(const asn_codec_ctx_t *opt_codec_ctx, + const asn_TYPE_descriptor_t *td, void **struct_ptr, + const char *opt_mname, const void *buf_ptr, size_t size) { + /* + * Bring closer parts of structure description. + */ + const asn_SET_OF_specifics_t *specs = (const asn_SET_OF_specifics_t *)td->specifics; + const asn_TYPE_member_t *element = td->elements; + const char *elm_tag; + const char *xml_tag = opt_mname ? opt_mname : td->xml_tag; + + /* + * ... and parts of the structure being constructed. + */ + void *st = *struct_ptr; /* Target structure. */ + asn_struct_ctx_t *ctx; /* Decoder context */ + + asn_dec_rval_t rval = {RC_OK, 0}; /* Return value from a decoder */ + ssize_t consumed_myself = 0; /* Consumed bytes from ptr */ + + /* + * Create the target structure if it is not present already. + */ + if(st == 0) { + st = *struct_ptr = CALLOC(1, specs->struct_size); + if(st == 0) RETURN(RC_FAIL); + } + + /* Which tag is expected for the downstream */ + if(specs->as_XMLValueList) { + elm_tag = (specs->as_XMLValueList == 1) ? 0 : ""; + } else { + elm_tag = (*element->name) + ? element->name : element->type->xml_tag; + } + + /* + * Restore parsing context. + */ + ctx = (asn_struct_ctx_t *)((char *)st + specs->ctx_offset); + + /* + * Phases of XER/XML processing: + * Phase 0: Check that the opening tag matches our expectations. + * Phase 1: Processing body and reacting on closing tag. + * Phase 2: Processing inner type. + */ + for(; ctx->phase <= 2;) { + pxer_chunk_type_e ch_type; /* XER chunk type */ + ssize_t ch_size; /* Chunk size */ + xer_check_tag_e tcv; /* Tag check value */ + + /* + * Go inside the inner member of a set. + */ + if(ctx->phase == 2) { + asn_dec_rval_t tmprval = {RC_OK, 0}; + + /* Invoke the inner type decoder, m.b. multiple times */ + ASN_DEBUG("XER/SET OF element [%s]", elm_tag); + tmprval = element->type->op->xer_decoder(opt_codec_ctx, + element->type, + &ctx->ptr, elm_tag, + buf_ptr, size); + if(tmprval.code == RC_OK) { + asn_anonymous_set_ *list = _A_SET_FROM_VOID(st); + if(ASN_SET_ADD(list, ctx->ptr) != 0) + RETURN(RC_FAIL); + ctx->ptr = 0; + XER_ADVANCE(tmprval.consumed); + } else { + XER_ADVANCE(tmprval.consumed); + RETURN(tmprval.code); + } + ctx->phase = 1; /* Back to body processing */ + ASN_DEBUG("XER/SET OF phase => %d", ctx->phase); + /* Fall through */ + } + + /* + * Get the next part of the XML stream. + */ + ch_size = xer_next_token(&ctx->context, + buf_ptr, size, &ch_type); + if(ch_size == -1) { + RETURN(RC_FAIL); + } else { + switch(ch_type) { + case PXER_WMORE: + RETURN(RC_WMORE); + case PXER_COMMENT: /* Got XML comment */ + case PXER_TEXT: /* Ignore free-standing text */ + XER_ADVANCE(ch_size); /* Skip silently */ + continue; + case PXER_TAG: + break; /* Check the rest down there */ + } + } + + tcv = xer_check_tag(buf_ptr, ch_size, xml_tag); + ASN_DEBUG("XER/SET OF: tcv = %d, ph=%d t=%s", + tcv, ctx->phase, xml_tag); + switch(tcv) { + case XCT_CLOSING: + if(ctx->phase == 0) break; + ctx->phase = 0; + /* Fall through */ + case XCT_BOTH: + if(ctx->phase == 0) { + /* No more things to decode */ + XER_ADVANCE(ch_size); + ctx->phase = 3; /* Phase out */ + RETURN(RC_OK); + } + /* Fall through */ + case XCT_OPENING: + if(ctx->phase == 0) { + XER_ADVANCE(ch_size); + ctx->phase = 1; /* Processing body phase */ + continue; + } + /* Fall through */ + case XCT_UNKNOWN_OP: + case XCT_UNKNOWN_BO: + + ASN_DEBUG("XER/SET OF: tcv=%d, ph=%d", tcv, ctx->phase); + if(ctx->phase == 1) { + /* + * Process a single possible member. + */ + ctx->phase = 2; + continue; + } + /* Fall through */ + default: + break; + } + + ASN_DEBUG("Unexpected XML tag in SET OF"); + break; + } + + ctx->phase = 3; /* "Phase out" on hard failure */ + RETURN(RC_FAIL); +} + +typedef struct xer_tmp_enc_s { + void *buffer; + size_t offset; + size_t size; +} xer_tmp_enc_t; + +static int +SET_OF_encode_xer_callback(const void *buffer, size_t size, void *key) { + xer_tmp_enc_t *t = (xer_tmp_enc_t *)key; + if(t->offset + size >= t->size) { + size_t newsize = (t->size << 2) + size; + void *p = REALLOC(t->buffer, newsize); + if(!p) return -1; + t->buffer = p; + t->size = newsize; + } + memcpy((char *)t->buffer + t->offset, buffer, size); + t->offset += size; + return 0; +} + +static int +SET_OF_xer_order(const void *aptr, const void *bptr) { + const xer_tmp_enc_t *a = (const xer_tmp_enc_t *)aptr; + const xer_tmp_enc_t *b = (const xer_tmp_enc_t *)bptr; + size_t minlen = a->offset; + int ret; + if(b->offset < minlen) minlen = b->offset; + /* Well-formed UTF-8 has this nice lexicographical property... */ + ret = memcmp(a->buffer, b->buffer, minlen); + if(ret != 0) return ret; + if(a->offset == b->offset) + return 0; + if(a->offset == minlen) + return -1; + return 1; +} + +asn_enc_rval_t +SET_OF_encode_xer(const asn_TYPE_descriptor_t *td, const void *sptr, int ilevel, + enum xer_encoder_flags_e flags, asn_app_consume_bytes_f *cb, + void *app_key) { + asn_enc_rval_t er = {0,0,0}; + const asn_SET_OF_specifics_t *specs = (const asn_SET_OF_specifics_t *)td->specifics; + const asn_TYPE_member_t *elm = td->elements; + const asn_anonymous_set_ *list = _A_CSET_FROM_VOID(sptr); + const char *mname = specs->as_XMLValueList + ? 0 : ((*elm->name) ? elm->name : elm->type->xml_tag); + size_t mlen = mname ? strlen(mname) : 0; + int xcan = (flags & XER_F_CANONICAL); + xer_tmp_enc_t *encs = 0; + size_t encs_count = 0; + void *original_app_key = app_key; + asn_app_consume_bytes_f *original_cb = cb; + int i; + + if(!sptr) ASN__ENCODE_FAILED; + + if(xcan) { + encs = (xer_tmp_enc_t *)MALLOC(list->count * sizeof(encs[0])); + if(!encs) ASN__ENCODE_FAILED; + cb = SET_OF_encode_xer_callback; + } + + er.encoded = 0; + + for(i = 0; i < list->count; i++) { + asn_enc_rval_t tmper = {0,0,0}; + + void *memb_ptr = list->array[i]; + if(!memb_ptr) continue; + + if(encs) { + memset(&encs[encs_count], 0, sizeof(encs[0])); + app_key = &encs[encs_count]; + encs_count++; + } + + if(mname) { + if(!xcan) ASN__TEXT_INDENT(1, ilevel); + ASN__CALLBACK3("<", 1, mname, mlen, ">", 1); + } + + if(!xcan && specs->as_XMLValueList == 1) + ASN__TEXT_INDENT(1, ilevel + 1); + tmper = elm->type->op->xer_encoder(elm->type, memb_ptr, + ilevel + (specs->as_XMLValueList != 2), + flags, cb, app_key); + if(tmper.encoded == -1) return tmper; + er.encoded += tmper.encoded; + if(tmper.encoded == 0 && specs->as_XMLValueList) { + const char *name = elm->type->xml_tag; + size_t len = strlen(name); + ASN__CALLBACK3("<", 1, name, len, "/>", 2); + } + + if(mname) { + ASN__CALLBACK3("", 1); + } + + } + + if(!xcan) ASN__TEXT_INDENT(1, ilevel - 1); + + if(encs) { + xer_tmp_enc_t *enc = encs; + xer_tmp_enc_t *end = encs + encs_count; + ssize_t control_size = 0; + + er.encoded = 0; + cb = original_cb; + app_key = original_app_key; + qsort(encs, encs_count, sizeof(encs[0]), SET_OF_xer_order); + + for(; enc < end; enc++) { + ASN__CALLBACK(enc->buffer, enc->offset); + FREEMEM(enc->buffer); + enc->buffer = 0; + control_size += enc->offset; + } + assert(control_size == er.encoded); + } + + goto cleanup; +cb_failed: + ASN__ENCODE_FAILED; +cleanup: + if(encs) { + size_t n; + for(n = 0; n < encs_count; n++) { + FREEMEM(encs[n].buffer); + } + FREEMEM(encs); + } + ASN__ENCODED_OK(er); +} diff --git a/certgen/asncodec/constr_TYPE.c b/certgen/asncodec/constr_TYPE.c index e634e750fdc2e0c5b65a6a1e8d4d2eaccba378f4..7c13ebecc1cfd793f49c4903620b2a222b015b6d 100644 --- a/certgen/asncodec/constr_TYPE.c +++ b/certgen/asncodec/constr_TYPE.c @@ -1,80 +1,80 @@ -/*- - * Copyright (c) 2003, 2004 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include -#include - -/* - * Version of the ASN.1 infrastructure shipped with compiler. - */ -int get_asn1c_environment_version() { return ASN1C_ENVIRONMENT_VERSION; } - -static asn_app_consume_bytes_f _print2fp; - -/* - * Return the outmost tag of the type. - */ -ber_tlv_tag_t -asn_TYPE_outmost_tag(const asn_TYPE_descriptor_t *type_descriptor, - const void *struct_ptr, int tag_mode, ber_tlv_tag_t tag) { - - if(tag_mode) - return tag; - - if(type_descriptor->tags_count) - return type_descriptor->tags[0]; - - return type_descriptor->op->outmost_tag(type_descriptor, struct_ptr, 0, 0); -} - -/* - * Print the target language's structure in human readable form. - */ -int -asn_fprint(FILE *stream, const asn_TYPE_descriptor_t *td, - const void *struct_ptr) { - if(!stream) stream = stdout; - if(!td || !struct_ptr) { - errno = EINVAL; - return -1; - } - - /* Invoke type-specific printer */ - if(td->op->print_struct(td, struct_ptr, 1, _print2fp, stream)) { - return -1; - } - - /* Terminate the output */ - if(_print2fp("\n", 1, stream)) { - return -1; - } - - return fflush(stream); -} - -/* Dump the data into the specified stdio stream */ -static int -_print2fp(const void *buffer, size_t size, void *app_key) { - FILE *stream = (FILE *)app_key; - - if(fwrite(buffer, 1, size, stream) != size) - return -1; - - return 0; -} - - -/* - * Some compilers do not support variable args macros. - * This function is a replacement of ASN_DEBUG() macro. - */ -void CC_PRINTFLIKE(1, 2) ASN_DEBUG_f(const char *fmt, ...); -void ASN_DEBUG_f(const char *fmt, ...) { - va_list ap; - va_start(ap, fmt); - vfprintf(stderr, fmt, ap); - fprintf(stderr, "\n"); - va_end(ap); -} +/*- + * Copyright (c) 2003, 2004 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include +#include + +/* + * Version of the ASN.1 infrastructure shipped with compiler. + */ +int get_asn1c_environment_version() { return ASN1C_ENVIRONMENT_VERSION; } + +static asn_app_consume_bytes_f _print2fp; + +/* + * Return the outmost tag of the type. + */ +ber_tlv_tag_t +asn_TYPE_outmost_tag(const asn_TYPE_descriptor_t *type_descriptor, + const void *struct_ptr, int tag_mode, ber_tlv_tag_t tag) { + + if(tag_mode) + return tag; + + if(type_descriptor->tags_count) + return type_descriptor->tags[0]; + + return type_descriptor->op->outmost_tag(type_descriptor, struct_ptr, 0, 0); +} + +/* + * Print the target language's structure in human readable form. + */ +int +asn_fprint(FILE *stream, const asn_TYPE_descriptor_t *td, + const void *struct_ptr) { + if(!stream) stream = stdout; + if(!td || !struct_ptr) { + errno = EINVAL; + return -1; + } + + /* Invoke type-specific printer */ + if(td->op->print_struct(td, struct_ptr, 1, _print2fp, stream)) { + return -1; + } + + /* Terminate the output */ + if(_print2fp("\n", 1, stream)) { + return -1; + } + + return fflush(stream); +} + +/* Dump the data into the specified stdio stream */ +static int +_print2fp(const void *buffer, size_t size, void *app_key) { + FILE *stream = (FILE *)app_key; + + if(fwrite(buffer, 1, size, stream) != size) + return -1; + + return 0; +} + + +/* + * Some compilers do not support variable args macros. + * This function is a replacement of ASN_DEBUG() macro. + */ +void CC_PRINTFLIKE(1, 2) ASN_DEBUG_f(const char *fmt, ...); +void ASN_DEBUG_f(const char *fmt, ...) { + va_list ap; + va_start(ap, fmt); + vfprintf(stderr, fmt, ap); + fprintf(stderr, "\n"); + va_end(ap); +} diff --git a/certgen/asncodec/constr_TYPE.h b/certgen/asncodec/constr_TYPE.h index 2fffadfd1b18a4bf8d4c6b6554ff74b50c05a3e9..7895c166f4369f0a4748dc1132d17127325186c5 100644 --- a/certgen/asncodec/constr_TYPE.h +++ b/certgen/asncodec/constr_TYPE.h @@ -1,296 +1,296 @@ -/* - * Copyright (c) 2003-2017 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -/* - * This file contains the declaration structure called "ASN.1 Type Definition", - * which holds all information necessary for encoding and decoding routines. - * This structure even contains pointer to these encoding and decoding routines - * for each defined ASN.1 type. - */ -#ifndef _CONSTR_TYPE_H_ -#define _CONSTR_TYPE_H_ - -#include -#include - -#ifdef __cplusplus -extern "C" { -#endif - -struct asn_TYPE_descriptor_s; /* Forward declaration */ -struct asn_TYPE_member_s; /* Forward declaration */ - -/* - * This type provides the context information for various ASN.1 routines, - * primarily ones doing decoding. A member _asn_ctx of this type must be - * included into certain target language's structures, such as compound types. - */ -typedef struct asn_struct_ctx_s { - short phase; /* Decoding phase */ - short step; /* Elementary step of a phase */ - int context; /* Other context information */ - void *ptr; /* Decoder-specific stuff (stack elements) */ - ber_tlv_len_t left; /* Number of bytes left, -1 for indefinite */ - char* start; -} asn_struct_ctx_t; - -#if !defined(ASN_DISABLE_BER_SUPPORT) -#include /* Basic Encoding Rules decoder */ -#include /* Distinguished Encoding Rules encoder */ -#else -typedef void (ber_type_decoder_f)(void); -typedef void (der_type_encoder_f)(void); -#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ - -#if !defined(ASN_DISABLE_XER_SUPPORT) -#include /* Decoder of XER (XML, text) */ -#include /* Encoder into XER (XML, text) */ -#else -typedef void (xer_type_decoder_f)(void); -typedef void (xer_type_encoder_f)(void); -#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ - -#if !defined(ASN_DISABLE_JER_SUPPORT) -#include /* Encoder into JER (JSON, text) */ -#else -typedef void (jer_type_encoder_f)(void); -#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ - -#if !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) -#include /* Packet Encoding Rules decoder */ -#include /* Packet Encoding Rules encoder */ -#else -typedef void (per_type_decoder_f)(void); -typedef void (per_type_encoder_f)(void); -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) */ - -#include /* Subtype constraints support */ - -#if !defined(ASN_DISABLE_RFILL_SUPPORT) -#include /* Random structures support */ -#else -typedef void (asn_random_fill_f)(void); -#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ - -#if !defined(ASN_DISABLE_OER_SUPPORT) -#include /* Octet Encoding Rules encoder */ -#include /* Octet Encoding Rules encoder */ -#else -typedef void (oer_type_decoder_f)(void); -typedef void (oer_type_encoder_f)(void); -#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ - -/* - * Free the structure according to its specification. - * Use one of ASN_STRUCT_{FREE,RESET,CONTENTS_ONLY} macros instead. - * Do not use directly. - */ -enum asn_struct_free_method { - ASFM_FREE_EVERYTHING, /* free(struct_ptr) and underlying members */ - ASFM_FREE_UNDERLYING, /* free underlying members */ - ASFM_FREE_UNDERLYING_AND_RESET /* FREE_UNDERLYING + memset(0) */ -}; -typedef void (asn_struct_free_f)( - const struct asn_TYPE_descriptor_s *type_descriptor, - void *struct_ptr, enum asn_struct_free_method); - -/* - * Free the structure including freeing the memory pointed to by ptr itself. - */ -#define ASN_STRUCT_FREE(asn_DEF, ptr) \ - (asn_DEF).op->free_struct(&(asn_DEF), (ptr), ASFM_FREE_EVERYTHING) - -/* - * Free the memory used by the members of the structure without freeing the - * the structure pointer itself. - * ZERO-OUT the structure to the safe clean state. - * (Retaining the pointer may be useful in case the structure is allocated - * statically or arranged on the stack, yet its elements are dynamic.) - */ -#define ASN_STRUCT_RESET(asn_DEF, ptr) \ - (asn_DEF).op->free_struct(&(asn_DEF), (ptr), ASFM_FREE_UNDERLYING_AND_RESET) - -/* - * Free memory used by the members of the structure without freeing - * the structure pointer itself. - * (Retaining the pointer may be useful in case the structure is allocated - * statically or arranged on the stack, yet its elements are dynamic.) - * AVOID using it in the application code; - * Use a safer ASN_STRUCT_RESET() instead. - */ -#define ASN_STRUCT_FREE_CONTENTS_ONLY(asn_DEF, ptr) \ - (asn_DEF).op->free_struct(&(asn_DEF), (ptr), ASFM_FREE_UNDERLYING) - -/* - * Print the structure according to its specification. - */ -typedef int(asn_struct_print_f)( - const struct asn_TYPE_descriptor_s *type_descriptor, - const void *struct_ptr, - int level, /* Indentation level */ - asn_app_consume_bytes_f *callback, void *app_key); - -/* - * Compare two structs between each other. - * Returns <0 if struct_A is "smaller" than struct_B, >0 if "greater", - * and =0 if "equal to", for some type-specific, stable definition of - * "smaller", "greater" and "equal to". - */ -typedef int (asn_struct_compare_f)( - const struct asn_TYPE_descriptor_s *type_descriptor, - const void *struct_A, - const void *struct_B); - -/* - * Return the outmost tag of the type. - * If the type is untagged CHOICE, the dynamic operation is performed. - * NOTE: This function pointer type is only useful internally. - * Do not use it in your application. - */ -typedef ber_tlv_tag_t (asn_outmost_tag_f)( - const struct asn_TYPE_descriptor_s *type_descriptor, - const void *struct_ptr, int tag_mode, ber_tlv_tag_t tag); -/* The instance of the above function type; used internally. */ -asn_outmost_tag_f asn_TYPE_outmost_tag; - -/* - * Fetch the desired type of the Open Type based on the - * Information Object Set driven constraints. - */ -typedef struct asn_type_selector_result_s { - const struct asn_TYPE_descriptor_s *type_descriptor; /* Type encoded. */ - unsigned presence_index; /* Associated choice variant. */ -} asn_type_selector_result_t; -typedef asn_type_selector_result_t(asn_type_selector_f)( - const struct asn_TYPE_descriptor_s *parent_type_descriptor, - const void *parent_structure_ptr); - -/* - * Generalized functions for dealing with the speciic type. - * May be directly invoked by applications. - */ -typedef struct asn_TYPE_operation_s { - asn_struct_free_f *free_struct; /* Free the structure */ - asn_struct_print_f *print_struct; /* Human readable output */ - asn_struct_compare_f *compare_struct; /* Compare two structures */ - ber_type_decoder_f *ber_decoder; /* Generic BER decoder */ - der_type_encoder_f *der_encoder; /* Canonical DER encoder */ - xer_type_decoder_f *xer_decoder; /* Generic XER decoder */ - xer_type_encoder_f *xer_encoder; /* [Canonical] XER encoder */ - jer_type_encoder_f *jer_encoder; /* Generic JER encoder */ - oer_type_decoder_f *oer_decoder; /* Generic OER decoder */ - oer_type_encoder_f *oer_encoder; /* Canonical OER encoder */ - per_type_decoder_f *uper_decoder; /* Unaligned PER decoder */ - per_type_encoder_f *uper_encoder; /* Unaligned PER encoder */ - per_type_decoder_f *aper_decoder; /* Aligned PER decoder */ - per_type_encoder_f *aper_encoder; /* Aligned PER encoder */ - asn_random_fill_f *random_fill; /* Initialize with a random value */ - asn_outmost_tag_f *outmost_tag; /* */ -} asn_TYPE_operation_t; - -/* - * A constraints tuple specifying both the OER and PER constraints. - */ -typedef struct asn_encoding_constraints_s { -#if !defined(ASN_DISABLE_OER_SUPPORT) - const struct asn_oer_constraints_s *oer_constraints; -#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ -#if !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) - const struct asn_per_constraints_s *per_constraints; -#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) */ - asn_constr_check_f *general_constraints; -} asn_encoding_constraints_t; - -/* - * The definitive description of the destination language's structure. - */ -typedef struct asn_TYPE_descriptor_s { - const char *name; /* A name of the ASN.1 type. "" in some cases. */ - const char *xml_tag; /* Name used in XML tag */ - - /* - * Generalized functions for dealing with the specific type. - * May be directly invoked by applications. - */ - asn_TYPE_operation_t *op; - - /*********************************************************************** - * Internally useful members. Not to be used by applications directly. * - **********************************************************************/ - - /* - * Tags that are expected to occur. - */ - const ber_tlv_tag_t *tags; /* Effective tags sequence for this type */ - unsigned tags_count; /* Number of tags which are expected */ - const ber_tlv_tag_t *all_tags; /* Every tag for BER/containment */ - unsigned all_tags_count; /* Number of tags */ - - /* OER, PER, and general constraints */ - asn_encoding_constraints_t encoding_constraints; - - /* - * An ASN.1 production type members (members of SEQUENCE, SET, CHOICE). - */ - struct asn_TYPE_member_s *elements; - unsigned elements_count; - - /* - * Additional information describing the type, used by appropriate - * functions above. - */ - const void *specifics; -} asn_TYPE_descriptor_t; - -/* - * This type describes an element of the constructed type, - * i.e. SEQUENCE, SET, CHOICE, etc. - */ - enum asn_TYPE_flags_e { - ATF_NOFLAGS, - ATF_POINTER = 0x01, /* Represented by the pointer */ - ATF_OPEN_TYPE = 0x02, /* Open Type */ - ATF_ANY_TYPE = 0x04 /* ANY type (deprecated!) */ - }; -typedef struct asn_TYPE_member_s { - enum asn_TYPE_flags_e flags; /* Element's presentation flags */ - unsigned optional; /* Following optional members, including current */ - unsigned memb_offset; /* Offset of the element */ - ber_tlv_tag_t tag; /* Outmost (most immediate) tag */ - int tag_mode; /* IMPLICIT/no/EXPLICIT tag at current level */ - asn_TYPE_descriptor_t *type; /* Member type descriptor */ - asn_type_selector_f *type_selector; /* IoS runtime type selector */ - asn_encoding_constraints_t encoding_constraints; - int (*default_value_cmp)(const void *sptr); /* Compare DEFAULT */ - int (*default_value_set)(void **sptr); /* Set DEFAULT */ - const char *name; /* ASN.1 identifier of the element */ -} asn_TYPE_member_t; - -/* - * BER tag to element number mapping. - */ -typedef struct asn_TYPE_tag2member_s { - ber_tlv_tag_t el_tag; /* Outmost tag of the member */ - unsigned el_no; /* Index of the associated member, base 0 */ - int toff_first; /* First occurrence of the el_tag, relative */ - int toff_last; /* Last occurrence of the el_tag, relative */ -} asn_TYPE_tag2member_t; - -/* - * This function prints out the contents of the target language's structure - * (struct_ptr) into the file pointer (stream) in human readable form. - * RETURN VALUES: - * 0: The structure is printed. - * -1: Problem dumping the structure. - * (See also xer_fprint() in xer_encoder.h) - */ -int asn_fprint(FILE *stream, /* Destination stream descriptor */ - const asn_TYPE_descriptor_t *td, /* ASN.1 type descriptor */ - const void *struct_ptr); /* Structure to be printed */ - -#ifdef __cplusplus -} -#endif - -#endif /* _CONSTR_TYPE_H_ */ +/* + * Copyright (c) 2003-2017 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +/* + * This file contains the declaration structure called "ASN.1 Type Definition", + * which holds all information necessary for encoding and decoding routines. + * This structure even contains pointer to these encoding and decoding routines + * for each defined ASN.1 type. + */ +#ifndef _CONSTR_TYPE_H_ +#define _CONSTR_TYPE_H_ + +#include +#include + +#ifdef __cplusplus +extern "C" { +#endif + +struct asn_TYPE_descriptor_s; /* Forward declaration */ +struct asn_TYPE_member_s; /* Forward declaration */ + +/* + * This type provides the context information for various ASN.1 routines, + * primarily ones doing decoding. A member _asn_ctx of this type must be + * included into certain target language's structures, such as compound types. + */ +typedef struct asn_struct_ctx_s { + short phase; /* Decoding phase */ + short step; /* Elementary step of a phase */ + int context; /* Other context information */ + void *ptr; /* Decoder-specific stuff (stack elements) */ + ber_tlv_len_t left; /* Number of bytes left, -1 for indefinite */ + char* start; +} asn_struct_ctx_t; + +#if !defined(ASN_DISABLE_BER_SUPPORT) +#include /* Basic Encoding Rules decoder */ +#include /* Distinguished Encoding Rules encoder */ +#else +typedef void (ber_type_decoder_f)(void); +typedef void (der_type_encoder_f)(void); +#endif /* !defined(ASN_DISABLE_BER_SUPPORT) */ + +#if !defined(ASN_DISABLE_XER_SUPPORT) +#include /* Decoder of XER (XML, text) */ +#include /* Encoder into XER (XML, text) */ +#else +typedef void (xer_type_decoder_f)(void); +typedef void (xer_type_encoder_f)(void); +#endif /* !defined(ASN_DISABLE_XER_SUPPORT) */ + +#if !defined(ASN_DISABLE_JER_SUPPORT) +#include /* Encoder into JER (JSON, text) */ +#else +typedef void (jer_type_encoder_f)(void); +#endif /* !defined(ASN_DISABLE_JER_SUPPORT) */ + +#if !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) +#include /* Packet Encoding Rules decoder */ +#include /* Packet Encoding Rules encoder */ +#else +typedef void (per_type_decoder_f)(void); +typedef void (per_type_encoder_f)(void); +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) */ + +#include /* Subtype constraints support */ + +#if !defined(ASN_DISABLE_RFILL_SUPPORT) +#include /* Random structures support */ +#else +typedef void (asn_random_fill_f)(void); +#endif /* !defined(ASN_DISABLE_RFILL_SUPPORT) */ + +#if !defined(ASN_DISABLE_OER_SUPPORT) +#include /* Octet Encoding Rules encoder */ +#include /* Octet Encoding Rules encoder */ +#else +typedef void (oer_type_decoder_f)(void); +typedef void (oer_type_encoder_f)(void); +#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ + +/* + * Free the structure according to its specification. + * Use one of ASN_STRUCT_{FREE,RESET,CONTENTS_ONLY} macros instead. + * Do not use directly. + */ +enum asn_struct_free_method { + ASFM_FREE_EVERYTHING, /* free(struct_ptr) and underlying members */ + ASFM_FREE_UNDERLYING, /* free underlying members */ + ASFM_FREE_UNDERLYING_AND_RESET /* FREE_UNDERLYING + memset(0) */ +}; +typedef void (asn_struct_free_f)( + const struct asn_TYPE_descriptor_s *type_descriptor, + void *struct_ptr, enum asn_struct_free_method); + +/* + * Free the structure including freeing the memory pointed to by ptr itself. + */ +#define ASN_STRUCT_FREE(asn_DEF, ptr) \ + (asn_DEF).op->free_struct(&(asn_DEF), (ptr), ASFM_FREE_EVERYTHING) + +/* + * Free the memory used by the members of the structure without freeing the + * the structure pointer itself. + * ZERO-OUT the structure to the safe clean state. + * (Retaining the pointer may be useful in case the structure is allocated + * statically or arranged on the stack, yet its elements are dynamic.) + */ +#define ASN_STRUCT_RESET(asn_DEF, ptr) \ + (asn_DEF).op->free_struct(&(asn_DEF), (ptr), ASFM_FREE_UNDERLYING_AND_RESET) + +/* + * Free memory used by the members of the structure without freeing + * the structure pointer itself. + * (Retaining the pointer may be useful in case the structure is allocated + * statically or arranged on the stack, yet its elements are dynamic.) + * AVOID using it in the application code; + * Use a safer ASN_STRUCT_RESET() instead. + */ +#define ASN_STRUCT_FREE_CONTENTS_ONLY(asn_DEF, ptr) \ + (asn_DEF).op->free_struct(&(asn_DEF), (ptr), ASFM_FREE_UNDERLYING) + +/* + * Print the structure according to its specification. + */ +typedef int(asn_struct_print_f)( + const struct asn_TYPE_descriptor_s *type_descriptor, + const void *struct_ptr, + int level, /* Indentation level */ + asn_app_consume_bytes_f *callback, void *app_key); + +/* + * Compare two structs between each other. + * Returns <0 if struct_A is "smaller" than struct_B, >0 if "greater", + * and =0 if "equal to", for some type-specific, stable definition of + * "smaller", "greater" and "equal to". + */ +typedef int (asn_struct_compare_f)( + const struct asn_TYPE_descriptor_s *type_descriptor, + const void *struct_A, + const void *struct_B); + +/* + * Return the outmost tag of the type. + * If the type is untagged CHOICE, the dynamic operation is performed. + * NOTE: This function pointer type is only useful internally. + * Do not use it in your application. + */ +typedef ber_tlv_tag_t (asn_outmost_tag_f)( + const struct asn_TYPE_descriptor_s *type_descriptor, + const void *struct_ptr, int tag_mode, ber_tlv_tag_t tag); +/* The instance of the above function type; used internally. */ +asn_outmost_tag_f asn_TYPE_outmost_tag; + +/* + * Fetch the desired type of the Open Type based on the + * Information Object Set driven constraints. + */ +typedef struct asn_type_selector_result_s { + const struct asn_TYPE_descriptor_s *type_descriptor; /* Type encoded. */ + unsigned presence_index; /* Associated choice variant. */ +} asn_type_selector_result_t; +typedef asn_type_selector_result_t(asn_type_selector_f)( + const struct asn_TYPE_descriptor_s *parent_type_descriptor, + const void *parent_structure_ptr); + +/* + * Generalized functions for dealing with the speciic type. + * May be directly invoked by applications. + */ +typedef struct asn_TYPE_operation_s { + asn_struct_free_f *free_struct; /* Free the structure */ + asn_struct_print_f *print_struct; /* Human readable output */ + asn_struct_compare_f *compare_struct; /* Compare two structures */ + ber_type_decoder_f *ber_decoder; /* Generic BER decoder */ + der_type_encoder_f *der_encoder; /* Canonical DER encoder */ + xer_type_decoder_f *xer_decoder; /* Generic XER decoder */ + xer_type_encoder_f *xer_encoder; /* [Canonical] XER encoder */ + jer_type_encoder_f *jer_encoder; /* Generic JER encoder */ + oer_type_decoder_f *oer_decoder; /* Generic OER decoder */ + oer_type_encoder_f *oer_encoder; /* Canonical OER encoder */ + per_type_decoder_f *uper_decoder; /* Unaligned PER decoder */ + per_type_encoder_f *uper_encoder; /* Unaligned PER encoder */ + per_type_decoder_f *aper_decoder; /* Aligned PER decoder */ + per_type_encoder_f *aper_encoder; /* Aligned PER encoder */ + asn_random_fill_f *random_fill; /* Initialize with a random value */ + asn_outmost_tag_f *outmost_tag; /* */ +} asn_TYPE_operation_t; + +/* + * A constraints tuple specifying both the OER and PER constraints. + */ +typedef struct asn_encoding_constraints_s { +#if !defined(ASN_DISABLE_OER_SUPPORT) + const struct asn_oer_constraints_s *oer_constraints; +#endif /* !defined(ASN_DISABLE_OER_SUPPORT) */ +#if !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) + const struct asn_per_constraints_s *per_constraints; +#endif /* !defined(ASN_DISABLE_UPER_SUPPORT) || !defined(ASN_DISABLE_APER_SUPPORT) */ + asn_constr_check_f *general_constraints; +} asn_encoding_constraints_t; + +/* + * The definitive description of the destination language's structure. + */ +typedef struct asn_TYPE_descriptor_s { + const char *name; /* A name of the ASN.1 type. "" in some cases. */ + const char *xml_tag; /* Name used in XML tag */ + + /* + * Generalized functions for dealing with the specific type. + * May be directly invoked by applications. + */ + asn_TYPE_operation_t *op; + + /*********************************************************************** + * Internally useful members. Not to be used by applications directly. * + **********************************************************************/ + + /* + * Tags that are expected to occur. + */ + const ber_tlv_tag_t *tags; /* Effective tags sequence for this type */ + unsigned tags_count; /* Number of tags which are expected */ + const ber_tlv_tag_t *all_tags; /* Every tag for BER/containment */ + unsigned all_tags_count; /* Number of tags */ + + /* OER, PER, and general constraints */ + asn_encoding_constraints_t encoding_constraints; + + /* + * An ASN.1 production type members (members of SEQUENCE, SET, CHOICE). + */ + struct asn_TYPE_member_s *elements; + unsigned elements_count; + + /* + * Additional information describing the type, used by appropriate + * functions above. + */ + const void *specifics; +} asn_TYPE_descriptor_t; + +/* + * This type describes an element of the constructed type, + * i.e. SEQUENCE, SET, CHOICE, etc. + */ + enum asn_TYPE_flags_e { + ATF_NOFLAGS, + ATF_POINTER = 0x01, /* Represented by the pointer */ + ATF_OPEN_TYPE = 0x02, /* Open Type */ + ATF_ANY_TYPE = 0x04 /* ANY type (deprecated!) */ + }; +typedef struct asn_TYPE_member_s { + enum asn_TYPE_flags_e flags; /* Element's presentation flags */ + unsigned optional; /* Following optional members, including current */ + unsigned memb_offset; /* Offset of the element */ + ber_tlv_tag_t tag; /* Outmost (most immediate) tag */ + int tag_mode; /* IMPLICIT/no/EXPLICIT tag at current level */ + asn_TYPE_descriptor_t *type; /* Member type descriptor */ + asn_type_selector_f *type_selector; /* IoS runtime type selector */ + asn_encoding_constraints_t encoding_constraints; + int (*default_value_cmp)(const void *sptr); /* Compare DEFAULT */ + int (*default_value_set)(void **sptr); /* Set DEFAULT */ + const char *name; /* ASN.1 identifier of the element */ +} asn_TYPE_member_t; + +/* + * BER tag to element number mapping. + */ +typedef struct asn_TYPE_tag2member_s { + ber_tlv_tag_t el_tag; /* Outmost tag of the member */ + unsigned el_no; /* Index of the associated member, base 0 */ + int toff_first; /* First occurrence of the el_tag, relative */ + int toff_last; /* Last occurrence of the el_tag, relative */ +} asn_TYPE_tag2member_t; + +/* + * This function prints out the contents of the target language's structure + * (struct_ptr) into the file pointer (stream) in human readable form. + * RETURN VALUES: + * 0: The structure is printed. + * -1: Problem dumping the structure. + * (See also xer_fprint() in xer_encoder.h) + */ +int asn_fprint(FILE *stream, /* Destination stream descriptor */ + const asn_TYPE_descriptor_t *td, /* ASN.1 type descriptor */ + const void *struct_ptr); /* Structure to be printed */ + +#ifdef __cplusplus +} +#endif + +#endif /* _CONSTR_TYPE_H_ */ diff --git a/certgen/asncodec/constraints.c b/certgen/asncodec/constraints.c index 72137cc5c72eb6452fe5ece5b86553fa2c0184d4..60a66301553b12312f586d408f1469e002827825 100644 --- a/certgen/asncodec/constraints.c +++ b/certgen/asncodec/constraints.c @@ -1,94 +1,94 @@ -#include -#include - -int -asn_generic_no_constraint(const asn_TYPE_descriptor_t *type_descriptor, - const void *struct_ptr, - asn_app_constraint_failed_f *cb, void *key) { - (void)type_descriptor; /* Unused argument */ - (void)struct_ptr; /* Unused argument */ - (void)cb; /* Unused argument */ - (void)key; /* Unused argument */ - - /* Nothing to check */ - return 0; -} - -int -asn_generic_unknown_constraint(const asn_TYPE_descriptor_t *type_descriptor, - const void *struct_ptr, - asn_app_constraint_failed_f *cb, void *key) { - (void)type_descriptor; /* Unused argument */ - (void)struct_ptr; /* Unused argument */ - (void)cb; /* Unused argument */ - (void)key; /* Unused argument */ - - /* Unknown how to check */ - return 0; -} - -struct errbufDesc { - const asn_TYPE_descriptor_t *failed_type; - const void *failed_struct_ptr; - char *errbuf; - size_t errlen; -}; - -static void -CC_PRINTFLIKE(4, 5) -_asn_i_ctfailcb(void *key, const asn_TYPE_descriptor_t *td, const void *sptr, - const char *fmt, ...) { - struct errbufDesc *arg = key; - va_list ap; - ssize_t vlen; - ssize_t maxlen; - - arg->failed_type = td; - arg->failed_struct_ptr = sptr; - - maxlen = arg->errlen; - if(maxlen <= 0) - return; - - va_start(ap, fmt); - vlen = vsnprintf(arg->errbuf, maxlen, fmt, ap); - va_end(ap); - if(vlen >= maxlen) { - arg->errbuf[maxlen-1] = '\0'; /* Ensuring libc correctness */ - arg->errlen = maxlen - 1; /* Not counting termination */ - return; - } else if(vlen >= 0) { - arg->errbuf[vlen] = '\0'; /* Ensuring libc correctness */ - arg->errlen = vlen; /* Not counting termination */ - } else { - /* - * The libc on this system is broken. - */ - vlen = sizeof("") - 1; - maxlen--; - arg->errlen = vlen < maxlen ? vlen : maxlen; - memcpy(arg->errbuf, "", arg->errlen); - arg->errbuf[arg->errlen] = 0; - } - - return; -} - -int -asn_check_constraints(const asn_TYPE_descriptor_t *type_descriptor, - const void *struct_ptr, char *errbuf, size_t *errlen) { - struct errbufDesc arg; - int ret; - - arg.failed_type = 0; - arg.failed_struct_ptr = 0; - arg.errbuf = errbuf; - arg.errlen = errlen ? *errlen : 0; - - ret = type_descriptor->encoding_constraints.general_constraints( - type_descriptor, struct_ptr, _asn_i_ctfailcb, &arg); - if(ret == -1 && errlen) *errlen = arg.errlen; - - return ret; -} - +#include +#include + +int +asn_generic_no_constraint(const asn_TYPE_descriptor_t *type_descriptor, + const void *struct_ptr, + asn_app_constraint_failed_f *cb, void *key) { + (void)type_descriptor; /* Unused argument */ + (void)struct_ptr; /* Unused argument */ + (void)cb; /* Unused argument */ + (void)key; /* Unused argument */ + + /* Nothing to check */ + return 0; +} + +int +asn_generic_unknown_constraint(const asn_TYPE_descriptor_t *type_descriptor, + const void *struct_ptr, + asn_app_constraint_failed_f *cb, void *key) { + (void)type_descriptor; /* Unused argument */ + (void)struct_ptr; /* Unused argument */ + (void)cb; /* Unused argument */ + (void)key; /* Unused argument */ + + /* Unknown how to check */ + return 0; +} + +struct errbufDesc { + const asn_TYPE_descriptor_t *failed_type; + const void *failed_struct_ptr; + char *errbuf; + size_t errlen; +}; + +static void +CC_PRINTFLIKE(4, 5) +_asn_i_ctfailcb(void *key, const asn_TYPE_descriptor_t *td, const void *sptr, + const char *fmt, ...) { + struct errbufDesc *arg = key; + va_list ap; + ssize_t vlen; + ssize_t maxlen; + + arg->failed_type = td; + arg->failed_struct_ptr = sptr; + + maxlen = arg->errlen; + if(maxlen <= 0) + return; + + va_start(ap, fmt); + vlen = vsnprintf(arg->errbuf, maxlen, fmt, ap); + va_end(ap); + if(vlen >= maxlen) { + arg->errbuf[maxlen-1] = '\0'; /* Ensuring libc correctness */ + arg->errlen = maxlen - 1; /* Not counting termination */ + return; + } else if(vlen >= 0) { + arg->errbuf[vlen] = '\0'; /* Ensuring libc correctness */ + arg->errlen = vlen; /* Not counting termination */ + } else { + /* + * The libc on this system is broken. + */ + vlen = sizeof("") - 1; + maxlen--; + arg->errlen = vlen < maxlen ? vlen : maxlen; + memcpy(arg->errbuf, "", arg->errlen); + arg->errbuf[arg->errlen] = 0; + } + + return; +} + +int +asn_check_constraints(const asn_TYPE_descriptor_t *type_descriptor, + const void *struct_ptr, char *errbuf, size_t *errlen) { + struct errbufDesc arg; + int ret; + + arg.failed_type = 0; + arg.failed_struct_ptr = 0; + arg.errbuf = errbuf; + arg.errlen = errlen ? *errlen : 0; + + ret = type_descriptor->encoding_constraints.general_constraints( + type_descriptor, struct_ptr, _asn_i_ctfailcb, &arg); + if(ret == -1 && errlen) *errlen = arg.errlen; + + return ret; +} + diff --git a/certgen/asncodec/constraints.h b/certgen/asncodec/constraints.h index 0c093fa826b2bd3eff341d21342f3a1f54800b35..7d09608fec749af0e9f5b7c206e4c66ce0de0fea 100644 --- a/certgen/asncodec/constraints.h +++ b/certgen/asncodec/constraints.h @@ -1,63 +1,63 @@ -/*- - * Copyright (c) 2004-2017 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#ifndef ASN1_CONSTRAINTS_VALIDATOR_H -#define ASN1_CONSTRAINTS_VALIDATOR_H - -#include /* Platform-dependent types */ -#include - -#ifdef __cplusplus -extern "C" { -#endif - -struct asn_TYPE_descriptor_s; /* Forward declaration */ - -/* - * Validate the structure according to the ASN.1 constraints. - * If errbuf and errlen are given, they shall be pointing to the appropriate - * buffer space and its length before calling this function. Alternatively, - * they could be passed as NULL's. If constraints validation fails, - * errlen will contain the actual number of bytes taken from the errbuf - * to encode an error message (properly 0-terminated). - * - * RETURN VALUES: - * This function returns 0 in case all ASN.1 constraints are met - * and -1 if one or more constraints were failed. - */ -int asn_check_constraints( - const struct asn_TYPE_descriptor_s *type_descriptor, - const void *struct_ptr, /* Target language's structure */ - char *errbuf, /* Returned error description */ - size_t *errlen /* Length of the error description */ -); - - -/* - * Generic type for constraint checking callback, - * associated with every type descriptor. - */ -typedef int(asn_constr_check_f)( - const struct asn_TYPE_descriptor_s *type_descriptor, const void *struct_ptr, - asn_app_constraint_failed_f *optional_callback, /* Log the error */ - void *optional_app_key /* Opaque key passed to a callback */ -); - -/******************************* - * INTERNALLY USEFUL FUNCTIONS * - *******************************/ - -asn_constr_check_f asn_generic_no_constraint; /* No constraint whatsoever */ -asn_constr_check_f asn_generic_unknown_constraint; /* Not fully supported */ - -/* - * Invoke the callback with a complete error message. - */ -#define ASN__CTFAIL if(ctfailcb) ctfailcb - -#ifdef __cplusplus -} -#endif - -#endif /* ASN1_CONSTRAINTS_VALIDATOR_H */ +/*- + * Copyright (c) 2004-2017 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#ifndef ASN1_CONSTRAINTS_VALIDATOR_H +#define ASN1_CONSTRAINTS_VALIDATOR_H + +#include /* Platform-dependent types */ +#include + +#ifdef __cplusplus +extern "C" { +#endif + +struct asn_TYPE_descriptor_s; /* Forward declaration */ + +/* + * Validate the structure according to the ASN.1 constraints. + * If errbuf and errlen are given, they shall be pointing to the appropriate + * buffer space and its length before calling this function. Alternatively, + * they could be passed as NULL's. If constraints validation fails, + * errlen will contain the actual number of bytes taken from the errbuf + * to encode an error message (properly 0-terminated). + * + * RETURN VALUES: + * This function returns 0 in case all ASN.1 constraints are met + * and -1 if one or more constraints were failed. + */ +int asn_check_constraints( + const struct asn_TYPE_descriptor_s *type_descriptor, + const void *struct_ptr, /* Target language's structure */ + char *errbuf, /* Returned error description */ + size_t *errlen /* Length of the error description */ +); + + +/* + * Generic type for constraint checking callback, + * associated with every type descriptor. + */ +typedef int(asn_constr_check_f)( + const struct asn_TYPE_descriptor_s *type_descriptor, const void *struct_ptr, + asn_app_constraint_failed_f *optional_callback, /* Log the error */ + void *optional_app_key /* Opaque key passed to a callback */ +); + +/******************************* + * INTERNALLY USEFUL FUNCTIONS * + *******************************/ + +asn_constr_check_f asn_generic_no_constraint; /* No constraint whatsoever */ +asn_constr_check_f asn_generic_unknown_constraint; /* Not fully supported */ + +/* + * Invoke the callback with a complete error message. + */ +#define ASN__CTFAIL if(ctfailcb) ctfailcb + +#ifdef __cplusplus +} +#endif + +#endif /* ASN1_CONSTRAINTS_VALIDATOR_H */ diff --git a/certgen/asncodec/oer_decoder.c b/certgen/asncodec/oer_decoder.c index 070173826d05c24918b25e0ebea8f19fb9245191..07bef7a57bffabd04460324a30d850eeba5f74bc 100644 --- a/certgen/asncodec/oer_decoder.c +++ b/certgen/asncodec/oer_decoder.c @@ -1,152 +1,152 @@ -/* - * Copyright (c) 2017 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include - -/* - * The OER decoder of any type. - */ -asn_dec_rval_t -oer_decode(const asn_codec_ctx_t *opt_codec_ctx, - const asn_TYPE_descriptor_t *type_descriptor, void **struct_ptr, - const void *ptr, size_t size) { - asn_codec_ctx_t s_codec_ctx; - - /* - * Stack checker requires that the codec context - * must be allocated on the stack. - */ - if(opt_codec_ctx) { - if(opt_codec_ctx->max_stack_size) { - s_codec_ctx = *opt_codec_ctx; - opt_codec_ctx = &s_codec_ctx; - } - } else { - /* If context is not given, be security-conscious anyway */ - memset(&s_codec_ctx, 0, sizeof(s_codec_ctx)); - s_codec_ctx.max_stack_size = ASN__DEFAULT_STACK_MAX; - opt_codec_ctx = &s_codec_ctx; - } - - /* - * Invoke type-specific decoder. - */ - return type_descriptor->op->oer_decoder(opt_codec_ctx, type_descriptor, 0, - struct_ptr, /* Pointer to the destination structure */ - ptr, size /* Buffer and its size */ - ); -} - -/* - * Open Type is encoded as a length (#8.6) followed by that number of bytes. - * Since we're just skipping, reading the length would be enough. - */ -ssize_t -oer_open_type_skip(const void *bufptr, size_t size) { - size_t len = 0; - return oer_fetch_length(bufptr, size, &len); -} - -/* - * Read the Open Type (X.696 (08/2015), #30). - * RETURN VALUES: - * 0: More data expected than bufptr contains. - * -1: Fatal error deciphering length. - * >0: Number of bytes used from bufptr. - */ -ssize_t -oer_open_type_get(const asn_codec_ctx_t *opt_codec_ctx, - const struct asn_TYPE_descriptor_s *td, - const asn_oer_constraints_t *constraints, void **struct_ptr, - const void *bufptr, size_t size) { - asn_dec_rval_t dr; - size_t container_len = 0; - ssize_t len_len; - enum asn_struct_free_method dispose_method = - (*struct_ptr) ? ASFM_FREE_UNDERLYING_AND_RESET : ASFM_FREE_EVERYTHING; - - /* Get the size of a length determinant */ - len_len = oer_fetch_length(bufptr, size, &container_len); - if(len_len <= 0) { - return len_len; /* Error or more data expected */ - } - - /* - * len_len can't be bigger than size, but size without len_len - * should be bigger or equal to container length - */ - if(size - len_len < container_len) { - /* More data is expected */ - return 0; - } - - dr = td->op->oer_decoder(opt_codec_ctx, td, constraints, struct_ptr, - (const uint8_t *)bufptr + len_len, container_len); - if(dr.code == RC_OK) { - return len_len + container_len; - } else { - /* Even if RC_WMORE, we can't get more data into a closed container. */ - td->op->free_struct(td, *struct_ptr, dispose_method); - *struct_ptr = NULL; - return -1; - } -} - - -asn_dec_rval_t -oer_decode_primitive(const asn_codec_ctx_t *opt_codec_ctx, - const asn_TYPE_descriptor_t *td, - const asn_oer_constraints_t *constraints, void **sptr, - const void *ptr, size_t size) { - ASN__PRIMITIVE_TYPE_t *st = (ASN__PRIMITIVE_TYPE_t *)*sptr; - asn_dec_rval_t rval = {RC_OK, 0}; - size_t expected_length = 0; - ssize_t len_len; - - (void)td; - (void)opt_codec_ctx; - (void)constraints; - - if(!st) { - st = (ASN__PRIMITIVE_TYPE_t *)(*sptr = CALLOC( - 1, sizeof(ASN__PRIMITIVE_TYPE_t))); - if(!st) ASN__DECODE_FAILED; - } - - - /* - * X.696 (08/2015) #27.2 - * Encode length determinant as _number of octets_, but only - * if upper bound is not equal to lower bound. - */ - len_len = oer_fetch_length(ptr, size, &expected_length); - if(len_len > 0) { - rval.consumed = len_len; - ptr = (const char *)ptr + len_len; - size -= len_len; - } else if(len_len == 0) { - ASN__DECODE_STARVED; - } else if(len_len < 0) { - ASN__DECODE_FAILED; - } - - if(size < expected_length) { - ASN__DECODE_STARVED; - } else { - uint8_t *buf = MALLOC(expected_length + 1); - if(buf == NULL) { - ASN__DECODE_FAILED; - } else { - memcpy(buf, ptr, expected_length); - buf[expected_length] = '\0'; - } - FREEMEM(st->buf); - st->buf = buf; - st->size = expected_length; - - rval.consumed += expected_length; - return rval; - } -} +/* + * Copyright (c) 2017 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include + +/* + * The OER decoder of any type. + */ +asn_dec_rval_t +oer_decode(const asn_codec_ctx_t *opt_codec_ctx, + const asn_TYPE_descriptor_t *type_descriptor, void **struct_ptr, + const void *ptr, size_t size) { + asn_codec_ctx_t s_codec_ctx; + + /* + * Stack checker requires that the codec context + * must be allocated on the stack. + */ + if(opt_codec_ctx) { + if(opt_codec_ctx->max_stack_size) { + s_codec_ctx = *opt_codec_ctx; + opt_codec_ctx = &s_codec_ctx; + } + } else { + /* If context is not given, be security-conscious anyway */ + memset(&s_codec_ctx, 0, sizeof(s_codec_ctx)); + s_codec_ctx.max_stack_size = ASN__DEFAULT_STACK_MAX; + opt_codec_ctx = &s_codec_ctx; + } + + /* + * Invoke type-specific decoder. + */ + return type_descriptor->op->oer_decoder(opt_codec_ctx, type_descriptor, 0, + struct_ptr, /* Pointer to the destination structure */ + ptr, size /* Buffer and its size */ + ); +} + +/* + * Open Type is encoded as a length (#8.6) followed by that number of bytes. + * Since we're just skipping, reading the length would be enough. + */ +ssize_t +oer_open_type_skip(const void *bufptr, size_t size) { + size_t len = 0; + return oer_fetch_length(bufptr, size, &len); +} + +/* + * Read the Open Type (X.696 (08/2015), #30). + * RETURN VALUES: + * 0: More data expected than bufptr contains. + * -1: Fatal error deciphering length. + * >0: Number of bytes used from bufptr. + */ +ssize_t +oer_open_type_get(const asn_codec_ctx_t *opt_codec_ctx, + const struct asn_TYPE_descriptor_s *td, + const asn_oer_constraints_t *constraints, void **struct_ptr, + const void *bufptr, size_t size) { + asn_dec_rval_t dr; + size_t container_len = 0; + ssize_t len_len; + enum asn_struct_free_method dispose_method = + (*struct_ptr) ? ASFM_FREE_UNDERLYING_AND_RESET : ASFM_FREE_EVERYTHING; + + /* Get the size of a length determinant */ + len_len = oer_fetch_length(bufptr, size, &container_len); + if(len_len <= 0) { + return len_len; /* Error or more data expected */ + } + + /* + * len_len can't be bigger than size, but size without len_len + * should be bigger or equal to container length + */ + if(size - len_len < container_len) { + /* More data is expected */ + return 0; + } + + dr = td->op->oer_decoder(opt_codec_ctx, td, constraints, struct_ptr, + (const uint8_t *)bufptr + len_len, container_len); + if(dr.code == RC_OK) { + return len_len + container_len; + } else { + /* Even if RC_WMORE, we can't get more data into a closed container. */ + td->op->free_struct(td, *struct_ptr, dispose_method); + *struct_ptr = NULL; + return -1; + } +} + + +asn_dec_rval_t +oer_decode_primitive(const asn_codec_ctx_t *opt_codec_ctx, + const asn_TYPE_descriptor_t *td, + const asn_oer_constraints_t *constraints, void **sptr, + const void *ptr, size_t size) { + ASN__PRIMITIVE_TYPE_t *st = (ASN__PRIMITIVE_TYPE_t *)*sptr; + asn_dec_rval_t rval = {RC_OK, 0}; + size_t expected_length = 0; + ssize_t len_len; + + (void)td; + (void)opt_codec_ctx; + (void)constraints; + + if(!st) { + st = (ASN__PRIMITIVE_TYPE_t *)(*sptr = CALLOC( + 1, sizeof(ASN__PRIMITIVE_TYPE_t))); + if(!st) ASN__DECODE_FAILED; + } + + + /* + * X.696 (08/2015) #27.2 + * Encode length determinant as _number of octets_, but only + * if upper bound is not equal to lower bound. + */ + len_len = oer_fetch_length(ptr, size, &expected_length); + if(len_len > 0) { + rval.consumed = len_len; + ptr = (const char *)ptr + len_len; + size -= len_len; + } else if(len_len == 0) { + ASN__DECODE_STARVED; + } else if(len_len < 0) { + ASN__DECODE_FAILED; + } + + if(size < expected_length) { + ASN__DECODE_STARVED; + } else { + uint8_t *buf = MALLOC(expected_length + 1); + if(buf == NULL) { + ASN__DECODE_FAILED; + } else { + memcpy(buf, ptr, expected_length); + buf[expected_length] = '\0'; + } + FREEMEM(st->buf); + st->buf = buf; + st->size = expected_length; + + rval.consumed += expected_length; + return rval; + } +} diff --git a/certgen/asncodec/oer_decoder.h b/certgen/asncodec/oer_decoder.h index 40992e9480ec37b7ffc27cdd2ab74bf4148619f0..b1c3e7480b4549a078b7b067ea4807c728ca443b 100644 --- a/certgen/asncodec/oer_decoder.h +++ b/certgen/asncodec/oer_decoder.h @@ -1,72 +1,72 @@ -/* - * Copyright (c) 2017 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#ifndef OER_DECODER_H -#define OER_DECODER_H - -#include -#include - -#ifdef __cplusplus -extern "C" { -#endif - -struct asn_TYPE_descriptor_s; /* Forward declaration */ -struct asn_codec_ctx_s; /* Forward declaration */ - -/* - * The Octet Encoding Rules (OER, X.696 08/2015) decoder for any given type. - * This function may be invoked directly by the application. - * Parses CANONICAL-OER and BASIC-OER. - */ -asn_dec_rval_t oer_decode(const struct asn_codec_ctx_s *opt_codec_ctx, - const struct asn_TYPE_descriptor_s *type_descriptor, - void **struct_ptr, /* Pointer to a target structure's pointer */ - const void *buffer, /* Data to be decoded */ - size_t size /* Size of that buffer */ - ); - -/* - * Type of generic function which decodes the byte stream into the structure. - */ -typedef asn_dec_rval_t(oer_type_decoder_f)( - const struct asn_codec_ctx_s *opt_codec_ctx, - const struct asn_TYPE_descriptor_s *type_descriptor, - const asn_oer_constraints_t *constraints, - void **struct_ptr, - const void *buf_ptr, - size_t size); - -/* - * Swallow the Open Type (X.696 (08/2015), #30) into /dev/null. - * RETURN VALUES: - * -1: Fatal error deciphering length. - * 0: More data expected than bufptr contains. - * >0: Number of bytes used from bufptr. - */ -ssize_t oer_open_type_skip(const void *bufptr, size_t size); - -/* - * Read the Open Type (X.696 (08/2015), #30). - * RETURN VALUES: - * 0: More data expected than bufptr contains. - * -1: Fatal error deciphering length. - * >0: Number of bytes used from bufptr. - */ -ssize_t oer_open_type_get(const asn_codec_ctx_t *opt_codec_ctx, - const struct asn_TYPE_descriptor_s *td, - const asn_oer_constraints_t *constraints, - void **struct_ptr, const void *bufptr, size_t size); - -/* - * Length-prefixed buffer decoding for primitive types. - */ -oer_type_decoder_f oer_decode_primitive; - - -#ifdef __cplusplus -} -#endif - -#endif /* OER_DECODER_H */ +/* + * Copyright (c) 2017 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#ifndef OER_DECODER_H +#define OER_DECODER_H + +#include +#include + +#ifdef __cplusplus +extern "C" { +#endif + +struct asn_TYPE_descriptor_s; /* Forward declaration */ +struct asn_codec_ctx_s; /* Forward declaration */ + +/* + * The Octet Encoding Rules (OER, X.696 08/2015) decoder for any given type. + * This function may be invoked directly by the application. + * Parses CANONICAL-OER and BASIC-OER. + */ +asn_dec_rval_t oer_decode(const struct asn_codec_ctx_s *opt_codec_ctx, + const struct asn_TYPE_descriptor_s *type_descriptor, + void **struct_ptr, /* Pointer to a target structure's pointer */ + const void *buffer, /* Data to be decoded */ + size_t size /* Size of that buffer */ + ); + +/* + * Type of generic function which decodes the byte stream into the structure. + */ +typedef asn_dec_rval_t(oer_type_decoder_f)( + const struct asn_codec_ctx_s *opt_codec_ctx, + const struct asn_TYPE_descriptor_s *type_descriptor, + const asn_oer_constraints_t *constraints, + void **struct_ptr, + const void *buf_ptr, + size_t size); + +/* + * Swallow the Open Type (X.696 (08/2015), #30) into /dev/null. + * RETURN VALUES: + * -1: Fatal error deciphering length. + * 0: More data expected than bufptr contains. + * >0: Number of bytes used from bufptr. + */ +ssize_t oer_open_type_skip(const void *bufptr, size_t size); + +/* + * Read the Open Type (X.696 (08/2015), #30). + * RETURN VALUES: + * 0: More data expected than bufptr contains. + * -1: Fatal error deciphering length. + * >0: Number of bytes used from bufptr. + */ +ssize_t oer_open_type_get(const asn_codec_ctx_t *opt_codec_ctx, + const struct asn_TYPE_descriptor_s *td, + const asn_oer_constraints_t *constraints, + void **struct_ptr, const void *bufptr, size_t size); + +/* + * Length-prefixed buffer decoding for primitive types. + */ +oer_type_decoder_f oer_decode_primitive; + + +#ifdef __cplusplus +} +#endif + +#endif /* OER_DECODER_H */ diff --git a/certgen/asncodec/oer_encoder.c b/certgen/asncodec/oer_encoder.c index a284cc2f39789b4e6f709ddc3ecc3d37909b08b3..a914b9a3cf20ce98f835524bc2261131dc8e7b14 100644 --- a/certgen/asncodec/oer_encoder.c +++ b/certgen/asncodec/oer_encoder.c @@ -1,141 +1,141 @@ -/* - * Copyright (c) 2017 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include - -/* - * The OER encoder of any type. - */ -asn_enc_rval_t -oer_encode(const asn_TYPE_descriptor_t *type_descriptor, const void *struct_ptr, - asn_app_consume_bytes_f *consume_bytes, void *app_key) { - ASN_DEBUG("OER encoder invoked for %s", type_descriptor->name); - - /* - * Invoke type-specific encoder. - */ - return type_descriptor->op->oer_encoder( - type_descriptor, 0, - struct_ptr, /* Pointer to the destination structure */ - consume_bytes, app_key); -} - -/* - * Argument type and callback necessary for oer_encode_to_buffer(). - */ -typedef struct enc_to_buf_arg { - void *buffer; - size_t left; -} enc_to_buf_arg; -static int -encode_to_buffer_cb(const void *buffer, size_t size, void *key) { - enc_to_buf_arg *arg = (enc_to_buf_arg *)key; - - if(arg->left < size) return -1; /* Data exceeds the available buffer size */ - - memcpy(arg->buffer, buffer, size); - arg->buffer = ((char *)arg->buffer) + size; - arg->left -= size; - - return 0; -} - -/* - * A variant of the oer_encode() which encodes the data into the provided buffer - */ -asn_enc_rval_t -oer_encode_to_buffer(const asn_TYPE_descriptor_t *type_descriptor, - const asn_oer_constraints_t *constraints, - const void *struct_ptr, /* Structure to be encoded */ - void *buffer, /* Pre-allocated buffer */ - size_t buffer_size /* Initial buffer size (maximum) */ -) { - enc_to_buf_arg arg; - asn_enc_rval_t ec; - - arg.buffer = buffer; - arg.left = buffer_size; - - if(type_descriptor->op->oer_encoder == NULL) { - ec.encoded = -1; - ec.failed_type = type_descriptor; - ec.structure_ptr = struct_ptr; - ASN_DEBUG("OER encoder is not defined for %s", - type_descriptor->name); - } else { - ec = type_descriptor->op->oer_encoder( - type_descriptor, constraints, - struct_ptr, /* Pointer to the destination structure */ - encode_to_buffer_cb, &arg); - if(ec.encoded != -1) { - assert(ec.encoded == (ssize_t)(buffer_size - arg.left)); - /* Return the encoded contents size */ - } - } - return ec; -} - -asn_enc_rval_t -oer_encode_primitive(const asn_TYPE_descriptor_t *td, - const asn_oer_constraints_t *constraints, const void *sptr, - asn_app_consume_bytes_f *cb, void *app_key) { - const ASN__PRIMITIVE_TYPE_t *st = (const ASN__PRIMITIVE_TYPE_t *)sptr; - asn_enc_rval_t er = {0, 0, 0}; - ssize_t ret; - - (void)constraints; - - if(!st) ASN__ENCODE_FAILED; - - ASN_DEBUG("Encoding %s (%" ASN_PRI_SIZE " bytes)", td ? td->name : "", st->size); - - /* - * X.696 (08/2015) #27.2 - */ - ret = oer_serialize_length(st->size, cb, app_key); - if(ret < 0) { - ASN__ENCODE_FAILED; - } - er.encoded += ret; - - er.encoded += st->size; - if(cb(st->buf, st->size, app_key) < 0) { - ASN__ENCODE_FAILED; - } else { - ASN__ENCODED_OK(er); - } -} - -static int -oer__count_bytes(const void *buffer, size_t size, void *bytes_ptr) { - size_t *bytes = bytes_ptr; - (void)buffer; - *bytes += size; - return 0; -} - -ssize_t -oer_open_type_put(const asn_TYPE_descriptor_t *td, - const asn_oer_constraints_t *constraints, const void *sptr, - asn_app_consume_bytes_f *cb, void *app_key) { - size_t serialized_byte_count = 0; - asn_enc_rval_t er = {0,0,0}; - ssize_t len_len; - - er = td->op->oer_encoder(td, constraints, sptr, oer__count_bytes, - &serialized_byte_count); - if(er.encoded < 0) return -1; - assert(serialized_byte_count == (size_t)er.encoded); - - len_len = oer_serialize_length(serialized_byte_count, cb, app_key); - if(len_len == -1) return -1; - - er = td->op->oer_encoder(td, constraints, sptr, cb, app_key); - if(er.encoded < 0) return -1; - assert(serialized_byte_count == (size_t)er.encoded); - - return len_len + er.encoded; -} - +/* + * Copyright (c) 2017 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include + +/* + * The OER encoder of any type. + */ +asn_enc_rval_t +oer_encode(const asn_TYPE_descriptor_t *type_descriptor, const void *struct_ptr, + asn_app_consume_bytes_f *consume_bytes, void *app_key) { + ASN_DEBUG("OER encoder invoked for %s", type_descriptor->name); + + /* + * Invoke type-specific encoder. + */ + return type_descriptor->op->oer_encoder( + type_descriptor, 0, + struct_ptr, /* Pointer to the destination structure */ + consume_bytes, app_key); +} + +/* + * Argument type and callback necessary for oer_encode_to_buffer(). + */ +typedef struct enc_to_buf_arg { + void *buffer; + size_t left; +} enc_to_buf_arg; +static int +encode_to_buffer_cb(const void *buffer, size_t size, void *key) { + enc_to_buf_arg *arg = (enc_to_buf_arg *)key; + + if(arg->left < size) return -1; /* Data exceeds the available buffer size */ + + memcpy(arg->buffer, buffer, size); + arg->buffer = ((char *)arg->buffer) + size; + arg->left -= size; + + return 0; +} + +/* + * A variant of the oer_encode() which encodes the data into the provided buffer + */ +asn_enc_rval_t +oer_encode_to_buffer(const asn_TYPE_descriptor_t *type_descriptor, + const asn_oer_constraints_t *constraints, + const void *struct_ptr, /* Structure to be encoded */ + void *buffer, /* Pre-allocated buffer */ + size_t buffer_size /* Initial buffer size (maximum) */ +) { + enc_to_buf_arg arg; + asn_enc_rval_t ec; + + arg.buffer = buffer; + arg.left = buffer_size; + + if(type_descriptor->op->oer_encoder == NULL) { + ec.encoded = -1; + ec.failed_type = type_descriptor; + ec.structure_ptr = struct_ptr; + ASN_DEBUG("OER encoder is not defined for %s", + type_descriptor->name); + } else { + ec = type_descriptor->op->oer_encoder( + type_descriptor, constraints, + struct_ptr, /* Pointer to the destination structure */ + encode_to_buffer_cb, &arg); + if(ec.encoded != -1) { + assert(ec.encoded == (ssize_t)(buffer_size - arg.left)); + /* Return the encoded contents size */ + } + } + return ec; +} + +asn_enc_rval_t +oer_encode_primitive(const asn_TYPE_descriptor_t *td, + const asn_oer_constraints_t *constraints, const void *sptr, + asn_app_consume_bytes_f *cb, void *app_key) { + const ASN__PRIMITIVE_TYPE_t *st = (const ASN__PRIMITIVE_TYPE_t *)sptr; + asn_enc_rval_t er = {0, 0, 0}; + ssize_t ret; + + (void)constraints; + + if(!st) ASN__ENCODE_FAILED; + + ASN_DEBUG("Encoding %s (%" ASN_PRI_SIZE " bytes)", td ? td->name : "", st->size); + + /* + * X.696 (08/2015) #27.2 + */ + ret = oer_serialize_length(st->size, cb, app_key); + if(ret < 0) { + ASN__ENCODE_FAILED; + } + er.encoded += ret; + + er.encoded += st->size; + if(cb(st->buf, st->size, app_key) < 0) { + ASN__ENCODE_FAILED; + } else { + ASN__ENCODED_OK(er); + } +} + +static int +oer__count_bytes(const void *buffer, size_t size, void *bytes_ptr) { + size_t *bytes = bytes_ptr; + (void)buffer; + *bytes += size; + return 0; +} + +ssize_t +oer_open_type_put(const asn_TYPE_descriptor_t *td, + const asn_oer_constraints_t *constraints, const void *sptr, + asn_app_consume_bytes_f *cb, void *app_key) { + size_t serialized_byte_count = 0; + asn_enc_rval_t er = {0,0,0}; + ssize_t len_len; + + er = td->op->oer_encoder(td, constraints, sptr, oer__count_bytes, + &serialized_byte_count); + if(er.encoded < 0) return -1; + assert(serialized_byte_count == (size_t)er.encoded); + + len_len = oer_serialize_length(serialized_byte_count, cb, app_key); + if(len_len == -1) return -1; + + er = td->op->oer_encoder(td, constraints, sptr, cb, app_key); + if(er.encoded < 0) return -1; + assert(serialized_byte_count == (size_t)er.encoded); + + return len_len + er.encoded; +} + diff --git a/certgen/asncodec/oer_encoder.h b/certgen/asncodec/oer_encoder.h index 6a7b68125c42f68e87d509cde15e032d9e9b684d..de6df1a10162205a511b5615e082ee002e653ffe 100644 --- a/certgen/asncodec/oer_encoder.h +++ b/certgen/asncodec/oer_encoder.h @@ -1,70 +1,70 @@ -/* - * Copyright (c) 2017 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#ifndef OER_ENCODER_H -#define OER_ENCODER_H - -#include - -#ifdef __cplusplus -extern "C" { -#endif - -struct asn_TYPE_descriptor_s; /* Forward declaration */ - -/* - * The Octet Encoding Rules (OER, X.696 08/2015) encoder for any type. - * This function may be invoked directly by the application. - * Produces CANONICAL-OER output compatible with CANONICAL-OER - * and BASIC-OER decoders. - */ -asn_enc_rval_t oer_encode(const struct asn_TYPE_descriptor_s *type_descriptor, - const void *struct_ptr, /* Structure to be encoded */ - asn_app_consume_bytes_f *consume_bytes_cb, - void *app_key /* Arbitrary callback argument */ -); - -/* A variant of oer_encode() which encodes data into the pre-allocated buffer */ -asn_enc_rval_t oer_encode_to_buffer( - const struct asn_TYPE_descriptor_s *type_descriptor, - const asn_oer_constraints_t *constraints, - const void *struct_ptr, /* Structure to be encoded */ - void *buffer, /* Pre-allocated buffer */ - size_t buffer_size /* Initial buffer size (maximum) */ -); - -/* - * Type of the generic OER encoder. - */ -typedef asn_enc_rval_t(oer_type_encoder_f)( - const struct asn_TYPE_descriptor_s *type_descriptor, - const asn_oer_constraints_t *constraints, - const void *struct_ptr, /* Structure to be encoded */ - asn_app_consume_bytes_f *consume_bytes_cb, /* Callback */ - void *app_key /* Arbitrary callback argument */ -); - -/* - * Write out the Open Type (X.696 (08/2015), #30). - * RETURN VALUES: - * -1: Fatal error encoding the type. - * >0: Number of bytes serialized. - */ -ssize_t oer_open_type_put(const struct asn_TYPE_descriptor_s *td, - const asn_oer_constraints_t *constraints, - const void *struct_ptr, - asn_app_consume_bytes_f *consume_bytes_cb, - void *app_key); - - -/* - * Length-prefixed buffer encoding for primitive types. - */ -oer_type_encoder_f oer_encode_primitive; - -#ifdef __cplusplus -} -#endif - -#endif /* OER_ENCODER_H */ +/* + * Copyright (c) 2017 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#ifndef OER_ENCODER_H +#define OER_ENCODER_H + +#include + +#ifdef __cplusplus +extern "C" { +#endif + +struct asn_TYPE_descriptor_s; /* Forward declaration */ + +/* + * The Octet Encoding Rules (OER, X.696 08/2015) encoder for any type. + * This function may be invoked directly by the application. + * Produces CANONICAL-OER output compatible with CANONICAL-OER + * and BASIC-OER decoders. + */ +asn_enc_rval_t oer_encode(const struct asn_TYPE_descriptor_s *type_descriptor, + const void *struct_ptr, /* Structure to be encoded */ + asn_app_consume_bytes_f *consume_bytes_cb, + void *app_key /* Arbitrary callback argument */ +); + +/* A variant of oer_encode() which encodes data into the pre-allocated buffer */ +asn_enc_rval_t oer_encode_to_buffer( + const struct asn_TYPE_descriptor_s *type_descriptor, + const asn_oer_constraints_t *constraints, + const void *struct_ptr, /* Structure to be encoded */ + void *buffer, /* Pre-allocated buffer */ + size_t buffer_size /* Initial buffer size (maximum) */ +); + +/* + * Type of the generic OER encoder. + */ +typedef asn_enc_rval_t(oer_type_encoder_f)( + const struct asn_TYPE_descriptor_s *type_descriptor, + const asn_oer_constraints_t *constraints, + const void *struct_ptr, /* Structure to be encoded */ + asn_app_consume_bytes_f *consume_bytes_cb, /* Callback */ + void *app_key /* Arbitrary callback argument */ +); + +/* + * Write out the Open Type (X.696 (08/2015), #30). + * RETURN VALUES: + * -1: Fatal error encoding the type. + * >0: Number of bytes serialized. + */ +ssize_t oer_open_type_put(const struct asn_TYPE_descriptor_s *td, + const asn_oer_constraints_t *constraints, + const void *struct_ptr, + asn_app_consume_bytes_f *consume_bytes_cb, + void *app_key); + + +/* + * Length-prefixed buffer encoding for primitive types. + */ +oer_type_encoder_f oer_encode_primitive; + +#ifdef __cplusplus +} +#endif + +#endif /* OER_ENCODER_H */ diff --git a/certgen/asncodec/oer_support.c b/certgen/asncodec/oer_support.c index b15a3bc93975ab8c68c93403e602069b2e149d72..79bd160c352718485ac97de5819b2bea99383bbe 100644 --- a/certgen/asncodec/oer_support.c +++ b/certgen/asncodec/oer_support.c @@ -1,122 +1,122 @@ -/* - * Copyright (c) 2017 Lev Walkin . - * All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include - -#include - -/* - * Fetch the length determinant (X.696 08/2015, #8.6) into *len_r. - * RETURN VALUES: - * 0: More data expected than bufptr contains. - * -1: Fatal error deciphering length. - * >0: Number of bytes used from bufptr. - */ -ssize_t -oer_fetch_length(const void *bufptr, size_t size, size_t *len_r) { - uint8_t first_byte; - size_t len_len; /* Length of the length determinant */ - const uint8_t *b; - const uint8_t *bend; - size_t len; - - if(size == 0) { - *len_r = 0; - return 0; - } - - first_byte = *(const uint8_t *)bufptr; - if((first_byte & 0x80) == 0) { /* Short form */ - *len_r = first_byte; /* 0..127 */ - return 1; - } - - len_len = (first_byte & 0x7f); - if((1 + len_len) > size) { - *len_r = 0; - return 0; - } - - b = (const uint8_t *)bufptr + 1; - bend = b + len_len; - - for(; b < bend && *b == 0; b++) { - /* Skip the leading 0-bytes */ - } - - if((bend - b) > (ssize_t)sizeof(size_t)) { - /* Length is not representable by the native size_t type */ - *len_r = 0; - return -1; - } - - for(len = 0; b < bend; b++) { - len = (len << 8) + *b; - } - - if(len > RSIZE_MAX) { /* A bit of C11 validation */ - *len_r = 0; - return -1; - } - - *len_r = len; - assert(len_len + 1 == (size_t)(bend - (const uint8_t *)bufptr)); - return len_len + 1; -} - - -/* - * Serialize OER length. Returns the number of bytes serialized - * or -1 if a given callback returned with negative result. - */ -ssize_t -oer_serialize_length(size_t length, asn_app_consume_bytes_f *cb, - void *app_key) { - uint8_t scratch[1 + sizeof(length)]; - uint8_t *sp = scratch; - int littleEndian = 1; /* Run-time detection */ - const uint8_t *pstart; - const uint8_t *pend; - const uint8_t *p; - int add; - - if(length <= 127) { - uint8_t b = length; - if(cb(&b, 1, app_key) < 0) { - return -1; - } - return 1; - } - - if(*(char *)&littleEndian) { - pstart = (const uint8_t *)&length + sizeof(length) - 1; - pend = (const uint8_t *)&length; - add = -1; - } else { - pstart = (const uint8_t *)&length; - pend = pstart + sizeof(length); - add = 1; - } - - for(p = pstart; p != pend; p += add) { - /* Skip leading zeros. */ - if(*p) break; - } - - for(sp = scratch + 1; ; p += add) { - *sp++ = *p; - if(p == pend) break; - } - assert((sp - scratch) - 1 <= 0x7f); - scratch[0] = 0x80 + ((sp - scratch) - 1); - - if(cb(scratch, sp - scratch, app_key) < 0) { - return -1; - } - - return sp - scratch; -} - +/* + * Copyright (c) 2017 Lev Walkin . + * All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include + +#include + +/* + * Fetch the length determinant (X.696 08/2015, #8.6) into *len_r. + * RETURN VALUES: + * 0: More data expected than bufptr contains. + * -1: Fatal error deciphering length. + * >0: Number of bytes used from bufptr. + */ +ssize_t +oer_fetch_length(const void *bufptr, size_t size, size_t *len_r) { + uint8_t first_byte; + size_t len_len; /* Length of the length determinant */ + const uint8_t *b; + const uint8_t *bend; + size_t len; + + if(size == 0) { + *len_r = 0; + return 0; + } + + first_byte = *(const uint8_t *)bufptr; + if((first_byte & 0x80) == 0) { /* Short form */ + *len_r = first_byte; /* 0..127 */ + return 1; + } + + len_len = (first_byte & 0x7f); + if((1 + len_len) > size) { + *len_r = 0; + return 0; + } + + b = (const uint8_t *)bufptr + 1; + bend = b + len_len; + + for(; b < bend && *b == 0; b++) { + /* Skip the leading 0-bytes */ + } + + if((bend - b) > (ssize_t)sizeof(size_t)) { + /* Length is not representable by the native size_t type */ + *len_r = 0; + return -1; + } + + for(len = 0; b < bend; b++) { + len = (len << 8) + *b; + } + + if(len > RSIZE_MAX) { /* A bit of C11 validation */ + *len_r = 0; + return -1; + } + + *len_r = len; + assert(len_len + 1 == (size_t)(bend - (const uint8_t *)bufptr)); + return len_len + 1; +} + + +/* + * Serialize OER length. Returns the number of bytes serialized + * or -1 if a given callback returned with negative result. + */ +ssize_t +oer_serialize_length(size_t length, asn_app_consume_bytes_f *cb, + void *app_key) { + uint8_t scratch[1 + sizeof(length)]; + uint8_t *sp = scratch; + int littleEndian = 1; /* Run-time detection */ + const uint8_t *pstart; + const uint8_t *pend; + const uint8_t *p; + int add; + + if(length <= 127) { + uint8_t b = length; + if(cb(&b, 1, app_key) < 0) { + return -1; + } + return 1; + } + + if(*(char *)&littleEndian) { + pstart = (const uint8_t *)&length + sizeof(length) - 1; + pend = (const uint8_t *)&length; + add = -1; + } else { + pstart = (const uint8_t *)&length; + pend = pstart + sizeof(length); + add = 1; + } + + for(p = pstart; p != pend; p += add) { + /* Skip leading zeros. */ + if(*p) break; + } + + for(sp = scratch + 1; ; p += add) { + *sp++ = *p; + if(p == pend) break; + } + assert((sp - scratch) - 1 <= 0x7f); + scratch[0] = 0x80 + ((sp - scratch) - 1); + + if(cb(scratch, sp - scratch, app_key) < 0) { + return -1; + } + + return sp - scratch; +} + diff --git a/certgen/asncodec/oer_support.h b/certgen/asncodec/oer_support.h index dbc9b5fcff51a184b7fb7937cd4353592d0f6156..7b5e83ed37ef66b467608b8dfecfc399184dfb3c 100644 --- a/certgen/asncodec/oer_support.h +++ b/certgen/asncodec/oer_support.h @@ -1,47 +1,47 @@ -/* - * Copyright (c) 2017 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#ifndef OER_SUPPORT_H -#define OER_SUPPORT_H - -#include /* Platform-specific types */ - -#ifdef __cplusplus -extern "C" { -#endif - -/* - * Pre-computed OER constraints. - */ -typedef struct asn_oer_constraint_number_s { - unsigned width; /* ±8,4,2,1 fixed bytes */ - unsigned positive; /* 1 for unsigned number, 0 for signed */ -} asn_oer_constraint_number_t; -typedef struct asn_oer_constraints_s { - asn_oer_constraint_number_t value; - ssize_t size; /* -1 (no constraint) or >= 0 */ -} asn_oer_constraints_t; - - -/* - * Fetch the length determinant (X.696 (08/2015), #8.6) into *len_r. - * RETURN VALUES: - * 0: More data expected than bufptr contains. - * -1: Fatal error deciphering length. - * >0: Number of bytes used from bufptr. - */ -ssize_t oer_fetch_length(const void *bufptr, size_t size, size_t *len_r); - -/* - * Serialize OER length. Returns the number of bytes serialized - * or -1 if a given callback returned with negative result. - */ -ssize_t oer_serialize_length(size_t length, asn_app_consume_bytes_f *cb, void *app_key); - - -#ifdef __cplusplus -} -#endif - -#endif /* OER_SUPPORT_H */ +/* + * Copyright (c) 2017 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#ifndef OER_SUPPORT_H +#define OER_SUPPORT_H + +#include /* Platform-specific types */ + +#ifdef __cplusplus +extern "C" { +#endif + +/* + * Pre-computed OER constraints. + */ +typedef struct asn_oer_constraint_number_s { + unsigned width; /* ±8,4,2,1 fixed bytes */ + unsigned positive; /* 1 for unsigned number, 0 for signed */ +} asn_oer_constraint_number_t; +typedef struct asn_oer_constraints_s { + asn_oer_constraint_number_t value; + ssize_t size; /* -1 (no constraint) or >= 0 */ +} asn_oer_constraints_t; + + +/* + * Fetch the length determinant (X.696 (08/2015), #8.6) into *len_r. + * RETURN VALUES: + * 0: More data expected than bufptr contains. + * -1: Fatal error deciphering length. + * >0: Number of bytes used from bufptr. + */ +ssize_t oer_fetch_length(const void *bufptr, size_t size, size_t *len_r); + +/* + * Serialize OER length. Returns the number of bytes serialized + * or -1 if a given callback returned with negative result. + */ +ssize_t oer_serialize_length(size_t length, asn_app_consume_bytes_f *cb, void *app_key); + + +#ifdef __cplusplus +} +#endif + +#endif /* OER_SUPPORT_H */ diff --git a/certgen/asncodec/xer_decoder.c b/certgen/asncodec/xer_decoder.c index 2a14557a677ab78c612efbad8d1f0ac699aaba94..e54d25fd24ec9e306fe088fa04e7db066a81e93a 100644 --- a/certgen/asncodec/xer_decoder.c +++ b/certgen/asncodec/xer_decoder.c @@ -1,369 +1,369 @@ -/* - * Copyright (c) 2004-2017 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include -#include /* XER/XML parsing support */ - - -/* - * Decode the XER encoding of a given type. - */ -asn_dec_rval_t -xer_decode(const asn_codec_ctx_t *opt_codec_ctx, - const asn_TYPE_descriptor_t *td, void **struct_ptr, - const void *buffer, size_t size) { - asn_codec_ctx_t s_codec_ctx; - - /* - * Stack checker requires that the codec context - * must be allocated on the stack. - */ - if(opt_codec_ctx) { - if(opt_codec_ctx->max_stack_size) { - s_codec_ctx = *opt_codec_ctx; - opt_codec_ctx = &s_codec_ctx; - } - } else { - /* If context is not given, be security-conscious anyway */ - memset(&s_codec_ctx, 0, sizeof(s_codec_ctx)); - s_codec_ctx.max_stack_size = ASN__DEFAULT_STACK_MAX; - opt_codec_ctx = &s_codec_ctx; - } - - /* - * Invoke type-specific decoder. - */ - return td->op->xer_decoder(opt_codec_ctx, td, struct_ptr, 0, buffer, size); -} - - - -struct xer__cb_arg { - pxml_chunk_type_e chunk_type; - size_t chunk_size; - const void *chunk_buf; - int callback_not_invoked; -}; - -static int -xer__token_cb(pxml_chunk_type_e type, const void *_chunk_data, size_t _chunk_size, void *key) { - struct xer__cb_arg *arg = (struct xer__cb_arg *)key; - arg->chunk_type = type; - arg->chunk_size = _chunk_size; - arg->chunk_buf = _chunk_data; - arg->callback_not_invoked = 0; - return -1; /* Terminate the XML parsing */ -} - -/* - * Fetch the next token from the XER/XML stream. - */ -ssize_t -xer_next_token(int *stateContext, const void *buffer, size_t size, pxer_chunk_type_e *ch_type) { - struct xer__cb_arg arg; - int new_stateContext = *stateContext; - ssize_t ret; - - arg.callback_not_invoked = 1; - ret = pxml_parse(&new_stateContext, buffer, size, xer__token_cb, &arg); - if(ret < 0) return -1; - if(arg.callback_not_invoked) { - assert(ret == 0); /* No data was consumed */ - *ch_type = PXER_WMORE; - return 0; /* Try again with more data */ - } else { - assert(arg.chunk_size); - assert(arg.chunk_buf == buffer); - } - - /* - * Translate the XML chunk types into more convenient ones. - */ - switch(arg.chunk_type) { - case PXML_TEXT: - *ch_type = PXER_TEXT; - break; - case PXML_TAG: - *ch_type = PXER_WMORE; - return 0; /* Want more */ - case PXML_TAG_END: - *ch_type = PXER_TAG; - break; - case PXML_COMMENT: - case PXML_COMMENT_END: - *ch_type = PXER_COMMENT; - break; - } - - *stateContext = new_stateContext; - return arg.chunk_size; -} - -#define CSLASH 0x2f /* '/' */ -#define LANGLE 0x3c /* '<' */ -#define RANGLE 0x3e /* '>' */ - -xer_check_tag_e -xer_check_tag(const void *buf_ptr, int size, const char *need_tag) { - const char *buf = (const char *)buf_ptr; - const char *end; - xer_check_tag_e ct = XCT_OPENING; - - if(size < 2 || buf[0] != LANGLE || buf[size-1] != RANGLE) { - if(size >= 2) - ASN_DEBUG("Broken XML tag: \"%c...%c\"", - buf[0], buf[size - 1]); - return XCT_BROKEN; - } - - /* - * Determine the tag class. - */ - if(buf[1] == CSLASH) { - buf += 2; /* advance past "" */ - ct = XCT_CLOSING; - if(size > 0 && buf[size-1] == CSLASH) - return XCT_BROKEN; /* */ - } else { - buf++; /* advance past "<" */ - size -= 2; /* strip "<" and ">" */ - if(size > 0 && buf[size-1] == CSLASH) { - ct = XCT_BOTH; - size--; /* One more, for "/" */ - } - } - - /* Sometimes we don't care about the tag */ - if(!need_tag || !*need_tag) - return (xer_check_tag_e)(XCT__UNK__MASK | ct); - - /* - * Determine the tag name. - */ - for(end = buf + size; buf < end; buf++, need_tag++) { - int b = *buf, n = *need_tag; - if(b != n) { - if(n == 0) { - switch(b) { - case 0x09: case 0x0a: case 0x0c: case 0x0d: - case 0x20: - /* "": whitespace is normal */ - return ct; - } - } - return (xer_check_tag_e)(XCT__UNK__MASK | ct); - } - if(b == 0) - return XCT_BROKEN; /* Embedded 0 in buf?! */ - } - if(*need_tag) - return (xer_check_tag_e)(XCT__UNK__MASK | ct); - - return ct; -} - - -#undef ADVANCE -#define ADVANCE(num_bytes) do { \ - size_t num = (num_bytes); \ - buf_ptr = ((const char *)buf_ptr) + num; \ - size -= num; \ - consumed_myself += num; \ - } while(0) - -#undef RETURN -#define RETURN(_code) do { \ - rval.code = _code; \ - rval.consumed = consumed_myself; \ - if(rval.code != RC_OK) \ - ASN_DEBUG("Failed with %d", rval.code); \ - return rval; \ - } while(0) - -#define XER_GOT_BODY(chunk_buf, chunk_size, size) do { \ - ssize_t converted_size = body_receiver \ - (struct_key, chunk_buf, chunk_size, \ - (size_t)chunk_size < size); \ - if(converted_size == -1) RETURN(RC_FAIL); \ - if(converted_size == 0 \ - && size == (size_t)chunk_size) \ - RETURN(RC_WMORE); \ - chunk_size = converted_size; \ - } while(0) -#define XER_GOT_EMPTY() do { \ - if(body_receiver(struct_key, 0, 0, size > 0) == -1) \ - RETURN(RC_FAIL); \ - } while(0) - -/* - * Generalized function for decoding the primitive values. - */ -asn_dec_rval_t -xer_decode_general(const asn_codec_ctx_t *opt_codec_ctx, - asn_struct_ctx_t *ctx, /* Type decoder context */ - void *struct_key, - const char *xml_tag, /* Expected XML tag */ - const void *buf_ptr, size_t size, - int (*opt_unexpected_tag_decoder) - (void *struct_key, const void *chunk_buf, size_t chunk_size), - ssize_t (*body_receiver) - (void *struct_key, const void *chunk_buf, size_t chunk_size, - int have_more) - ) { - - asn_dec_rval_t rval; - ssize_t consumed_myself = 0; - - (void)opt_codec_ctx; - - /* - * Phases of XER/XML processing: - * Phase 0: Check that the opening tag matches our expectations. - * Phase 1: Processing body and reacting on closing tag. - */ - if(ctx->phase > 1) RETURN(RC_FAIL); - for(;;) { - pxer_chunk_type_e ch_type; /* XER chunk type */ - ssize_t ch_size; /* Chunk size */ - xer_check_tag_e tcv; /* Tag check value */ - - /* - * Get the next part of the XML stream. - */ - ch_size = xer_next_token(&ctx->context, buf_ptr, size, - &ch_type); - if(ch_size == -1) { - RETURN(RC_FAIL); - } else { - switch(ch_type) { - case PXER_WMORE: - RETURN(RC_WMORE); - case PXER_COMMENT: /* Got XML comment */ - ADVANCE(ch_size); /* Skip silently */ - continue; - case PXER_TEXT: - if(ctx->phase == 0) { - /* - * We have to ignore whitespace here, - * but in order to be forward compatible - * with EXTENDED-XER (EMBED-VALUES, #25) - * any text is just ignored here. - */ - } else { - XER_GOT_BODY(buf_ptr, ch_size, size); - } - ADVANCE(ch_size); - continue; - case PXER_TAG: - break; /* Check the rest down there */ - } - } - - assert(ch_type == PXER_TAG && size); - - tcv = xer_check_tag(buf_ptr, ch_size, xml_tag); - /* - * Phase 0: - * Expecting the opening tag - * for the type being processed. - * Phase 1: - * Waiting for the closing XML tag. - */ - switch(tcv) { - case XCT_BOTH: - if(ctx->phase) break; - /* Finished decoding of an empty element */ - XER_GOT_EMPTY(); - ADVANCE(ch_size); - ctx->phase = 2; /* Phase out */ - RETURN(RC_OK); - case XCT_OPENING: - if(ctx->phase) break; - ADVANCE(ch_size); - ctx->phase = 1; /* Processing body phase */ - continue; - case XCT_CLOSING: - if(!ctx->phase) break; - ADVANCE(ch_size); - ctx->phase = 2; /* Phase out */ - RETURN(RC_OK); - case XCT_UNKNOWN_BO: - /* - * Certain tags in the body may be expected. - */ - if(opt_unexpected_tag_decoder - && opt_unexpected_tag_decoder(struct_key, - buf_ptr, ch_size) >= 0) { - /* Tag's processed fine */ - ADVANCE(ch_size); - if(!ctx->phase) { - /* We are not expecting - * the closing tag anymore. */ - ctx->phase = 2; /* Phase out */ - RETURN(RC_OK); - } - continue; - } - /* Fall through */ - default: - break; /* Unexpected tag */ - } - - ASN_DEBUG("Unexpected XML tag (expected \"%s\")", xml_tag); - break; /* Dark and mysterious things have just happened */ - } - - RETURN(RC_FAIL); -} - - -size_t -xer_whitespace_span(const void *chunk_buf, size_t chunk_size) { - const char *p = (const char *)chunk_buf; - const char *pend = (p == NULL)? NULL : p + chunk_size; - - for(; p < pend; p++) { - switch(*p) { - /* X.693, #8.1.4 - * HORISONTAL TAB (9) - * LINE FEED (10) - * CARRIAGE RETURN (13) - * SPACE (32) - */ - case 0x09: case 0x0a: case 0x0d: case 0x20: - continue; - default: - break; - } - break; - } - return (p - (const char *)chunk_buf); -} - -/* - * This is a vastly simplified, non-validating XML tree skipper. - */ -int -xer_skip_unknown(xer_check_tag_e tcv, ber_tlv_len_t *depth) { - assert(*depth > 0); - switch(tcv) { - case XCT_BOTH: - case XCT_UNKNOWN_BO: - /* These negate each other. */ - return 0; - case XCT_OPENING: - case XCT_UNKNOWN_OP: - ++(*depth); - return 0; - case XCT_CLOSING: - case XCT_UNKNOWN_CL: - if(--(*depth) == 0) - return (tcv == XCT_CLOSING) ? 2 : 1; - return 0; - default: - return -1; - } -} +/* + * Copyright (c) 2004-2017 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include +#include /* XER/XML parsing support */ + + +/* + * Decode the XER encoding of a given type. + */ +asn_dec_rval_t +xer_decode(const asn_codec_ctx_t *opt_codec_ctx, + const asn_TYPE_descriptor_t *td, void **struct_ptr, + const void *buffer, size_t size) { + asn_codec_ctx_t s_codec_ctx; + + /* + * Stack checker requires that the codec context + * must be allocated on the stack. + */ + if(opt_codec_ctx) { + if(opt_codec_ctx->max_stack_size) { + s_codec_ctx = *opt_codec_ctx; + opt_codec_ctx = &s_codec_ctx; + } + } else { + /* If context is not given, be security-conscious anyway */ + memset(&s_codec_ctx, 0, sizeof(s_codec_ctx)); + s_codec_ctx.max_stack_size = ASN__DEFAULT_STACK_MAX; + opt_codec_ctx = &s_codec_ctx; + } + + /* + * Invoke type-specific decoder. + */ + return td->op->xer_decoder(opt_codec_ctx, td, struct_ptr, 0, buffer, size); +} + + + +struct xer__cb_arg { + pxml_chunk_type_e chunk_type; + size_t chunk_size; + const void *chunk_buf; + int callback_not_invoked; +}; + +static int +xer__token_cb(pxml_chunk_type_e type, const void *_chunk_data, size_t _chunk_size, void *key) { + struct xer__cb_arg *arg = (struct xer__cb_arg *)key; + arg->chunk_type = type; + arg->chunk_size = _chunk_size; + arg->chunk_buf = _chunk_data; + arg->callback_not_invoked = 0; + return -1; /* Terminate the XML parsing */ +} + +/* + * Fetch the next token from the XER/XML stream. + */ +ssize_t +xer_next_token(int *stateContext, const void *buffer, size_t size, pxer_chunk_type_e *ch_type) { + struct xer__cb_arg arg; + int new_stateContext = *stateContext; + ssize_t ret; + + arg.callback_not_invoked = 1; + ret = pxml_parse(&new_stateContext, buffer, size, xer__token_cb, &arg); + if(ret < 0) return -1; + if(arg.callback_not_invoked) { + assert(ret == 0); /* No data was consumed */ + *ch_type = PXER_WMORE; + return 0; /* Try again with more data */ + } else { + assert(arg.chunk_size); + assert(arg.chunk_buf == buffer); + } + + /* + * Translate the XML chunk types into more convenient ones. + */ + switch(arg.chunk_type) { + case PXML_TEXT: + *ch_type = PXER_TEXT; + break; + case PXML_TAG: + *ch_type = PXER_WMORE; + return 0; /* Want more */ + case PXML_TAG_END: + *ch_type = PXER_TAG; + break; + case PXML_COMMENT: + case PXML_COMMENT_END: + *ch_type = PXER_COMMENT; + break; + } + + *stateContext = new_stateContext; + return arg.chunk_size; +} + +#define CSLASH 0x2f /* '/' */ +#define LANGLE 0x3c /* '<' */ +#define RANGLE 0x3e /* '>' */ + +xer_check_tag_e +xer_check_tag(const void *buf_ptr, int size, const char *need_tag) { + const char *buf = (const char *)buf_ptr; + const char *end; + xer_check_tag_e ct = XCT_OPENING; + + if(size < 2 || buf[0] != LANGLE || buf[size-1] != RANGLE) { + if(size >= 2) + ASN_DEBUG("Broken XML tag: \"%c...%c\"", + buf[0], buf[size - 1]); + return XCT_BROKEN; + } + + /* + * Determine the tag class. + */ + if(buf[1] == CSLASH) { + buf += 2; /* advance past "" */ + ct = XCT_CLOSING; + if(size > 0 && buf[size-1] == CSLASH) + return XCT_BROKEN; /* */ + } else { + buf++; /* advance past "<" */ + size -= 2; /* strip "<" and ">" */ + if(size > 0 && buf[size-1] == CSLASH) { + ct = XCT_BOTH; + size--; /* One more, for "/" */ + } + } + + /* Sometimes we don't care about the tag */ + if(!need_tag || !*need_tag) + return (xer_check_tag_e)(XCT__UNK__MASK | ct); + + /* + * Determine the tag name. + */ + for(end = buf + size; buf < end; buf++, need_tag++) { + int b = *buf, n = *need_tag; + if(b != n) { + if(n == 0) { + switch(b) { + case 0x09: case 0x0a: case 0x0c: case 0x0d: + case 0x20: + /* "": whitespace is normal */ + return ct; + } + } + return (xer_check_tag_e)(XCT__UNK__MASK | ct); + } + if(b == 0) + return XCT_BROKEN; /* Embedded 0 in buf?! */ + } + if(*need_tag) + return (xer_check_tag_e)(XCT__UNK__MASK | ct); + + return ct; +} + + +#undef ADVANCE +#define ADVANCE(num_bytes) do { \ + size_t num = (num_bytes); \ + buf_ptr = ((const char *)buf_ptr) + num; \ + size -= num; \ + consumed_myself += num; \ + } while(0) + +#undef RETURN +#define RETURN(_code) do { \ + rval.code = _code; \ + rval.consumed = consumed_myself; \ + if(rval.code != RC_OK) \ + ASN_DEBUG("Failed with %d", rval.code); \ + return rval; \ + } while(0) + +#define XER_GOT_BODY(chunk_buf, chunk_size, size) do { \ + ssize_t converted_size = body_receiver \ + (struct_key, chunk_buf, chunk_size, \ + (size_t)chunk_size < size); \ + if(converted_size == -1) RETURN(RC_FAIL); \ + if(converted_size == 0 \ + && size == (size_t)chunk_size) \ + RETURN(RC_WMORE); \ + chunk_size = converted_size; \ + } while(0) +#define XER_GOT_EMPTY() do { \ + if(body_receiver(struct_key, 0, 0, size > 0) == -1) \ + RETURN(RC_FAIL); \ + } while(0) + +/* + * Generalized function for decoding the primitive values. + */ +asn_dec_rval_t +xer_decode_general(const asn_codec_ctx_t *opt_codec_ctx, + asn_struct_ctx_t *ctx, /* Type decoder context */ + void *struct_key, + const char *xml_tag, /* Expected XML tag */ + const void *buf_ptr, size_t size, + int (*opt_unexpected_tag_decoder) + (void *struct_key, const void *chunk_buf, size_t chunk_size), + ssize_t (*body_receiver) + (void *struct_key, const void *chunk_buf, size_t chunk_size, + int have_more) + ) { + + asn_dec_rval_t rval; + ssize_t consumed_myself = 0; + + (void)opt_codec_ctx; + + /* + * Phases of XER/XML processing: + * Phase 0: Check that the opening tag matches our expectations. + * Phase 1: Processing body and reacting on closing tag. + */ + if(ctx->phase > 1) RETURN(RC_FAIL); + for(;;) { + pxer_chunk_type_e ch_type; /* XER chunk type */ + ssize_t ch_size; /* Chunk size */ + xer_check_tag_e tcv; /* Tag check value */ + + /* + * Get the next part of the XML stream. + */ + ch_size = xer_next_token(&ctx->context, buf_ptr, size, + &ch_type); + if(ch_size == -1) { + RETURN(RC_FAIL); + } else { + switch(ch_type) { + case PXER_WMORE: + RETURN(RC_WMORE); + case PXER_COMMENT: /* Got XML comment */ + ADVANCE(ch_size); /* Skip silently */ + continue; + case PXER_TEXT: + if(ctx->phase == 0) { + /* + * We have to ignore whitespace here, + * but in order to be forward compatible + * with EXTENDED-XER (EMBED-VALUES, #25) + * any text is just ignored here. + */ + } else { + XER_GOT_BODY(buf_ptr, ch_size, size); + } + ADVANCE(ch_size); + continue; + case PXER_TAG: + break; /* Check the rest down there */ + } + } + + assert(ch_type == PXER_TAG && size); + + tcv = xer_check_tag(buf_ptr, ch_size, xml_tag); + /* + * Phase 0: + * Expecting the opening tag + * for the type being processed. + * Phase 1: + * Waiting for the closing XML tag. + */ + switch(tcv) { + case XCT_BOTH: + if(ctx->phase) break; + /* Finished decoding of an empty element */ + XER_GOT_EMPTY(); + ADVANCE(ch_size); + ctx->phase = 2; /* Phase out */ + RETURN(RC_OK); + case XCT_OPENING: + if(ctx->phase) break; + ADVANCE(ch_size); + ctx->phase = 1; /* Processing body phase */ + continue; + case XCT_CLOSING: + if(!ctx->phase) break; + ADVANCE(ch_size); + ctx->phase = 2; /* Phase out */ + RETURN(RC_OK); + case XCT_UNKNOWN_BO: + /* + * Certain tags in the body may be expected. + */ + if(opt_unexpected_tag_decoder + && opt_unexpected_tag_decoder(struct_key, + buf_ptr, ch_size) >= 0) { + /* Tag's processed fine */ + ADVANCE(ch_size); + if(!ctx->phase) { + /* We are not expecting + * the closing tag anymore. */ + ctx->phase = 2; /* Phase out */ + RETURN(RC_OK); + } + continue; + } + /* Fall through */ + default: + break; /* Unexpected tag */ + } + + ASN_DEBUG("Unexpected XML tag (expected \"%s\")", xml_tag); + break; /* Dark and mysterious things have just happened */ + } + + RETURN(RC_FAIL); +} + + +size_t +xer_whitespace_span(const void *chunk_buf, size_t chunk_size) { + const char *p = (const char *)chunk_buf; + const char *pend = (p == NULL)? NULL : p + chunk_size; + + for(; p < pend; p++) { + switch(*p) { + /* X.693, #8.1.4 + * HORISONTAL TAB (9) + * LINE FEED (10) + * CARRIAGE RETURN (13) + * SPACE (32) + */ + case 0x09: case 0x0a: case 0x0d: case 0x20: + continue; + default: + break; + } + break; + } + return (p - (const char *)chunk_buf); +} + +/* + * This is a vastly simplified, non-validating XML tree skipper. + */ +int +xer_skip_unknown(xer_check_tag_e tcv, ber_tlv_len_t *depth) { + assert(*depth > 0); + switch(tcv) { + case XCT_BOTH: + case XCT_UNKNOWN_BO: + /* These negate each other. */ + return 0; + case XCT_OPENING: + case XCT_UNKNOWN_OP: + ++(*depth); + return 0; + case XCT_CLOSING: + case XCT_UNKNOWN_CL: + if(--(*depth) == 0) + return (tcv == XCT_CLOSING) ? 2 : 1; + return 0; + default: + return -1; + } +} diff --git a/certgen/asncodec/xer_decoder.h b/certgen/asncodec/xer_decoder.h index b951c41d1b48563609822120d262b20add68887a..143a21f0dd50c8ec157dc2bb8113b36dbabf28c9 100644 --- a/certgen/asncodec/xer_decoder.h +++ b/certgen/asncodec/xer_decoder.h @@ -1,106 +1,106 @@ -/*- - * Copyright (c) 2004-2017 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#ifndef _XER_DECODER_H_ -#define _XER_DECODER_H_ - -#include - -#ifdef __cplusplus -extern "C" { -#endif - -struct asn_TYPE_descriptor_s; /* Forward declaration */ - -/* - * The XER decoder of any ASN.1 type. May be invoked by the application. - * Decodes CANONICAL-XER and BASIC-XER. - */ -asn_dec_rval_t xer_decode( - const struct asn_codec_ctx_s *opt_codec_ctx, - const struct asn_TYPE_descriptor_s *type_descriptor, - void **struct_ptr, /* Pointer to a target structure's pointer */ - const void *buffer, /* Data to be decoded */ - size_t size /* Size of data buffer */ -); - -/* - * Type of the type-specific XER decoder function. - */ -typedef asn_dec_rval_t(xer_type_decoder_f)( - const asn_codec_ctx_t *opt_codec_ctx, - const struct asn_TYPE_descriptor_s *type_descriptor, void **struct_ptr, - const char *opt_mname, /* Member name */ - const void *buf_ptr, size_t size); - -/******************************* - * INTERNALLY USEFUL FUNCTIONS * - *******************************/ - -/* - * Generalized function for decoding the primitive values. - * Used by more specialized functions, such as OCTET_STRING_decode_xer_utf8 - * and others. This function should not be used by applications, as its API - * is subject to changes. - */ -asn_dec_rval_t xer_decode_general( - const asn_codec_ctx_t *opt_codec_ctx, - asn_struct_ctx_t *ctx, /* Type decoder context */ - void *struct_key, /* Treated as opaque pointer */ - const char *xml_tag, /* Expected XML tag name */ - const void *buf_ptr, size_t size, - int (*opt_unexpected_tag_decoder)(void *struct_key, const void *chunk_buf, - size_t chunk_size), - ssize_t (*body_receiver)(void *struct_key, const void *chunk_buf, - size_t chunk_size, int have_more)); - - -/* - * Fetch the next XER (XML) token from the stream. - * The function returns the number of bytes occupied by the chunk type, - * returned in the _ch_type. The _ch_type is only set (and valid) when - * the return value is >= 0. - */ - typedef enum pxer_chunk_type { - PXER_WMORE, /* Chunk type is not clear, more data expected. */ - PXER_TAG, /* Complete XER tag */ - PXER_TEXT, /* Plain text between XER tags */ - PXER_COMMENT /* A comment, may be part of */ - } pxer_chunk_type_e; -ssize_t xer_next_token(int *stateContext, - const void *buffer, size_t size, pxer_chunk_type_e *_ch_type); - -/* - * This function checks the buffer against the tag name is expected to occur. - */ - typedef enum xer_check_tag { - XCT_BROKEN = 0, /* The tag is broken */ - XCT_OPENING = 1, /* This is the tag */ - XCT_CLOSING = 2, /* This is the tag */ - XCT_BOTH = 3, /* This is the tag */ - XCT__UNK__MASK = 4, /* Mask of everything unexpected */ - XCT_UNKNOWN_OP = 5, /* Unexpected tag */ - XCT_UNKNOWN_CL = 6, /* Unexpected tag */ - XCT_UNKNOWN_BO = 7 /* Unexpected tag */ - } xer_check_tag_e; -xer_check_tag_e xer_check_tag(const void *buf_ptr, int size, - const char *need_tag); - -/* - * Get the number of bytes consisting entirely of XER whitespace characters. - * RETURN VALUES: - * >=0: Number of whitespace characters in the string. - */ -size_t xer_whitespace_span(const void *chunk_buf, size_t chunk_size); - -/* - * Skip the series of anticipated extensions. - */ -int xer_skip_unknown(xer_check_tag_e tcv, ber_tlv_len_t *depth); - -#ifdef __cplusplus -} -#endif - -#endif /* _XER_DECODER_H_ */ +/*- + * Copyright (c) 2004-2017 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#ifndef _XER_DECODER_H_ +#define _XER_DECODER_H_ + +#include + +#ifdef __cplusplus +extern "C" { +#endif + +struct asn_TYPE_descriptor_s; /* Forward declaration */ + +/* + * The XER decoder of any ASN.1 type. May be invoked by the application. + * Decodes CANONICAL-XER and BASIC-XER. + */ +asn_dec_rval_t xer_decode( + const struct asn_codec_ctx_s *opt_codec_ctx, + const struct asn_TYPE_descriptor_s *type_descriptor, + void **struct_ptr, /* Pointer to a target structure's pointer */ + const void *buffer, /* Data to be decoded */ + size_t size /* Size of data buffer */ +); + +/* + * Type of the type-specific XER decoder function. + */ +typedef asn_dec_rval_t(xer_type_decoder_f)( + const asn_codec_ctx_t *opt_codec_ctx, + const struct asn_TYPE_descriptor_s *type_descriptor, void **struct_ptr, + const char *opt_mname, /* Member name */ + const void *buf_ptr, size_t size); + +/******************************* + * INTERNALLY USEFUL FUNCTIONS * + *******************************/ + +/* + * Generalized function for decoding the primitive values. + * Used by more specialized functions, such as OCTET_STRING_decode_xer_utf8 + * and others. This function should not be used by applications, as its API + * is subject to changes. + */ +asn_dec_rval_t xer_decode_general( + const asn_codec_ctx_t *opt_codec_ctx, + asn_struct_ctx_t *ctx, /* Type decoder context */ + void *struct_key, /* Treated as opaque pointer */ + const char *xml_tag, /* Expected XML tag name */ + const void *buf_ptr, size_t size, + int (*opt_unexpected_tag_decoder)(void *struct_key, const void *chunk_buf, + size_t chunk_size), + ssize_t (*body_receiver)(void *struct_key, const void *chunk_buf, + size_t chunk_size, int have_more)); + + +/* + * Fetch the next XER (XML) token from the stream. + * The function returns the number of bytes occupied by the chunk type, + * returned in the _ch_type. The _ch_type is only set (and valid) when + * the return value is >= 0. + */ + typedef enum pxer_chunk_type { + PXER_WMORE, /* Chunk type is not clear, more data expected. */ + PXER_TAG, /* Complete XER tag */ + PXER_TEXT, /* Plain text between XER tags */ + PXER_COMMENT /* A comment, may be part of */ + } pxer_chunk_type_e; +ssize_t xer_next_token(int *stateContext, + const void *buffer, size_t size, pxer_chunk_type_e *_ch_type); + +/* + * This function checks the buffer against the tag name is expected to occur. + */ + typedef enum xer_check_tag { + XCT_BROKEN = 0, /* The tag is broken */ + XCT_OPENING = 1, /* This is the tag */ + XCT_CLOSING = 2, /* This is the tag */ + XCT_BOTH = 3, /* This is the tag */ + XCT__UNK__MASK = 4, /* Mask of everything unexpected */ + XCT_UNKNOWN_OP = 5, /* Unexpected tag */ + XCT_UNKNOWN_CL = 6, /* Unexpected tag */ + XCT_UNKNOWN_BO = 7 /* Unexpected tag */ + } xer_check_tag_e; +xer_check_tag_e xer_check_tag(const void *buf_ptr, int size, + const char *need_tag); + +/* + * Get the number of bytes consisting entirely of XER whitespace characters. + * RETURN VALUES: + * >=0: Number of whitespace characters in the string. + */ +size_t xer_whitespace_span(const void *chunk_buf, size_t chunk_size); + +/* + * Skip the series of anticipated extensions. + */ +int xer_skip_unknown(xer_check_tag_e tcv, ber_tlv_len_t *depth); + +#ifdef __cplusplus +} +#endif + +#endif /* _XER_DECODER_H_ */ diff --git a/certgen/asncodec/xer_encoder.c b/certgen/asncodec/xer_encoder.c index 4177ede5c8409502a1335465078c72071dc5cdde..23e0311da917ca14b6de1811ae5128ad7304baf6 100644 --- a/certgen/asncodec/xer_encoder.c +++ b/certgen/asncodec/xer_encoder.c @@ -1,237 +1,237 @@ -/*- - * Copyright (c) 2003, 2004 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include -#include - -/* - * The XER encoder of any type. May be invoked by the application. - */ -asn_enc_rval_t -xer_encode(const asn_TYPE_descriptor_t *td, const void *sptr, - enum xer_encoder_flags_e xer_flags, asn_app_consume_bytes_f *cb, - void *app_key) { - asn_enc_rval_t er = {0, 0, 0}; - asn_enc_rval_t tmper; - const char *mname; - size_t mlen; - int xcan = (xer_flags & XER_F_CANONICAL) ? 1 : 2; - - if(!td || !sptr) goto cb_failed; - - mname = td->xml_tag; - mlen = strlen(mname); - - ASN__CALLBACK3("<", 1, mname, mlen, ">", 1); - - tmper = td->op->xer_encoder(td, sptr, 1, xer_flags, cb, app_key); - if(tmper.encoded == -1) return tmper; - er.encoded += tmper.encoded; - - ASN__CALLBACK3("\n", xcan); - - ASN__ENCODED_OK(er); -cb_failed: - ASN__ENCODE_FAILED; -} - -/* - * This is a helper function for xer_fprint, which directs all incoming data - * into the provided file descriptor. - */ -static int -xer__print2fp(const void *buffer, size_t size, void *app_key) { - FILE *stream = (FILE *)app_key; - - if(fwrite(buffer, 1, size, stream) != size) - return -1; - - return 0; -} - -int -xer_fprint(FILE *stream, const asn_TYPE_descriptor_t *td, const void *sptr) { - asn_enc_rval_t er = {0,0,0}; - - if(!stream) stream = stdout; - if(!td || !sptr) - return -1; - - er = xer_encode(td, sptr, XER_F_BASIC, xer__print2fp, stream); - if(er.encoded == -1) - return -1; - - return fflush(stream); -} - -struct xer_buffer { - char *buffer; - size_t buffer_size; - size_t allocated_size; -}; - -static int -xer__buffer_append(const void *buffer, size_t size, void *app_key) { - struct xer_buffer *xb = app_key; - - while(xb->buffer_size + size + 1 > xb->allocated_size) { - size_t new_size = 2 * (xb->allocated_size ? xb->allocated_size : 64); - char *new_buf = MALLOC(new_size); - if(!new_buf) return -1; - if (xb->buffer) { - memcpy(new_buf, xb->buffer, xb->buffer_size); - } - FREEMEM(xb->buffer); - xb->buffer = new_buf; - xb->allocated_size = new_size; - } - - memcpy(xb->buffer + xb->buffer_size, buffer, size); - xb->buffer_size += size; - xb->buffer[xb->buffer_size] = '\0'; - return 0; -} - -enum xer_equivalence_e -xer_equivalent(const struct asn_TYPE_descriptor_s *td, const void *struct1, - const void *struct2, FILE *opt_debug_stream) { - struct xer_buffer xb1 = {0, 0, 0}; - struct xer_buffer xb2 = {0, 0, 0}; - asn_enc_rval_t e1, e2; - asn_dec_rval_t rval; - void *sptr = NULL; - - if(!td || !struct1 || !struct2) { - if(opt_debug_stream) { - if(!td) fprintf(opt_debug_stream, "Type descriptor missing\n"); - if(!struct1) fprintf(opt_debug_stream, "Structure 1 missing\n"); - if(!struct2) fprintf(opt_debug_stream, "Structure 2 missing\n"); - } - return XEQ_FAILURE; - } - - e1 = xer_encode(td, struct1, XER_F_BASIC, xer__buffer_append, &xb1); - if(e1.encoded == -1) { - if(opt_debug_stream) { - fprintf(stderr, "XER Encoding of %s failed\n", td->name); - } - FREEMEM(xb1.buffer); - return XEQ_ENCODE1_FAILED; - } - - e2 = xer_encode(td, struct2, XER_F_BASIC, xer__buffer_append, &xb2); - if(e2.encoded == -1) { - if(opt_debug_stream) { - fprintf(stderr, "XER Encoding of %s failed\n", td->name); - } - FREEMEM(xb1.buffer); - FREEMEM(xb2.buffer); - return XEQ_ENCODE1_FAILED; - } - - if(xb1.buffer_size != xb2.buffer_size - || memcmp(xb1.buffer, xb2.buffer, xb1.buffer_size) != 0) { - if(opt_debug_stream) { - fprintf(opt_debug_stream, - "Structures XER-encoded into different byte streams:\n=== " - "Structure 1 ===\n%s\n=== Structure 2 ===\n%s\n", - xb1.buffer, xb2.buffer); - } - FREEMEM(xb1.buffer); - FREEMEM(xb2.buffer); - return XEQ_DIFFERENT; - } else { - if(opt_debug_stream) { - fprintf(opt_debug_stream, - "Both structures encoded into the same XER byte stream " - "of size %" ASN_PRI_SIZE ":\n%s", - xb1.buffer_size, xb1.buffer); - } - } - - rval = xer_decode(NULL, td, (void **)&sptr, xb1.buffer, - xb1.buffer_size); - switch(rval.code) { - case RC_OK: - break; - case RC_WMORE: - if(opt_debug_stream) { - fprintf(opt_debug_stream, - "Structure %s XER decode unexpectedly requires " - "more data:\n%s\n", - td->name, xb1.buffer); - } - /* Fall through */ - case RC_FAIL: - default: - if(opt_debug_stream) { - fprintf(opt_debug_stream, - "Structure %s XER decoding resulted in failure.\n", - td->name); - } - ASN_STRUCT_FREE(*td, sptr); - FREEMEM(xb1.buffer); - FREEMEM(xb2.buffer); - return XEQ_DECODE_FAILED; - } - - if(rval.consumed != xb1.buffer_size - && ((rval.consumed > xb1.buffer_size) - || xer_whitespace_span(xb1.buffer + rval.consumed, - xb1.buffer_size - rval.consumed) - != (xb1.buffer_size - rval.consumed))) { - if(opt_debug_stream) { - fprintf(opt_debug_stream, - "Round-trip decode of %s required less bytes (%" ASN_PRI_SIZE ") than " - "encoded (%" ASN_PRI_SIZE ")\n", - td->name, rval.consumed, xb1.buffer_size); - } - ASN_STRUCT_FREE(*td, sptr); - FREEMEM(xb1.buffer); - FREEMEM(xb2.buffer); - return XEQ_ROUND_TRIP_FAILED; - } - - /* - * Reuse xb2 to encode newly decoded structure. - */ - FREEMEM(xb2.buffer); - memset(&xb2, 0, sizeof(xb2)); - - e2 = xer_encode(td, sptr, XER_F_BASIC, xer__buffer_append, &xb2); - if(e2.encoded == -1) { - if(opt_debug_stream) { - fprintf(stderr, "XER Encoding of round-trip decode of %s failed\n", - td->name); - } - ASN_STRUCT_FREE(*td, sptr); - FREEMEM(xb1.buffer); - FREEMEM(xb2.buffer); - return XEQ_ROUND_TRIP_FAILED; - } - - ASN_STRUCT_FREE(*td, sptr); - sptr = 0; - - if(xb1.buffer_size != xb2.buffer_size - || memcmp(xb1.buffer, xb2.buffer, xb1.buffer_size) != 0) { - if(opt_debug_stream) { - fprintf(opt_debug_stream, - "XER Encoding of round-trip decode of %s resulted in " - "different byte stream:\n" - "=== Original ===\n%s\n" - "=== Round-tripped ===\n%s\n", - xb1.buffer, xb2.buffer, td->name); - } - FREEMEM(xb1.buffer); - FREEMEM(xb2.buffer); - return XEQ_ROUND_TRIP_FAILED; - } - - FREEMEM(xb1.buffer); - FREEMEM(xb2.buffer); - return XEQ_SUCCESS; -} - +/*- + * Copyright (c) 2003, 2004 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include +#include + +/* + * The XER encoder of any type. May be invoked by the application. + */ +asn_enc_rval_t +xer_encode(const asn_TYPE_descriptor_t *td, const void *sptr, + enum xer_encoder_flags_e xer_flags, asn_app_consume_bytes_f *cb, + void *app_key) { + asn_enc_rval_t er = {0, 0, 0}; + asn_enc_rval_t tmper; + const char *mname; + size_t mlen; + int xcan = (xer_flags & XER_F_CANONICAL) ? 1 : 2; + + if(!td || !sptr) goto cb_failed; + + mname = td->xml_tag; + mlen = strlen(mname); + + ASN__CALLBACK3("<", 1, mname, mlen, ">", 1); + + tmper = td->op->xer_encoder(td, sptr, 1, xer_flags, cb, app_key); + if(tmper.encoded == -1) return tmper; + er.encoded += tmper.encoded; + + ASN__CALLBACK3("\n", xcan); + + ASN__ENCODED_OK(er); +cb_failed: + ASN__ENCODE_FAILED; +} + +/* + * This is a helper function for xer_fprint, which directs all incoming data + * into the provided file descriptor. + */ +static int +xer__print2fp(const void *buffer, size_t size, void *app_key) { + FILE *stream = (FILE *)app_key; + + if(fwrite(buffer, 1, size, stream) != size) + return -1; + + return 0; +} + +int +xer_fprint(FILE *stream, const asn_TYPE_descriptor_t *td, const void *sptr) { + asn_enc_rval_t er = {0,0,0}; + + if(!stream) stream = stdout; + if(!td || !sptr) + return -1; + + er = xer_encode(td, sptr, XER_F_BASIC, xer__print2fp, stream); + if(er.encoded == -1) + return -1; + + return fflush(stream); +} + +struct xer_buffer { + char *buffer; + size_t buffer_size; + size_t allocated_size; +}; + +static int +xer__buffer_append(const void *buffer, size_t size, void *app_key) { + struct xer_buffer *xb = app_key; + + while(xb->buffer_size + size + 1 > xb->allocated_size) { + size_t new_size = 2 * (xb->allocated_size ? xb->allocated_size : 64); + char *new_buf = MALLOC(new_size); + if(!new_buf) return -1; + if (xb->buffer) { + memcpy(new_buf, xb->buffer, xb->buffer_size); + } + FREEMEM(xb->buffer); + xb->buffer = new_buf; + xb->allocated_size = new_size; + } + + memcpy(xb->buffer + xb->buffer_size, buffer, size); + xb->buffer_size += size; + xb->buffer[xb->buffer_size] = '\0'; + return 0; +} + +enum xer_equivalence_e +xer_equivalent(const struct asn_TYPE_descriptor_s *td, const void *struct1, + const void *struct2, FILE *opt_debug_stream) { + struct xer_buffer xb1 = {0, 0, 0}; + struct xer_buffer xb2 = {0, 0, 0}; + asn_enc_rval_t e1, e2; + asn_dec_rval_t rval; + void *sptr = NULL; + + if(!td || !struct1 || !struct2) { + if(opt_debug_stream) { + if(!td) fprintf(opt_debug_stream, "Type descriptor missing\n"); + if(!struct1) fprintf(opt_debug_stream, "Structure 1 missing\n"); + if(!struct2) fprintf(opt_debug_stream, "Structure 2 missing\n"); + } + return XEQ_FAILURE; + } + + e1 = xer_encode(td, struct1, XER_F_BASIC, xer__buffer_append, &xb1); + if(e1.encoded == -1) { + if(opt_debug_stream) { + fprintf(stderr, "XER Encoding of %s failed\n", td->name); + } + FREEMEM(xb1.buffer); + return XEQ_ENCODE1_FAILED; + } + + e2 = xer_encode(td, struct2, XER_F_BASIC, xer__buffer_append, &xb2); + if(e2.encoded == -1) { + if(opt_debug_stream) { + fprintf(stderr, "XER Encoding of %s failed\n", td->name); + } + FREEMEM(xb1.buffer); + FREEMEM(xb2.buffer); + return XEQ_ENCODE1_FAILED; + } + + if(xb1.buffer_size != xb2.buffer_size + || memcmp(xb1.buffer, xb2.buffer, xb1.buffer_size) != 0) { + if(opt_debug_stream) { + fprintf(opt_debug_stream, + "Structures XER-encoded into different byte streams:\n=== " + "Structure 1 ===\n%s\n=== Structure 2 ===\n%s\n", + xb1.buffer, xb2.buffer); + } + FREEMEM(xb1.buffer); + FREEMEM(xb2.buffer); + return XEQ_DIFFERENT; + } else { + if(opt_debug_stream) { + fprintf(opt_debug_stream, + "Both structures encoded into the same XER byte stream " + "of size %" ASN_PRI_SIZE ":\n%s", + xb1.buffer_size, xb1.buffer); + } + } + + rval = xer_decode(NULL, td, (void **)&sptr, xb1.buffer, + xb1.buffer_size); + switch(rval.code) { + case RC_OK: + break; + case RC_WMORE: + if(opt_debug_stream) { + fprintf(opt_debug_stream, + "Structure %s XER decode unexpectedly requires " + "more data:\n%s\n", + td->name, xb1.buffer); + } + /* Fall through */ + case RC_FAIL: + default: + if(opt_debug_stream) { + fprintf(opt_debug_stream, + "Structure %s XER decoding resulted in failure.\n", + td->name); + } + ASN_STRUCT_FREE(*td, sptr); + FREEMEM(xb1.buffer); + FREEMEM(xb2.buffer); + return XEQ_DECODE_FAILED; + } + + if(rval.consumed != xb1.buffer_size + && ((rval.consumed > xb1.buffer_size) + || xer_whitespace_span(xb1.buffer + rval.consumed, + xb1.buffer_size - rval.consumed) + != (xb1.buffer_size - rval.consumed))) { + if(opt_debug_stream) { + fprintf(opt_debug_stream, + "Round-trip decode of %s required less bytes (%" ASN_PRI_SIZE ") than " + "encoded (%" ASN_PRI_SIZE ")\n", + td->name, rval.consumed, xb1.buffer_size); + } + ASN_STRUCT_FREE(*td, sptr); + FREEMEM(xb1.buffer); + FREEMEM(xb2.buffer); + return XEQ_ROUND_TRIP_FAILED; + } + + /* + * Reuse xb2 to encode newly decoded structure. + */ + FREEMEM(xb2.buffer); + memset(&xb2, 0, sizeof(xb2)); + + e2 = xer_encode(td, sptr, XER_F_BASIC, xer__buffer_append, &xb2); + if(e2.encoded == -1) { + if(opt_debug_stream) { + fprintf(stderr, "XER Encoding of round-trip decode of %s failed\n", + td->name); + } + ASN_STRUCT_FREE(*td, sptr); + FREEMEM(xb1.buffer); + FREEMEM(xb2.buffer); + return XEQ_ROUND_TRIP_FAILED; + } + + ASN_STRUCT_FREE(*td, sptr); + sptr = 0; + + if(xb1.buffer_size != xb2.buffer_size + || memcmp(xb1.buffer, xb2.buffer, xb1.buffer_size) != 0) { + if(opt_debug_stream) { + fprintf(opt_debug_stream, + "XER Encoding of round-trip decode of %s resulted in " + "different byte stream:\n" + "=== Original ===\n%s\n" + "=== Round-tripped ===\n%s\n", + xb1.buffer, xb2.buffer, td->name); + } + FREEMEM(xb1.buffer); + FREEMEM(xb2.buffer); + return XEQ_ROUND_TRIP_FAILED; + } + + FREEMEM(xb1.buffer); + FREEMEM(xb2.buffer); + return XEQ_SUCCESS; +} + diff --git a/certgen/asncodec/xer_encoder.h b/certgen/asncodec/xer_encoder.h index 6cfc505fa56f00800ed85c59b7038b1b431824d8..538818392ffe9776c92485ead01260f47d4db5cf 100644 --- a/certgen/asncodec/xer_encoder.h +++ b/certgen/asncodec/xer_encoder.h @@ -1,83 +1,83 @@ -/*- - * Copyright (c) 2004-2017 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#ifndef _XER_ENCODER_H_ -#define _XER_ENCODER_H_ - -#include - -#ifdef __cplusplus -extern "C" { -#endif - -struct asn_TYPE_descriptor_s; /* Forward declaration */ - -/* Flags used by the xer_encode() and (*xer_type_encoder_f), defined below */ -enum xer_encoder_flags_e { - /* Mode of encoding */ - XER_F_BASIC = 0x01, /* BASIC-XER (pretty-printing) */ - XER_F_CANONICAL = 0x02 /* Canonical XER (strict rules) */ -}; - -/* - * The XER encoder of any type. May be invoked by the application. - * Produces CANONICAL-XER and BASIC-XER depending on the (xer_flags). - */ -asn_enc_rval_t xer_encode(const struct asn_TYPE_descriptor_s *type_descriptor, - const void *struct_ptr, /* Structure to be encoded */ - enum xer_encoder_flags_e xer_flags, - asn_app_consume_bytes_f *consume_bytes_cb, - void *app_key /* Arbitrary callback argument */ -); - -/* - * The variant of the above function which dumps the BASIC-XER (XER_F_BASIC) - * output into the chosen file pointer. - * RETURN VALUES: - * 0: The structure is printed. - * -1: Problem printing the structure. - * WARNING: No sensible errno value is returned. - */ -int xer_fprint(FILE *stream, const struct asn_TYPE_descriptor_s *td, - const void *struct_ptr); - -/* - * A helper function that uses XER encoding/decoding to verify that: - * - Both structures encode into the same BASIC XER. - * - Both resulting XER byte streams can be decoded back. - * - Both decoded structures encode into the same BASIC XER (round-trip). - * All of this verifies equivalence between structures and a round-trip. - * ARGUMENTS: - * (opt_debug_stream) - If specified, prints ongoing details. - */ -enum xer_equivalence_e { - XEQ_SUCCESS, /* The only completely positive return value */ - XEQ_FAILURE, /* General failure */ - XEQ_ENCODE1_FAILED, /* First structure XER encoding failed */ - XEQ_ENCODE2_FAILED, /* Second structure XER encoding failed */ - XEQ_DIFFERENT, /* Structures encoded into different XER */ - XEQ_DECODE_FAILED, /* Decode of the XER data failed */ - XEQ_ROUND_TRIP_FAILED /* Bad round-trip */ -}; -enum xer_equivalence_e xer_equivalent( - const struct asn_TYPE_descriptor_s *type_descriptor, const void *struct1, - const void *struct2, FILE *opt_debug_stream); - -/* - * Type of the generic XER encoder. - */ -typedef asn_enc_rval_t(xer_type_encoder_f)( - const struct asn_TYPE_descriptor_s *type_descriptor, - const void *struct_ptr, /* Structure to be encoded */ - int ilevel, /* Level of indentation */ - enum xer_encoder_flags_e xer_flags, - asn_app_consume_bytes_f *consume_bytes_cb, /* Callback */ - void *app_key /* Arbitrary callback argument */ -); - -#ifdef __cplusplus -} -#endif - -#endif /* _XER_ENCODER_H_ */ +/*- + * Copyright (c) 2004-2017 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#ifndef _XER_ENCODER_H_ +#define _XER_ENCODER_H_ + +#include + +#ifdef __cplusplus +extern "C" { +#endif + +struct asn_TYPE_descriptor_s; /* Forward declaration */ + +/* Flags used by the xer_encode() and (*xer_type_encoder_f), defined below */ +enum xer_encoder_flags_e { + /* Mode of encoding */ + XER_F_BASIC = 0x01, /* BASIC-XER (pretty-printing) */ + XER_F_CANONICAL = 0x02 /* Canonical XER (strict rules) */ +}; + +/* + * The XER encoder of any type. May be invoked by the application. + * Produces CANONICAL-XER and BASIC-XER depending on the (xer_flags). + */ +asn_enc_rval_t xer_encode(const struct asn_TYPE_descriptor_s *type_descriptor, + const void *struct_ptr, /* Structure to be encoded */ + enum xer_encoder_flags_e xer_flags, + asn_app_consume_bytes_f *consume_bytes_cb, + void *app_key /* Arbitrary callback argument */ +); + +/* + * The variant of the above function which dumps the BASIC-XER (XER_F_BASIC) + * output into the chosen file pointer. + * RETURN VALUES: + * 0: The structure is printed. + * -1: Problem printing the structure. + * WARNING: No sensible errno value is returned. + */ +int xer_fprint(FILE *stream, const struct asn_TYPE_descriptor_s *td, + const void *struct_ptr); + +/* + * A helper function that uses XER encoding/decoding to verify that: + * - Both structures encode into the same BASIC XER. + * - Both resulting XER byte streams can be decoded back. + * - Both decoded structures encode into the same BASIC XER (round-trip). + * All of this verifies equivalence between structures and a round-trip. + * ARGUMENTS: + * (opt_debug_stream) - If specified, prints ongoing details. + */ +enum xer_equivalence_e { + XEQ_SUCCESS, /* The only completely positive return value */ + XEQ_FAILURE, /* General failure */ + XEQ_ENCODE1_FAILED, /* First structure XER encoding failed */ + XEQ_ENCODE2_FAILED, /* Second structure XER encoding failed */ + XEQ_DIFFERENT, /* Structures encoded into different XER */ + XEQ_DECODE_FAILED, /* Decode of the XER data failed */ + XEQ_ROUND_TRIP_FAILED /* Bad round-trip */ +}; +enum xer_equivalence_e xer_equivalent( + const struct asn_TYPE_descriptor_s *type_descriptor, const void *struct1, + const void *struct2, FILE *opt_debug_stream); + +/* + * Type of the generic XER encoder. + */ +typedef asn_enc_rval_t(xer_type_encoder_f)( + const struct asn_TYPE_descriptor_s *type_descriptor, + const void *struct_ptr, /* Structure to be encoded */ + int ilevel, /* Level of indentation */ + enum xer_encoder_flags_e xer_flags, + asn_app_consume_bytes_f *consume_bytes_cb, /* Callback */ + void *app_key /* Arbitrary callback argument */ +); + +#ifdef __cplusplus +} +#endif + +#endif /* _XER_ENCODER_H_ */ diff --git a/certgen/asncodec/xer_support.c b/certgen/asncodec/xer_support.c index 36b4bfbfc07e53f10cef2941c01b9378250bab93..e767e9f94c4153ae27c00a144355b80195ccab71 100644 --- a/certgen/asncodec/xer_support.c +++ b/certgen/asncodec/xer_support.c @@ -1,227 +1,227 @@ -/* - * Copyright (c) 2003, 2004 X/IO Labs, xiolabs.com. - * Copyright (c) 2003, 2004, 2005 Lev Walkin . - * All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#include -#include - -/* Parser states */ -typedef enum { - ST_TEXT, - ST_TAG_START, - ST_TAG_BODY, - ST_TAG_QUOTE_WAIT, - ST_TAG_QUOTED_STRING, - ST_TAG_UNQUOTED_STRING, - ST_COMMENT_WAIT_DASH1, /* ""[0] */ - ST_COMMENT_CLO_RT /* "-->"[1] */ -} pstate_e; - -static const int -_charclass[256] = { - 0,0,0,0,0,0,0,0, 0,1,1,0,1,1,0,0, - 0,0,0,0,0,0,0,0, 0,0,0,0,0,0,0,0, - 1,0,0,0,0,0,0,0, 0,0,0,0,0,0,0,0, - 2,2,2,2,2,2,2,2, 2,2,0,0,0,0,0,0, /* 01234567 89 */ - 0,3,3,3,3,3,3,3, 3,3,3,3,3,3,3,3, /* ABCDEFG HIJKLMNO */ - 3,3,3,3,3,3,3,3, 3,3,3,0,0,0,0,0, /* PQRSTUVW XYZ */ - 0,3,3,3,3,3,3,3, 3,3,3,3,3,3,3,3, /* abcdefg hijklmno */ - 3,3,3,3,3,3,3,3, 3,3,3,0,0,0,0,0 /* pqrstuvw xyz */ -}; -#define WHITESPACE(c) (_charclass[(unsigned char)(c)] == 1) -#define ALNUM(c) (_charclass[(unsigned char)(c)] >= 2) -#define ALPHA(c) (_charclass[(unsigned char)(c)] == 3) - -/* Aliases for characters, ASCII/UTF-8 */ -#define EXCLAM 0x21 /* '!' */ -#define CQUOTE 0x22 /* '"' */ -#define CDASH 0x2d /* '-' */ -#define CSLASH 0x2f /* '/' */ -#define LANGLE 0x3c /* '<' */ -#define CEQUAL 0x3d /* '=' */ -#define RANGLE 0x3e /* '>' */ -#define CQUEST 0x3f /* '?' */ - -/* Invoke token callback */ -#define TOKEN_CB_CALL(type, _ns, _current_too, _final) do { \ - int _ret; \ - pstate_e ns = _ns; \ - ssize_t _sz = (p - chunk_start) + _current_too; \ - if (!_sz) { \ - /* Shortcut */ \ - state = _ns; \ - break; \ - } \ - _ret = cb(type, chunk_start, _sz, key); \ - if(_ret < _sz) { \ - if(_current_too && _ret == -1) \ - state = ns; \ - goto finish; \ - } \ - chunk_start = p + _current_too; \ - state = ns; \ - } while(0) - -#define TOKEN_CB(_type, _ns, _current_too) \ - TOKEN_CB_CALL(_type, _ns, _current_too, 0) - -#define PXML_TAG_FINAL_CHUNK_TYPE PXML_TAG_END -#define PXML_COMMENT_FINAL_CHUNK_TYPE PXML_COMMENT_END - -#define TOKEN_CB_FINAL(_type, _ns, _current_too) \ - TOKEN_CB_CALL( _type ## _FINAL_CHUNK_TYPE , _ns, _current_too, 1) - -/* - * Parser itself - */ -ssize_t pxml_parse(int *stateContext, const void *xmlbuf, size_t size, pxml_callback_f *cb, void *key) { - pstate_e state = (pstate_e)*stateContext; - const char *chunk_start = (const char *)xmlbuf; - const char *p = chunk_start; - const char *end = p + size; - - for(; p < end; p++) { - int C = *(const unsigned char *)p; - switch(state) { - case ST_TEXT: - /* - * Initial state: we're in the middle of some text, - * or just have started. - */ - if (C == LANGLE) - /* We're now in the tag, probably */ - TOKEN_CB(PXML_TEXT, ST_TAG_START, 0); - break; - case ST_TAG_START: - if (ALPHA(C) || (C == CSLASH)) - state = ST_TAG_BODY; - else if (C == EXCLAM) - state = ST_COMMENT_WAIT_DASH1; - else - /* - * Not characters and not whitespace. - * Must be something like "3 < 4". - */ - TOKEN_CB(PXML_TEXT, ST_TEXT, 1);/* Flush as data */ - break; - case ST_TAG_BODY: - switch(C) { - case RANGLE: - /* End of the tag */ - TOKEN_CB_FINAL(PXML_TAG, ST_TEXT, 1); - break; - case LANGLE: - /* - * The previous tag wasn't completed, but still - * recognized as valid. (Mozilla-compatible) - */ - TOKEN_CB_FINAL(PXML_TAG, ST_TAG_START, 0); - break; - case CEQUAL: - state = ST_TAG_QUOTE_WAIT; - break; - } - break; - case ST_TAG_QUOTE_WAIT: - /* - * State after the equal sign ("=") in the tag. - */ - switch(C) { - case CQUOTE: - state = ST_TAG_QUOTED_STRING; - break; - case RANGLE: - /* End of the tag */ - TOKEN_CB_FINAL(PXML_TAG, ST_TEXT, 1); - break; - default: - if(!WHITESPACE(C)) - /* Unquoted string value */ - state = ST_TAG_UNQUOTED_STRING; - } - break; - case ST_TAG_QUOTED_STRING: - /* - * Tag attribute's string value in quotes. - */ - if(C == CQUOTE) { - /* Return back to the tag state */ - state = ST_TAG_BODY; - } - break; - case ST_TAG_UNQUOTED_STRING: - if(C == RANGLE) { - /* End of the tag */ - TOKEN_CB_FINAL(PXML_TAG, ST_TEXT, 1); - } else if(WHITESPACE(C)) { - /* Return back to the tag state */ - state = ST_TAG_BODY; - } - break; - case ST_COMMENT_WAIT_DASH1: - if(C == CDASH) { - state = ST_COMMENT_WAIT_DASH2; - } else { - /* Some ordinary tag. */ - state = ST_TAG_BODY; - } - break; - case ST_COMMENT_WAIT_DASH2: - if(C == CDASH) { - /* Seen "<--" */ - state = ST_COMMENT; - } else { - /* Some ordinary tag */ - state = ST_TAG_BODY; - } - break; - case ST_COMMENT: - if(C == CDASH) { - state = ST_COMMENT_CLO_DASH2; - } - break; - case ST_COMMENT_CLO_DASH2: - if(C == CDASH) { - state = ST_COMMENT_CLO_RT; - } else { - /* This is not an end of a comment */ - state = ST_COMMENT; - } - break; - case ST_COMMENT_CLO_RT: - if(C == RANGLE) { - TOKEN_CB_FINAL(PXML_COMMENT, ST_TEXT, 1); - } else if(C == CDASH) { - /* Maintain current state, still waiting for '>' */ - } else { - state = ST_COMMENT; - } - break; - } /* switch(*ptr) */ - } /* for() */ - - /* - * Flush the partially processed chunk, state permitting. - */ - if(p - chunk_start) { - switch (state) { - case ST_COMMENT: - TOKEN_CB(PXML_COMMENT, state, 0); - break; - case ST_TEXT: - TOKEN_CB(PXML_TEXT, state, 0); - break; - default: break; /* a no-op */ - } - } - -finish: - *stateContext = (int)state; - return chunk_start - (const char *)xmlbuf; -} - +/* + * Copyright (c) 2003, 2004 X/IO Labs, xiolabs.com. + * Copyright (c) 2003, 2004, 2005 Lev Walkin . + * All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#include +#include + +/* Parser states */ +typedef enum { + ST_TEXT, + ST_TAG_START, + ST_TAG_BODY, + ST_TAG_QUOTE_WAIT, + ST_TAG_QUOTED_STRING, + ST_TAG_UNQUOTED_STRING, + ST_COMMENT_WAIT_DASH1, /* ""[0] */ + ST_COMMENT_CLO_RT /* "-->"[1] */ +} pstate_e; + +static const int +_charclass[256] = { + 0,0,0,0,0,0,0,0, 0,1,1,0,1,1,0,0, + 0,0,0,0,0,0,0,0, 0,0,0,0,0,0,0,0, + 1,0,0,0,0,0,0,0, 0,0,0,0,0,0,0,0, + 2,2,2,2,2,2,2,2, 2,2,0,0,0,0,0,0, /* 01234567 89 */ + 0,3,3,3,3,3,3,3, 3,3,3,3,3,3,3,3, /* ABCDEFG HIJKLMNO */ + 3,3,3,3,3,3,3,3, 3,3,3,0,0,0,0,0, /* PQRSTUVW XYZ */ + 0,3,3,3,3,3,3,3, 3,3,3,3,3,3,3,3, /* abcdefg hijklmno */ + 3,3,3,3,3,3,3,3, 3,3,3,0,0,0,0,0 /* pqrstuvw xyz */ +}; +#define WHITESPACE(c) (_charclass[(unsigned char)(c)] == 1) +#define ALNUM(c) (_charclass[(unsigned char)(c)] >= 2) +#define ALPHA(c) (_charclass[(unsigned char)(c)] == 3) + +/* Aliases for characters, ASCII/UTF-8 */ +#define EXCLAM 0x21 /* '!' */ +#define CQUOTE 0x22 /* '"' */ +#define CDASH 0x2d /* '-' */ +#define CSLASH 0x2f /* '/' */ +#define LANGLE 0x3c /* '<' */ +#define CEQUAL 0x3d /* '=' */ +#define RANGLE 0x3e /* '>' */ +#define CQUEST 0x3f /* '?' */ + +/* Invoke token callback */ +#define TOKEN_CB_CALL(type, _ns, _current_too, _final) do { \ + int _ret; \ + pstate_e ns = _ns; \ + ssize_t _sz = (p - chunk_start) + _current_too; \ + if (!_sz) { \ + /* Shortcut */ \ + state = _ns; \ + break; \ + } \ + _ret = cb(type, chunk_start, _sz, key); \ + if(_ret < _sz) { \ + if(_current_too && _ret == -1) \ + state = ns; \ + goto finish; \ + } \ + chunk_start = p + _current_too; \ + state = ns; \ + } while(0) + +#define TOKEN_CB(_type, _ns, _current_too) \ + TOKEN_CB_CALL(_type, _ns, _current_too, 0) + +#define PXML_TAG_FINAL_CHUNK_TYPE PXML_TAG_END +#define PXML_COMMENT_FINAL_CHUNK_TYPE PXML_COMMENT_END + +#define TOKEN_CB_FINAL(_type, _ns, _current_too) \ + TOKEN_CB_CALL( _type ## _FINAL_CHUNK_TYPE , _ns, _current_too, 1) + +/* + * Parser itself + */ +ssize_t pxml_parse(int *stateContext, const void *xmlbuf, size_t size, pxml_callback_f *cb, void *key) { + pstate_e state = (pstate_e)*stateContext; + const char *chunk_start = (const char *)xmlbuf; + const char *p = chunk_start; + const char *end = p + size; + + for(; p < end; p++) { + int C = *(const unsigned char *)p; + switch(state) { + case ST_TEXT: + /* + * Initial state: we're in the middle of some text, + * or just have started. + */ + if (C == LANGLE) + /* We're now in the tag, probably */ + TOKEN_CB(PXML_TEXT, ST_TAG_START, 0); + break; + case ST_TAG_START: + if (ALPHA(C) || (C == CSLASH)) + state = ST_TAG_BODY; + else if (C == EXCLAM) + state = ST_COMMENT_WAIT_DASH1; + else + /* + * Not characters and not whitespace. + * Must be something like "3 < 4". + */ + TOKEN_CB(PXML_TEXT, ST_TEXT, 1);/* Flush as data */ + break; + case ST_TAG_BODY: + switch(C) { + case RANGLE: + /* End of the tag */ + TOKEN_CB_FINAL(PXML_TAG, ST_TEXT, 1); + break; + case LANGLE: + /* + * The previous tag wasn't completed, but still + * recognized as valid. (Mozilla-compatible) + */ + TOKEN_CB_FINAL(PXML_TAG, ST_TAG_START, 0); + break; + case CEQUAL: + state = ST_TAG_QUOTE_WAIT; + break; + } + break; + case ST_TAG_QUOTE_WAIT: + /* + * State after the equal sign ("=") in the tag. + */ + switch(C) { + case CQUOTE: + state = ST_TAG_QUOTED_STRING; + break; + case RANGLE: + /* End of the tag */ + TOKEN_CB_FINAL(PXML_TAG, ST_TEXT, 1); + break; + default: + if(!WHITESPACE(C)) + /* Unquoted string value */ + state = ST_TAG_UNQUOTED_STRING; + } + break; + case ST_TAG_QUOTED_STRING: + /* + * Tag attribute's string value in quotes. + */ + if(C == CQUOTE) { + /* Return back to the tag state */ + state = ST_TAG_BODY; + } + break; + case ST_TAG_UNQUOTED_STRING: + if(C == RANGLE) { + /* End of the tag */ + TOKEN_CB_FINAL(PXML_TAG, ST_TEXT, 1); + } else if(WHITESPACE(C)) { + /* Return back to the tag state */ + state = ST_TAG_BODY; + } + break; + case ST_COMMENT_WAIT_DASH1: + if(C == CDASH) { + state = ST_COMMENT_WAIT_DASH2; + } else { + /* Some ordinary tag. */ + state = ST_TAG_BODY; + } + break; + case ST_COMMENT_WAIT_DASH2: + if(C == CDASH) { + /* Seen "<--" */ + state = ST_COMMENT; + } else { + /* Some ordinary tag */ + state = ST_TAG_BODY; + } + break; + case ST_COMMENT: + if(C == CDASH) { + state = ST_COMMENT_CLO_DASH2; + } + break; + case ST_COMMENT_CLO_DASH2: + if(C == CDASH) { + state = ST_COMMENT_CLO_RT; + } else { + /* This is not an end of a comment */ + state = ST_COMMENT; + } + break; + case ST_COMMENT_CLO_RT: + if(C == RANGLE) { + TOKEN_CB_FINAL(PXML_COMMENT, ST_TEXT, 1); + } else if(C == CDASH) { + /* Maintain current state, still waiting for '>' */ + } else { + state = ST_COMMENT; + } + break; + } /* switch(*ptr) */ + } /* for() */ + + /* + * Flush the partially processed chunk, state permitting. + */ + if(p - chunk_start) { + switch (state) { + case ST_COMMENT: + TOKEN_CB(PXML_COMMENT, state, 0); + break; + case ST_TEXT: + TOKEN_CB(PXML_TEXT, state, 0); + break; + default: break; /* a no-op */ + } + } + +finish: + *stateContext = (int)state; + return chunk_start - (const char *)xmlbuf; +} + diff --git a/certgen/asncodec/xer_support.h b/certgen/asncodec/xer_support.h index 2c3f369b8baee6936b4c1ba5c3a5a25ec842dfba..192f5d760177e34f79e3220aeb2c9118871a488a 100644 --- a/certgen/asncodec/xer_support.h +++ b/certgen/asncodec/xer_support.h @@ -1,55 +1,55 @@ -/* - * Copyright (c) 2003, 2004 X/IO Labs, xiolabs.com. - * Copyright (c) 2003-2017 Lev Walkin . All rights reserved. - * Redistribution and modifications are permitted subject to BSD license. - */ -#ifndef _XER_SUPPORT_H_ -#define _XER_SUPPORT_H_ - -#include /* Platform-specific types */ - -#ifdef __cplusplus -extern "C" { -#endif - -/* - * Types of data transferred to the application. - */ -typedef enum { - PXML_TEXT, /* Plain text between XML tags. */ - PXML_TAG, /* A tag, starting with '<'. */ - PXML_COMMENT, /* An XML comment, including "". */ - /* - * The following chunk types are reported if the chunk - * terminates the specified XML element. - */ - PXML_TAG_END, /* Tag ended */ - PXML_COMMENT_END /* Comment ended */ -} pxml_chunk_type_e; - -/* - * Callback function that is called by the parser when parsed data is - * available. The _opaque is the pointer to a field containing opaque user - * data specified in pxml_create() call. The chunk type is _type and the text - * data is the piece of buffer identified by _bufid (as supplied to - * pxml_feed() call) starting at offset _offset and of _size bytes size. - * The chunk is NOT '\0'-terminated. - */ -typedef int (pxml_callback_f)(pxml_chunk_type_e _type, - const void *_chunk_data, size_t _chunk_size, void *_key); - -/* - * Parse the given buffer as it were a chunk of XML data. - * Invoke the specified callback each time the meaningful data is found. - * This function returns number of bytes consumed from the buffer. - * It will always be lesser than or equal to the specified _size. - * The next invocation of this function must account the difference. - */ -ssize_t pxml_parse(int *_stateContext, const void *_buf, size_t _size, - pxml_callback_f *cb, void *_key); - -#ifdef __cplusplus -} -#endif - -#endif /* _XER_SUPPORT_H_ */ +/* + * Copyright (c) 2003, 2004 X/IO Labs, xiolabs.com. + * Copyright (c) 2003-2017 Lev Walkin . All rights reserved. + * Redistribution and modifications are permitted subject to BSD license. + */ +#ifndef _XER_SUPPORT_H_ +#define _XER_SUPPORT_H_ + +#include /* Platform-specific types */ + +#ifdef __cplusplus +extern "C" { +#endif + +/* + * Types of data transferred to the application. + */ +typedef enum { + PXML_TEXT, /* Plain text between XML tags. */ + PXML_TAG, /* A tag, starting with '<'. */ + PXML_COMMENT, /* An XML comment, including "". */ + /* + * The following chunk types are reported if the chunk + * terminates the specified XML element. + */ + PXML_TAG_END, /* Tag ended */ + PXML_COMMENT_END /* Comment ended */ +} pxml_chunk_type_e; + +/* + * Callback function that is called by the parser when parsed data is + * available. The _opaque is the pointer to a field containing opaque user + * data specified in pxml_create() call. The chunk type is _type and the text + * data is the piece of buffer identified by _bufid (as supplied to + * pxml_feed() call) starting at offset _offset and of _size bytes size. + * The chunk is NOT '\0'-terminated. + */ +typedef int (pxml_callback_f)(pxml_chunk_type_e _type, + const void *_chunk_data, size_t _chunk_size, void *_key); + +/* + * Parse the given buffer as it were a chunk of XML data. + * Invoke the specified callback each time the meaningful data is found. + * This function returns number of bytes consumed from the buffer. + * It will always be lesser than or equal to the specified _size. + * The next invocation of this function must account the difference. + */ +ssize_t pxml_parse(int *_stateContext, const void *_buf, size_t _size, + pxml_callback_f *cb, void *_key); + +#ifdef __cplusplus +} +#endif + +#endif /* _XER_SUPPORT_H_ */ diff --git a/certgen/cert_utils.c b/certgen/cert_utils.c index 24833c389e17cf0f9344b3902b8ed3450c691821..2f7b91713761234fb5d64b981f22cbbcf4f63851 100644 --- a/certgen/cert_utils.c +++ b/certgen/cert_utils.c @@ -1,40 +1,40 @@ -#include "asn_application.h" -#include "EtsiTs103097Certificate.h" - -HashAlgorithm_t CertificateWholeHashAlgorithm(const EtsiTs103097Certificate_t * const cert, const char * name) -{ - HashAlgorithm_t alg; - - if(cert->issuer.present == IssuerIdentifier_PR_self){ - alg = cert->issuer.choice.self; - } else if(cert->type == CertificateType_implicit){ - switch(cert->issuer.present){ - case IssuerIdentifier_PR_sha384AndDigest: - alg = HashAlgorithm_sha384; - break; - case IssuerIdentifier_PR_sha256AndDigest: - alg = HashAlgorithm_sha256; - break; - default: - if(name) fprintf(stderr, "%s: ERROR: Unknow issuer hash algorithm\n", name); - return -1; - } - } else if(cert->type == CertificateType_explicit){ - switch(cert->toBeSigned.verifyKeyIndicator.choice.verificationKey.present){ - case PublicVerificationKey_PR_ecdsaNistP256: - case PublicVerificationKey_PR_ecdsaBrainpoolP256r1: - alg = HashAlgorithm_sha256; - break; - case PublicVerificationKey_PR_ecdsaBrainpoolP384r1: - alg = HashAlgorithm_sha384; - break; - default: - if(name) fprintf(stderr, "%s: ERROR: Unknow verification key algorithm %d\n", name, cert->toBeSigned.verifyKeyIndicator.choice.verificationKey.present); - return -1; - } - } else { - if(name) fprintf(stderr, "%s: ERROR: Unknow certificate type %d\n", name, (int)cert->type); - return -1; - } - return alg; +#include "asn_application.h" +#include "EtsiTs103097Certificate.h" + +HashAlgorithm_t CertificateWholeHashAlgorithm(const EtsiTs103097Certificate_t * const cert, const char * name) +{ + HashAlgorithm_t alg; + + if(cert->issuer.present == IssuerIdentifier_PR_self){ + alg = cert->issuer.choice.self; + } else if(cert->type == CertificateType_implicit){ + switch(cert->issuer.present){ + case IssuerIdentifier_PR_sha384AndDigest: + alg = HashAlgorithm_sha384; + break; + case IssuerIdentifier_PR_sha256AndDigest: + alg = HashAlgorithm_sha256; + break; + default: + if(name) fprintf(stderr, "%s: ERROR: Unknow issuer hash algorithm\n", name); + return -1; + } + } else if(cert->type == CertificateType_explicit){ + switch(cert->toBeSigned.verifyKeyIndicator.choice.verificationKey.present){ + case PublicVerificationKey_PR_ecdsaNistP256: + case PublicVerificationKey_PR_ecdsaBrainpoolP256r1: + alg = HashAlgorithm_sha256; + break; + case PublicVerificationKey_PR_ecdsaBrainpoolP384r1: + alg = HashAlgorithm_sha384; + break; + default: + if(name) fprintf(stderr, "%s: ERROR: Unknow verification key algorithm %d\n", name, cert->toBeSigned.verifyKeyIndicator.choice.verificationKey.present); + return -1; + } + } else { + if(name) fprintf(stderr, "%s: ERROR: Unknow certificate type %d\n", name, (int)cert->type); + return -1; + } + return alg; } \ No newline at end of file diff --git a/certgen/certgen.c b/certgen/certgen.c index 7eca95115b9ba059972156e22420e21478bd961c..734af147d55661a92cc6adac84cca8f321040983 100644 --- a/certgen/certgen.c +++ b/certgen/certgen.c @@ -1,796 +1,796 @@ -#ifndef _CRT_SECURE_NO_WARNINGS -#define _CRT_SECURE_NO_WARNINGS -#endif -#include -#include -#include "../cshared/copts.h" -#include "../cshared/cstr.h" -#include "ecc_api.h" -#include -#include "mkgmtime.h" - -#include "asn_application.h" -#include "EtsiTs103097Certificate.h" -#include "CountryOnly.h" -#include "xer_support.h" - -#define CERT_MAX_SIZE 0x10000 - -static const char * _outPath = "."; -static const char * _searchPath = NULL; -static const char * _certName = NULL; -static char * _profileName = NULL; -static char * _signerName = NULL; -static ecc_format _outKeyFormat = ecc_bin; -static const char * _keyPath = NULL; -static int _force = 0; -static int _no_gen = 0; -static const char * _cfgFile = NULL; -static int _debug = 0; -static int _xer = 0; -static int _view = 0; -int _genCount = 1; - -EtsiTs103097Certificate_t * _cert = NULL; -EtsiTs103097Certificate_t * _issuer = NULL; - -int _tbsHashType = 0; -char _tbsHash[512]; // has space for issuer hash + signer hash -int _tbsHashLength = 0; - -char _signerHashBuf[256]; // has space for issuer hash -const char* _signerHash = &_signerHashBuf[0]; -int _signerHashLength = 0; - -static const char * const _key_formats[] = { - "bin", "hex", "pem", NULL -}; - -typedef struct { - const char * cert; - const char * vkey; - const char * vkey_pub; - const char * ekey; - const char * ekey_pub; -} extensions_t; - -#define EXT_CERT ".oer" -#define EXT_VKEY ".vkey" -#define EXT_EKEY ".ekey" -#define EXT_PUB "_pub" - -static copt_t _options [] = { - { "h?", "help", COPT_HELP, NULL, "Print this help page" }, - { "C", "config", COPT_CFGFILE, (void*)&_cfgFile, "Config file path [no cfg file]" }, - { "o", "out", COPT_STR, (void*)&_outPath, "Output path [current dir by default]" }, - { "k", "key-format", COPT_STRENUM, (void*)_key_formats, "Keys output format (bin|hex|pem)[binary by default]" }, - { "S", "certs", COPT_STR, (void*)&_searchPath, "Certificates search path [Output path by default]" }, - { "K", "keys", COPT_STR, (void*)&_keyPath, "Private key storage path [Output path by default]" }, - { "f", "force", COPT_BOOL, (void*)&_force, "Force regenerate existing certificate and keys. [use existing by default]" }, - { "e", "no-generate", COPT_BOOL, (void*)&_no_gen, "Do not generate keys. [generate if necessary by default]" }, - { "n", "name", COPT_STR, (void*)&_certName, "Certificate name (take from profile by default)" }, - { "s", "signer", COPT_STR, (void*)&_signerName, "Signer certificate name [take from profile by default]" }, - { "g", "count", COPT_INT, (void*)&_genCount, "Generate multiple certificates [generate 1 certificate by default]" }, - { "D", "debug", COPT_BOOL, (void*)&_debug, "Dump hashes and other values [false]" }, - { "v", "view", COPT_BOOL, (void*)&_view, "View OER certificate [false]" }, - { "x", "oxer", COPT_BOOL, (void*)&_xer, "Decode OER certificate to XER [false]" }, - { NULL, NULL, COPT_END, NULL, NULL } -}; - -char * _bin2hex(char * hex, size_t hlen, const char * bin, size_t blen); - -static int is_CurvePoint_empty(EccP256CurvePoint_t* point); - -static int fill_curve_point_eccP256(EccP256CurvePoint_t* point, ecc_curve_id curveType, char * keyPath); -static int fill_curve_point_eccP384(EccP384CurvePoint_t* point, ecc_curve_id curveType, char * keyPath); -static void * fill_reconstruction_value(EccP256CurvePoint_t * point, void * r_key); -static void process_reconstruction_value(void * r_key, void * eph, void * ca, unsigned char * H, char * keyPath); - -static int _issuer_parser_cb(pxml_chunk_type_e _type, - const void *_chunk_data, size_t _chunk_size, void *_key) -{ - char * f = cstrnstr((const char *)_chunk_data, _chunk_size, "name=\""); - if (f){ - _signerName = f + 6; - f = cstrchr(_signerName, '"'); - _signerName = cstrndup(_signerName, f - _signerName); - } - return -1; -} - -static asn_dec_rval_t IssuerIdentifier_xer_decoder(const asn_codec_ctx_t *opt_codec_ctx, - const asn_TYPE_descriptor_t *td, void **struct_ptr, - const char *opt_mname, const void *buf_ptr, size_t size) -{ - if (_signerName == NULL){ - int stateContext = 0; - pxml_parse(&stateContext, buf_ptr, size, _issuer_parser_cb, NULL); - } - return CHOICE_decode_xer(opt_codec_ctx, td, struct_ptr, opt_mname, buf_ptr, size); -} - -static asn_dec_rval_t CountryOnly_xer_decoder(const asn_codec_ctx_t *opt_codec_ctx, - const asn_TYPE_descriptor_t *td, void **struct_ptr, - const char *opt_mname, const void *buf_ptr, size_t size) -{ - // for the future to support letter codes - return NativeInteger_decode_xer(opt_codec_ctx, td, struct_ptr, opt_mname, buf_ptr, size); -} - - -typedef struct overrun_encoder_key { - void *buffer; - size_t buffer_size; - size_t computed_size; -}overrun_encoder_key; - - -static asn_enc_rval_t ToBeSignedCertificate_oer_encoder(const asn_TYPE_descriptor_t *td, - const asn_oer_constraints_t *constraints, const void *sptr, - asn_app_consume_bytes_f *cb, void *app_key) -{ - asn_enc_rval_t rc; - overrun_encoder_key *a = (overrun_encoder_key*)app_key; - const char * oer = ((const char*)a->buffer) + a->computed_size; - rc = SEQUENCE_encode_oer(td, constraints, sptr, cb, app_key); - if (rc.encoded > 0){ - if(_debug){ - char hex[257*2]; - *_bin2hex(hex, sizeof(hex)-1, oer, ((rc.encoded>256)?256:rc.encoded)) = 0; - fprintf(stderr, "DEBUG: ToBeSigned OER[%zu]=%s\n", rc.encoded, hex); - } - // calculate hash - if (_signerHashLength == sha384_hash_size) { - _tbsHashLength = 48; - sha384_calculate(_tbsHash, (const char*)oer, rc.encoded); - } - else { - _tbsHashLength = 32; - sha256_calculate(_tbsHash, (const char*)oer, rc.encoded); - } - } - return rc; -} - -static ecc_curve_id _pk_type_to_curveid[] = { - 0, - ecies_nistp256, //Signature_PR_ecdsaNistP256Signature, - ecies_brainpoolp256r, //Signature_PR_ecdsaBrainpoolP256r1Signature, - ecies_brainpoolp384r, //Signature_PR_ecdsaBrainpoolP384r1Signature, - ecies_nistp384, //Signature_PR_ecdsaNistP384Signature -}; - -static const char _unsupported [] = "unsupported"; -static const char * _pk_curve_names[] = { - "nistp256", - "brainpoolp256r", - "brainpoolp384r", - "nistp384", - "sm2", - &_unsupported[0], - &_unsupported[0], - &_unsupported[0] -}; - -static ecc_curve_id _pk_type_to_hashid[] = { - 0, - sha_256, //Signature_PR_ecdsaNistP256Signature, - sha_256, //Signature_PR_ecdsaBrainpoolP256r1Signature, - sha_384, //Signature_PR_ecdsaBrainpoolP384r1Signature - sha_384, //Signature_PR_ecdsaNistP384Signature, - sm3 //Signature_PR_sm2Signature -}; - -static size_t _pk_type_to_hashsize[] = { - 0, - sha256_hash_size, //Signature_PR_ecdsaNistP256Signature, - sha256_hash_size, //Signature_PR_ecdsaBrainpoolP256r1Signature, - sha384_hash_size, //Signature_PR_ecdsaBrainpoolP384r1Signature - sha384_hash_size, //Signature_PR_ecdsaNistP384Signature, - sm3_hash_size //Signature_PR_sm2Signature -}; - -static void * search_private_key(const char * sName, ecc_curve_id alg) -{ - char* pk = cvstrdup(_keyPath, "/", sName, EXT_VKEY, NULL); - void *k = ecc_key_private_load(pk, alg); - if (k==NULL){ - free(pk); - pk = cvstrdup(_searchPath, "/", sName, EXT_VKEY, NULL); - k = ecc_key_private_load(pk, alg); - if (k==NULL){ - fprintf(stderr, "%s: Private key not found\n", pk); - } - } - free(pk); - return k; -} - - -static asn_enc_rval_t Signature_oer_encoder(const asn_TYPE_descriptor_t *td, - const asn_oer_constraints_t *constraints, const void *sptr, - asn_app_consume_bytes_f *cb, void *app_key) -{ - Signature_t * s = (Signature_t *)sptr; - if (is_CurvePoint_empty(&s->choice.ecdsaNistP256Signature.rSig)){ - // look for signer private key - ecc_curve_id alg = _pk_type_to_curveid[s->present]; - ecc_hash_id hashId = _pk_type_to_hashid[s->present]; - const char * sName = _signerName; - - if (sName == NULL && _cert->issuer.present == IssuerIdentifier_PR_self) - sName = _certName; - - void * k = search_private_key(sName, alg); - if(k == NULL){ - ASN__ENCODE_FAILED; - } - - char h[48]; - int hl = 0; - // calculate joint hash - memcpy(_tbsHash+_tbsHashLength, _signerHash, _signerHashLength); - switch (hashId) - { - case sha_256: - sha256_calculate(h, _tbsHash, _tbsHashLength + _signerHashLength); - hl = sha256_hash_size; - break; - case sha_384: - sha384_calculate(h, _tbsHash, _tbsHashLength + _signerHashLength); - hl = sha384_hash_size; - break; - case sm3: - sm3_calculate(h, _tbsHash, _tbsHashLength + _signerHashLength); - hl = sm3_hash_size; - break; - } - - if (_debug){ - char hex[48*3+1]; - *_bin2hex(hex, sizeof(hex), _tbsHash, _tbsHashLength) = 0; - fprintf(stderr, "DEBUG: ToBeSignedHash[%d]=%s\n", _tbsHashLength, hex); - *_bin2hex(hex, sizeof(hex), _signerHash, _signerHashLength) = 0; - fprintf(stderr, "DEBUG: SignerHash[%d]=%s\n", _signerHashLength, hex); - *_bin2hex(hex, sizeof(hex), h, hl) = 0; - fprintf(stderr, "DEBUG: JoinedHash[%d]=%s\n",hl, hex); - } - - // initialize buffers - OCTET_STRING_fromBuf(&s->choice.ecdsaNistP256Signature.rSig.choice.x_only, h, hl); - OCTET_STRING_fromBuf(&s->choice.ecdsaNistP256Signature.sSig, h, hl); - - ecc_sign(k, h, hl, s->choice.ecdsaNistP256Signature.rSig.choice.x_only.buf, s->choice.ecdsaNistP256Signature.sSig.buf); - } - return asn_OP_CHOICE.oer_encoder(td, constraints, sptr, cb, app_key); -} - -static asn_dec_rval_t PublicVerificationKey_oer_decoder(const struct asn_codec_ctx_s *opt_codec_ctx, - const struct asn_TYPE_descriptor_s *td, const asn_oer_constraints_t *constraints, - void **struct_ptr, const void *buf_ptr, size_t size) -{ - return asn_OP_CHOICE.oer_decoder(opt_codec_ctx, td, constraints, struct_ptr, buf_ptr, size); -} - -static asn_dec_rval_t ServiceSpecificPermissions_oer_decoder(const struct asn_codec_ctx_s *opt_codec_ctx, - const struct asn_TYPE_descriptor_s *td, const asn_oer_constraints_t *constraints, - void **struct_ptr, const void *buf_ptr, size_t size) -{ - return asn_OP_CHOICE.oer_decoder(opt_codec_ctx, td, constraints, struct_ptr, buf_ptr, size); -} - - -static int Time32_print_struct(const asn_TYPE_descriptor_t *td, const void *sptr, - int ilevel, asn_app_consume_bytes_f *cb, void *app_key) { - int rc = NativeInteger_print(td, sptr, ilevel, cb, app_key); - if(rc == 0){ - const long *native = (const long *)sptr; - if(native) { - const char * s = stritsdate32(*native); - if(s){ - if(cb(" --(", 4, app_key) < 0) return -1; - if(cb(s, strlen(s), app_key) < 0) return -1; - if(cb(")", 1, app_key) < 0) return -1; - } - } - } - return rc; -} -int main(int argc, char ** argv) -{ - // set default time to the begining of this year - //_setup_default_time(); - - //parse options - argc = coptions(argc, argv, COPT_NOAUTOHELP , _options); - if(argc < 2){ - if(argc<0 && (((int)0)-argc)<((sizeof(_options)/sizeof(_options[0]))-1)){ - printf("Unknown option %s\n", argv[0-argc]); - } - - if(COPT_EHELP != argc){ - const char * a = strrchr(argv[0], '/'); - if (a == NULL) a = argv[0]; - coptions_help(stdout, a, COPT_HELP_NOVALUES, _options, " [signer] [count]"); - return -1; - } - } - - if (_searchPath == NULL) _searchPath = _outPath; - if (_keyPath == NULL) _keyPath = _outPath; - if(_xer) _view = 1; - - _outKeyFormat = copts_enum_value(_options, 3, _key_formats); - - if (argc > 2) { - // set signer certificate file name - _signerName = argv[2]; - } - - if(ecc_api_init()){ - fprintf(stderr, "Cannot initialize ECC engine\n"); - return -1; - } - - _profileName = cstrdup(cstrlastpathelement(argv[1])); - if(_profileName){ - char * p = strrchr(_profileName, '.'); - if(p) *p = 0; - } - if (_certName == NULL) { - _certName = _profileName; - } - - - //load XER file - char * buf = malloc(CERT_MAX_SIZE); - char * ebuf; - EtsiTs103097Certificate_t * cert = NULL; - - ebuf = cstrnload(buf, CERT_MAX_SIZE, argv[1]); - if(ebuf == NULL){ - fprintf(stderr, "%s: Certificate%s not found\n", argv[1], (_view)?"":" profile"); - return -1; - } - - FILE * f; - asn_dec_rval_t rc_d; - asn_enc_rval_t rc_e; - - asn_TYPE_operation_t issuerOps = *asn_DEF_IssuerIdentifier.op; - asn_DEF_IssuerIdentifier.op = &issuerOps; - - asn_TYPE_operation_t tbsOps = *asn_DEF_ToBeSignedCertificate.op; - asn_DEF_ToBeSignedCertificate.op = &tbsOps; - - asn_TYPE_operation_t signatureOps = *asn_DEF_Signature.op; - asn_DEF_Signature.op = &signatureOps; - - asn_TYPE_operation_t countryOnlyOps = *asn_DEF_CountryOnly.op; - asn_DEF_CountryOnly.op = &countryOnlyOps; - - asn_TYPE_operation_t publicVerificationKeyOps = *asn_DEF_PublicVerificationKey.op; - asn_DEF_PublicVerificationKey.op = &publicVerificationKeyOps; - - asn_TYPE_operation_t serviceSpecificPermissionsOps = *asn_DEF_ServiceSpecificPermissions.op; - asn_DEF_ServiceSpecificPermissions.op = &serviceSpecificPermissionsOps; - - asn_TYPE_operation_t time32Ops = *asn_DEF_Time32.op; - asn_DEF_Time32.op = &time32Ops; - - issuerOps.xer_decoder = IssuerIdentifier_xer_decoder; - tbsOps.oer_encoder = ToBeSignedCertificate_oer_encoder; - signatureOps.oer_encoder = Signature_oer_encoder; - countryOnlyOps.xer_decoder = CountryOnly_xer_decoder; - publicVerificationKeyOps.oer_decoder = PublicVerificationKey_oer_decoder; - serviceSpecificPermissionsOps.oer_decoder = ServiceSpecificPermissions_oer_decoder; - time32Ops.print_struct = Time32_print_struct; - - if(_view) { - char hash[50], hash_hex[256]; - size_t hLen; - rc_d = asn_decode(NULL, ATS_BASIC_OER, &asn_DEF_EtsiTs103097Certificate, (void**)&cert, buf, ebuf - buf); - if (rc_d.code != RC_OK){ - fprintf(stderr, "%s: failed to load at position %d\n %.30s\n", argv[1], (int)rc_d.consumed, buf + rc_d.consumed); - return -1; - } - if (!_xer){ - if (cert->toBeSigned.verifyKeyIndicator.present == VerificationKeyIndicator_PR_verificationKey && - cert->toBeSigned.verifyKeyIndicator.choice.verificationKey.present == PublicVerificationKey_PR_ecdsaBrainpoolP384r1) { - hLen = 48; - sha384_calculate(hash, (const char*)buf, rc_d.consumed); - } - else{ - hLen = 32; - sha256_calculate(hash, (const char*)buf, rc_d.consumed); - } - *_bin2hex(hash_hex, sizeof(hash_hex), hash, hLen) = 0; - } - - rc_e = asn_encode_to_buffer(NULL, _xer ? ATS_CANONICAL_XER : ATS_NONSTANDARD_PLAINTEXT, &asn_DEF_EtsiTs103097Certificate, cert, buf, CERT_MAX_SIZE); - if (rc_e.encoded <0){ - fprintf(stderr, "%s: %s encoding failed for %s\n", argv[1], _xer ? "XER" : "text", rc_e.failed_type->name); - return -1; - } - if (!_xer){ - fprintf(stderr, "Hash : %s\n", hash_hex); - fprintf(stderr, "Digest: %s\n", hash_hex + (hLen-8) * 2); - } - fwrite(buf, 1, rc_e.encoded, stdout); - return 0; - } - - void * rv_req_key = NULL; - void * rv_eph_key = NULL; - - PublicVerificationKey_PR hashType = PublicVerificationKey_PR_NOTHING; - - rc_d = asn_decode(NULL, ATS_BASIC_XER, &asn_DEF_EtsiTs103097Certificate, (void**)&cert, buf, ebuf - buf); - if (rc_d.code != RC_OK){ - fprintf(stderr, "%s: failed to load at position %d\n %.30s\n", _profileName, (int)rc_d.consumed, buf + rc_d.consumed); - return -1; - } - - //check signer - if (!_signerName && cert->issuer.present != IssuerIdentifier_PR_self){ - fprintf(stderr, "%s: unknown signer\n", argv[1]); - return -1; - } - if (_signerName){ - cvstrncpy(buf, CERT_MAX_SIZE, _searchPath, "/", _signerName, ".oer", NULL); - ebuf = cstrnload(buf, CERT_MAX_SIZE, buf); - if (ebuf == NULL){ - fprintf(stderr, "%s: signer certificate not found", _signerName); - return -1; - } - // decode it to detect hash algorythm - asn_dec_rval_t rc_d; - EtsiTs103097Certificate_t * signer = NULL; - rc_d = asn_decode(NULL, ATS_BASIC_OER, &asn_DEF_EtsiTs103097Certificate, (void**)&signer, buf, ebuf - buf); - if (rc_d.code != RC_OK){ - fprintf(stderr, "%s: failed to load signer certificate at position %d\n %.30s\n", _signerName, (int)rc_d.consumed, buf + rc_d.consumed); - return -1; - } - switch (signer->toBeSigned.verifyKeyIndicator.present){ - case VerificationKeyIndicator_PR_verificationKey: - hashType = signer->toBeSigned.verifyKeyIndicator.choice.verificationKey.present; - break; - case VerificationKeyIndicator_PR_reconstructionValue: - hashType = PublicVerificationKey_PR_ecdsaNistP256; - break; - case VerificationKeyIndicator_PR_NOTHING: - fprintf(stderr, "%s: signer verification indicator type is unknown\n", _signerName); - return -1; - } - _tbsHashType = hashType; - - if (signer->signature && signer->signature->choice.ecdsaNistP256Signature.rSig.present != EccP256CurvePoint_PR_x_only) { - char* pTypePtr = buf + rc_d.consumed - 1 - (2 * _pk_type_to_hashsize[hashType]); - *pTypePtr = 0x80; - } - - switch (hashType){ - case PublicVerificationKey_PR_ecdsaBrainpoolP256r1: - case PublicVerificationKey_PR_ecdsaNistP256: - if (cert->issuer.present == IssuerIdentifier_PR_NOTHING) - cert->issuer.present = IssuerIdentifier_PR_sha256AndDigest; - sha256_calculate(_signerHashBuf, buf, ebuf - buf); - _signerHash = &_signerHashBuf[0]; - _signerHashLength = sha256_hash_size; - OCTET_STRING_fromBuf(&cert->issuer.choice.sha256AndDigest, &_signerHash[sha256_hash_size-8], 8); - break; - case PublicVerificationKey_PR_ecdsaBrainpoolP384r1: - case PublicVerificationKey_PR_ecdsaNistP384: - if (cert->issuer.present == IssuerIdentifier_PR_NOTHING) - cert->issuer.present = IssuerIdentifier_PR_sha384AndDigest; - sha384_calculate(_signerHashBuf, buf, ebuf - buf); - _signerHash = &_signerHashBuf[0]; - _signerHashLength = sha384_hash_size; - OCTET_STRING_fromBuf(&cert->issuer.choice.sha384AndDigest, &_signerHash[sha384_hash_size - 8], 8); - break; - case PublicVerificationKey_PR_ecsigSm2: - default: - fprintf(stderr, "%s: signer verification key type curve is unknown\n", _signerName); - return -1; - } - if (signer){ - ASN_STRUCT_FREE(asn_DEF_EtsiTs103097Certificate, signer); - } - } else { - // self-signed - // use hash(empty string) - switch (cert->toBeSigned.verifyKeyIndicator.present){ - case VerificationKeyIndicator_PR_verificationKey: - hashType = cert->toBeSigned.verifyKeyIndicator.choice.verificationKey.present; - break; - case VerificationKeyIndicator_PR_reconstructionValue: - fprintf(stderr, "%s: self-signed certificate can not contain reconstruction value\n", _signerName); - return -1; - case VerificationKeyIndicator_PR_NOTHING: - fprintf(stderr, "%s: signer verification indicator type is unknown\n", _signerName); - return -1; - } - - _tbsHashType = hashType; - - switch (hashType) { - case PublicVerificationKey_PR_ecdsaBrainpoolP256r1: - case PublicVerificationKey_PR_ecdsaNistP256: - _signerHash = &sha256_emptyString[0]; - _signerHashLength = sha256_hash_size; - break; - case PublicVerificationKey_PR_ecdsaBrainpoolP384r1: - case PublicVerificationKey_PR_ecdsaNistP384: - _signerHash = &sha384_emptyString[0]; - _signerHashLength = sha384_hash_size; - break; - case PublicVerificationKey_PR_ecsigSm2: - _signerHash = &sm3_emptyString[0]; - _signerHashLength = sm3_hash_size; - break; - default: - fprintf(stderr, "Unknown verification key curve type\n"); - return -1; - } - } - - char gSuffix[8] = { 0x00 }; - for (int gi = 1; gi <= _genCount; gi++) { - if (_genCount > 1) { - sprintf(gSuffix, ".%03d", gi); - } - // generate keys if necessary - // buf = name of private key file - int rc = -1; - cvstrncpy(buf, CERT_MAX_SIZE, _keyPath, "/", _certName, gSuffix, EXT_VKEY, NULL); - switch (cert->toBeSigned.verifyKeyIndicator.present) { - case VerificationKeyIndicator_PR_verificationKey: - switch (cert->toBeSigned.verifyKeyIndicator.choice.verificationKey.present) { - case PublicVerificationKey_PR_ecdsaNistP256: - rc = fill_curve_point_eccP256(&cert->toBeSigned.verifyKeyIndicator.choice.verificationKey.choice.ecdsaNistP256, ecies_nistp256, buf); - break; - case PublicVerificationKey_PR_ecdsaBrainpoolP256r1: - rc = fill_curve_point_eccP256(&cert->toBeSigned.verifyKeyIndicator.choice.verificationKey.choice.ecdsaBrainpoolP256r1, ecies_brainpoolp256r, buf); - break; - case PublicVerificationKey_PR_ecdsaBrainpoolP384r1: - rc = fill_curve_point_eccP384(&cert->toBeSigned.verifyKeyIndicator.choice.verificationKey.choice.ecdsaBrainpoolP384r1, ecies_brainpoolp384r, buf); - break; - case PublicVerificationKey_PR_ecdsaNistP384: - rc = fill_curve_point_eccP384(&cert->toBeSigned.verifyKeyIndicator.choice.verificationKey.choice.ecdsaNistP384, ecies_nistp384, buf); - break; - default: - fprintf(stderr, "Unknown verification key curve type\n"); - return -1; - } - if (rc < 0) { - fprintf(stderr, "%s: Cannot prepare verification key of type %s\n", buf, - asn_MBR_PublicVerificationKey_1[cert->toBeSigned.verifyKeyIndicator.choice.verificationKey.present - 1].name - ); - return -1; - } - break; - case VerificationKeyIndicator_PR_reconstructionValue: - rv_req_key = ecc_key_gen(ecies_nistp256); - // look for CA key - rv_eph_key = fill_reconstruction_value(&cert->toBeSigned.verifyKeyIndicator.choice.reconstructionValue, rv_req_key); - if (rv_eph_key == NULL) { - fprintf(stderr, "%s: Cannot calculate reconstruction value \n", buf); - ecc_key_free(rv_req_key); - rv_req_key = NULL; - return -1; - } - rc = 0; - break; - case VerificationKeyIndicator_PR_NOTHING: - default: - fprintf(stderr, "%s: Unknown verification key indicator type %d\n", buf, cert->toBeSigned.verifyKeyIndicator.present - 1); - break; - } - if (rc < 0) { - return -1; - } - if (cert->toBeSigned.encryptionKey) { - rc = -1; - cvstrncpy(buf, CERT_MAX_SIZE, _keyPath, "/", _certName, gSuffix, EXT_EKEY, NULL); - switch (cert->toBeSigned.encryptionKey->publicKey.present) { - case BasePublicEncryptionKey_PR_NOTHING: - cert->toBeSigned.encryptionKey->publicKey.present = BasePublicEncryptionKey_PR_eciesNistP256; - case BasePublicEncryptionKey_PR_eciesNistP256: - rc = fill_curve_point_eccP256(&cert->toBeSigned.encryptionKey->publicKey.choice.eciesNistP256, ecies_nistp256, buf); - break; - case BasePublicEncryptionKey_PR_eciesBrainpoolP256r1: - rc = fill_curve_point_eccP256(&cert->toBeSigned.encryptionKey->publicKey.choice.eciesBrainpoolP256r1, ecies_brainpoolp256r, buf); - break; - default: - fprintf(stderr, "Unknown encryption key curve type %d\n", cert->toBeSigned.encryptionKey->publicKey.present); - break; - } - if (rc < 0) { - fprintf(stderr, "%s: Cannot prepare encryption key\n", buf); - return -1; - } - } - - cvstrncpy(buf, CERT_MAX_SIZE, _outPath, "/", _certName, gSuffix, EXT_CERT, NULL); - f = fopen(buf, "wb"); - if (f == NULL) { - perror(buf); - return -1; - } - - _cert = cert; - // Encode as OER - rc_e = asn_encode_to_buffer(NULL, ATS_CANONICAL_OER, &asn_DEF_EtsiTs103097Certificate, cert, buf, CERT_MAX_SIZE); - if (rc_e.encoded < 0) { - fprintf(stderr, "%s: OER encoding failed for %s\n", _certName, rc_e.failed_type->name); - return -1; - } - fwrite(buf, 1, rc_e.encoded, f); - fclose(f); - - if (rv_eph_key) { - const char* sName = _signerName; - if (sName == NULL && _cert->issuer.present == IssuerIdentifier_PR_self) - sName = _certName; - - void* ca = search_private_key(sName, ecies_nistp256); - if (ca == NULL) { - fprintf(stderr, "FATAL: Private key for %s not found\n", sName); - } - - char h[48]; - int hl = 0; - // calculate joint hash - memcpy(_tbsHash + _tbsHashLength, _signerHash, _signerHashLength); - sha256_calculate(h, _tbsHash, _tbsHashLength + _signerHashLength); - hl = sha256_hash_size; - - if (_debug) { - char hex[48 * 3 + 1]; - *_bin2hex(hex, sizeof(hex), _tbsHash, _tbsHashLength) = 0; - fprintf(stderr, "DEBUG: ToBeSignedHash[%d]=%s\n", _tbsHashLength, hex); - *_bin2hex(hex, sizeof(hex), _signerHash, _signerHashLength) = 0; - fprintf(stderr, "DEBUG: SignerHash[%d]=%s\n", _signerHashLength, hex); - *_bin2hex(hex, sizeof(hex), h, hl) = 0; - fprintf(stderr, "DEBUG: JoinedHash[%d]=%s\n", hl, hex); - } - - cvstrncpy(buf, CERT_MAX_SIZE, _keyPath, "/", _certName, NULL); - process_reconstruction_value(rv_req_key, rv_eph_key, ca, h, buf); - ecc_key_free(ca); - ecc_key_free(rv_eph_key); - ecc_key_free(rv_req_key); - } - } - if (cert) { - ASN_STRUCT_FREE(asn_DEF_EtsiTs103097Certificate, cert); - } - return 0; -} - -static int is_CurvePoint_empty(EccP256CurvePoint_t* point) -{ - switch (point->present){ - case EccP256CurvePoint_PR_x_only: - case EccP256CurvePoint_PR_compressed_y_0: - case EccP256CurvePoint_PR_compressed_y_1: - return point->choice.x_only.size < 32; - case EccP256CurvePoint_PR_uncompressedP256: - return point->choice.uncompressedP256.x.size < 32 || point->choice.uncompressedP256.y.size < 32; - default: - break; - } - return 1; -} - -static void * gen_or_load_public_key(ecc_curve_id curveType, char * keyPath) -{ - void * key = NULL; - char * e_pub = keyPath + strlen(keyPath); - if(!_force){ - // check for public key - strcpy(e_pub, EXT_PUB); - key = ecc_key_public_load(keyPath, curveType); - if (_debug && key){ - fprintf(stderr, "DEBUG: use pre-generated key %s\n", keyPath); - } - *e_pub = 0; - } else { - remove(keyPath); - } - if (key == NULL){ - key = ecc_key_private_load(keyPath, curveType); - if (key == NULL){ - if (_no_gen){ - fprintf(stderr, "ERROR: Key %s or %s%s not found\n", keyPath, keyPath, EXT_PUB); - return NULL; - } - if (_debug){ - fprintf(stderr, "DEBUG: generate key %s\n", keyPath); - } - key = ecc_key_gen(curveType); - if(key == NULL){ - fprintf(stderr, "ERROR: key %s generation failed for curve %s\n", keyPath, _pk_curve_names[curveType & 7]); - return NULL; - } - ecc_key_private_save(key, keyPath, _outKeyFormat); - strcpy(e_pub, EXT_PUB); - ecc_key_public_save(key, keyPath, _outKeyFormat, 0); - } else { - if (_debug){ - fprintf(stderr, "DEBUG: use pre-generated key %s\n", keyPath); - } - } - } - return key; -} - -static int fill_curve_point_eccP256(EccP256CurvePoint_t* point, ecc_curve_id curveType, char * keyPath) -{ - return fill_curve_point_eccP384((EccP384CurvePoint_t*)point, curveType, keyPath); -} - -static void _fill_curve_point(EccP384CurvePoint_t * point, int fsize, const char * x, const char * y, int sign) -{ - OCTET_STRING_fromBuf(&point->choice.x_only, x, fsize); - if (point->present == EccP384CurvePoint_PR_uncompressedP384){ - OCTET_STRING_fromBuf(&point->choice.uncompressedP384.y, y, fsize); - } - else if (point->present == EccP384CurvePoint_PR_compressed_y_0 || point->present == EccP384CurvePoint_PR_compressed_y_1){ - point->present = sign ? EccP384CurvePoint_PR_compressed_y_1 : EccP384CurvePoint_PR_compressed_y_0; - } -} - -static int fill_curve_point_eccP384(EccP384CurvePoint_t* point, ecc_curve_id curveType, char * keyPath) -{ - char x[48], y[48]; - int compressed_y; - int fsize; - int rc = -1; - void * key = gen_or_load_public_key(curveType, keyPath); - if(NULL == key) return -1; - - fsize = ecc_key_public(key, x, y, &compressed_y); - - if (fsize > 0){ - _fill_curve_point(point, fsize, x, y, compressed_y); - if (_debug){ - char hex [256]; - *_bin2hex(hex, sizeof(hex), x, fsize) = 0; - fprintf(stderr, "DEBUG: %s_pub.x=%s\n", keyPath, hex); - *_bin2hex(hex, sizeof(hex), y, fsize) = 0; - fprintf(stderr, "DEBUG: %s_pub.y=%s\n", keyPath, hex); - } - rc = 0; - }else{ - fprintf(stderr, "ERROR: %s - unknown public key\n", keyPath); - } - ecc_key_free(key); - return rc; -} - -static void * fill_reconstruction_value(EccP256CurvePoint_t * point, void * r_key) -{ - char x[48], y[48]; - int compressed_y; - - void * eph = ecc_recvalue(r_key, x, y, &compressed_y); - if(eph){ - - _fill_curve_point((EccP384CurvePoint_t*)point, sha256_hash_size, x, y, compressed_y); - } - return eph; -} - -static void process_reconstruction_value(void * r_key, void * eph, void * ca, unsigned char * H, char * keyPath){ - // reconstruct private key - void * u_key = ecc_reconstruct(r_key, eph, ca, H); - if(u_key){ - char * e = keyPath + strlen(keyPath); - e = cstrcpy(e, EXT_VKEY); - ecc_key_private_save(u_key, keyPath, _outKeyFormat); - strcpy(e, EXT_PUB); - ecc_key_public_save(u_key, keyPath, _outKeyFormat, 0); - ecc_key_free(u_key); - } -} +#ifndef _CRT_SECURE_NO_WARNINGS +#define _CRT_SECURE_NO_WARNINGS +#endif +#include +#include +#include "../cshared/copts.h" +#include "../cshared/cstr.h" +#include "ecc_api.h" +#include +#include "mkgmtime.h" + +#include "asn_application.h" +#include "EtsiTs103097Certificate.h" +#include "CountryOnly.h" +#include "xer_support.h" + +#define CERT_MAX_SIZE 0x10000 + +static const char * _outPath = "."; +static const char * _searchPath = NULL; +static const char * _certName = NULL; +static char * _profileName = NULL; +static char * _signerName = NULL; +static ecc_format _outKeyFormat = ecc_bin; +static const char * _keyPath = NULL; +static int _force = 0; +static int _no_gen = 0; +static const char * _cfgFile = NULL; +static int _debug = 0; +static int _xer = 0; +static int _view = 0; +int _genCount = 1; + +EtsiTs103097Certificate_t * _cert = NULL; +EtsiTs103097Certificate_t * _issuer = NULL; + +int _tbsHashType = 0; +char _tbsHash[512]; // has space for issuer hash + signer hash +int _tbsHashLength = 0; + +char _signerHashBuf[256]; // has space for issuer hash +const char* _signerHash = &_signerHashBuf[0]; +int _signerHashLength = 0; + +static const char * const _key_formats[] = { + "bin", "hex", "pem", NULL +}; + +typedef struct { + const char * cert; + const char * vkey; + const char * vkey_pub; + const char * ekey; + const char * ekey_pub; +} extensions_t; + +#define EXT_CERT ".oer" +#define EXT_VKEY ".vkey" +#define EXT_EKEY ".ekey" +#define EXT_PUB "_pub" + +static copt_t _options [] = { + { "h?", "help", COPT_HELP, NULL, "Print this help page" }, + { "C", "config", COPT_CFGFILE, (void*)&_cfgFile, "Config file path [no cfg file]" }, + { "o", "out", COPT_STR, (void*)&_outPath, "Output path [current dir by default]" }, + { "k", "key-format", COPT_STRENUM, (void*)_key_formats, "Keys output format (bin|hex|pem)[binary by default]" }, + { "S", "certs", COPT_STR, (void*)&_searchPath, "Certificates search path [Output path by default]" }, + { "K", "keys", COPT_STR, (void*)&_keyPath, "Private key storage path [Output path by default]" }, + { "f", "force", COPT_BOOL, (void*)&_force, "Force regenerate existing certificate and keys. [use existing by default]" }, + { "e", "no-generate", COPT_BOOL, (void*)&_no_gen, "Do not generate keys. [generate if necessary by default]" }, + { "n", "name", COPT_STR, (void*)&_certName, "Certificate name (take from profile by default)" }, + { "s", "signer", COPT_STR, (void*)&_signerName, "Signer certificate name [take from profile by default]" }, + { "g", "count", COPT_INT, (void*)&_genCount, "Generate multiple certificates [generate 1 certificate by default]" }, + { "D", "debug", COPT_BOOL, (void*)&_debug, "Dump hashes and other values [false]" }, + { "v", "view", COPT_BOOL, (void*)&_view, "View OER certificate [false]" }, + { "x", "oxer", COPT_BOOL, (void*)&_xer, "Decode OER certificate to XER [false]" }, + { NULL, NULL, COPT_END, NULL, NULL } +}; + +char * _bin2hex(char * hex, size_t hlen, const char * bin, size_t blen); + +static int is_CurvePoint_empty(EccP256CurvePoint_t* point); + +static int fill_curve_point_eccP256(EccP256CurvePoint_t* point, ecc_curve_id curveType, char * keyPath); +static int fill_curve_point_eccP384(EccP384CurvePoint_t* point, ecc_curve_id curveType, char * keyPath); +static void * fill_reconstruction_value(EccP256CurvePoint_t * point, void * r_key); +static void process_reconstruction_value(void * r_key, void * eph, void * ca, unsigned char * H, char * keyPath); + +static int _issuer_parser_cb(pxml_chunk_type_e _type, + const void *_chunk_data, size_t _chunk_size, void *_key) +{ + char * f = cstrnstr((const char *)_chunk_data, _chunk_size, "name=\""); + if (f){ + _signerName = f + 6; + f = cstrchr(_signerName, '"'); + _signerName = cstrndup(_signerName, f - _signerName); + } + return -1; +} + +static asn_dec_rval_t IssuerIdentifier_xer_decoder(const asn_codec_ctx_t *opt_codec_ctx, + const asn_TYPE_descriptor_t *td, void **struct_ptr, + const char *opt_mname, const void *buf_ptr, size_t size) +{ + if (_signerName == NULL){ + int stateContext = 0; + pxml_parse(&stateContext, buf_ptr, size, _issuer_parser_cb, NULL); + } + return CHOICE_decode_xer(opt_codec_ctx, td, struct_ptr, opt_mname, buf_ptr, size); +} + +static asn_dec_rval_t CountryOnly_xer_decoder(const asn_codec_ctx_t *opt_codec_ctx, + const asn_TYPE_descriptor_t *td, void **struct_ptr, + const char *opt_mname, const void *buf_ptr, size_t size) +{ + // for the future to support letter codes + return NativeInteger_decode_xer(opt_codec_ctx, td, struct_ptr, opt_mname, buf_ptr, size); +} + + +typedef struct overrun_encoder_key { + void *buffer; + size_t buffer_size; + size_t computed_size; +}overrun_encoder_key; + + +static asn_enc_rval_t ToBeSignedCertificate_oer_encoder(const asn_TYPE_descriptor_t *td, + const asn_oer_constraints_t *constraints, const void *sptr, + asn_app_consume_bytes_f *cb, void *app_key) +{ + asn_enc_rval_t rc; + overrun_encoder_key *a = (overrun_encoder_key*)app_key; + const char * oer = ((const char*)a->buffer) + a->computed_size; + rc = SEQUENCE_encode_oer(td, constraints, sptr, cb, app_key); + if (rc.encoded > 0){ + if(_debug){ + char hex[257*2]; + *_bin2hex(hex, sizeof(hex)-1, oer, ((rc.encoded>256)?256:rc.encoded)) = 0; + fprintf(stderr, "DEBUG: ToBeSigned OER[%zu]=%s\n", rc.encoded, hex); + } + // calculate hash + if (_signerHashLength == sha384_hash_size) { + _tbsHashLength = 48; + sha384_calculate(_tbsHash, (const char*)oer, rc.encoded); + } + else { + _tbsHashLength = 32; + sha256_calculate(_tbsHash, (const char*)oer, rc.encoded); + } + } + return rc; +} + +static ecc_curve_id _pk_type_to_curveid[] = { + 0, + ecies_nistp256, //Signature_PR_ecdsaNistP256Signature, + ecies_brainpoolp256r, //Signature_PR_ecdsaBrainpoolP256r1Signature, + ecies_brainpoolp384r, //Signature_PR_ecdsaBrainpoolP384r1Signature, + ecies_nistp384, //Signature_PR_ecdsaNistP384Signature +}; + +static const char _unsupported [] = "unsupported"; +static const char * _pk_curve_names[] = { + "nistp256", + "brainpoolp256r", + "brainpoolp384r", + "nistp384", + "sm2", + &_unsupported[0], + &_unsupported[0], + &_unsupported[0] +}; + +static ecc_curve_id _pk_type_to_hashid[] = { + 0, + sha_256, //Signature_PR_ecdsaNistP256Signature, + sha_256, //Signature_PR_ecdsaBrainpoolP256r1Signature, + sha_384, //Signature_PR_ecdsaBrainpoolP384r1Signature + sha_384, //Signature_PR_ecdsaNistP384Signature, + sm3 //Signature_PR_sm2Signature +}; + +static size_t _pk_type_to_hashsize[] = { + 0, + sha256_hash_size, //Signature_PR_ecdsaNistP256Signature, + sha256_hash_size, //Signature_PR_ecdsaBrainpoolP256r1Signature, + sha384_hash_size, //Signature_PR_ecdsaBrainpoolP384r1Signature + sha384_hash_size, //Signature_PR_ecdsaNistP384Signature, + sm3_hash_size //Signature_PR_sm2Signature +}; + +static void * search_private_key(const char * sName, ecc_curve_id alg) +{ + char* pk = cvstrdup(_keyPath, "/", sName, EXT_VKEY, NULL); + void *k = ecc_key_private_load(pk, alg); + if (k==NULL){ + free(pk); + pk = cvstrdup(_searchPath, "/", sName, EXT_VKEY, NULL); + k = ecc_key_private_load(pk, alg); + if (k==NULL){ + fprintf(stderr, "%s: Private key not found\n", pk); + } + } + free(pk); + return k; +} + + +static asn_enc_rval_t Signature_oer_encoder(const asn_TYPE_descriptor_t *td, + const asn_oer_constraints_t *constraints, const void *sptr, + asn_app_consume_bytes_f *cb, void *app_key) +{ + Signature_t * s = (Signature_t *)sptr; + if (is_CurvePoint_empty(&s->choice.ecdsaNistP256Signature.rSig)){ + // look for signer private key + ecc_curve_id alg = _pk_type_to_curveid[s->present]; + ecc_hash_id hashId = _pk_type_to_hashid[s->present]; + const char * sName = _signerName; + + if (sName == NULL && _cert->issuer.present == IssuerIdentifier_PR_self) + sName = _certName; + + void * k = search_private_key(sName, alg); + if(k == NULL){ + ASN__ENCODE_FAILED; + } + + char h[48]; + int hl = 0; + // calculate joint hash + memcpy(_tbsHash+_tbsHashLength, _signerHash, _signerHashLength); + switch (hashId) + { + case sha_256: + sha256_calculate(h, _tbsHash, _tbsHashLength + _signerHashLength); + hl = sha256_hash_size; + break; + case sha_384: + sha384_calculate(h, _tbsHash, _tbsHashLength + _signerHashLength); + hl = sha384_hash_size; + break; + case sm3: + sm3_calculate(h, _tbsHash, _tbsHashLength + _signerHashLength); + hl = sm3_hash_size; + break; + } + + if (_debug){ + char hex[48*3+1]; + *_bin2hex(hex, sizeof(hex), _tbsHash, _tbsHashLength) = 0; + fprintf(stderr, "DEBUG: ToBeSignedHash[%d]=%s\n", _tbsHashLength, hex); + *_bin2hex(hex, sizeof(hex), _signerHash, _signerHashLength) = 0; + fprintf(stderr, "DEBUG: SignerHash[%d]=%s\n", _signerHashLength, hex); + *_bin2hex(hex, sizeof(hex), h, hl) = 0; + fprintf(stderr, "DEBUG: JoinedHash[%d]=%s\n",hl, hex); + } + + // initialize buffers + OCTET_STRING_fromBuf(&s->choice.ecdsaNistP256Signature.rSig.choice.x_only, h, hl); + OCTET_STRING_fromBuf(&s->choice.ecdsaNistP256Signature.sSig, h, hl); + + ecc_sign(k, h, hl, s->choice.ecdsaNistP256Signature.rSig.choice.x_only.buf, s->choice.ecdsaNistP256Signature.sSig.buf); + } + return asn_OP_CHOICE.oer_encoder(td, constraints, sptr, cb, app_key); +} + +static asn_dec_rval_t PublicVerificationKey_oer_decoder(const struct asn_codec_ctx_s *opt_codec_ctx, + const struct asn_TYPE_descriptor_s *td, const asn_oer_constraints_t *constraints, + void **struct_ptr, const void *buf_ptr, size_t size) +{ + return asn_OP_CHOICE.oer_decoder(opt_codec_ctx, td, constraints, struct_ptr, buf_ptr, size); +} + +static asn_dec_rval_t ServiceSpecificPermissions_oer_decoder(const struct asn_codec_ctx_s *opt_codec_ctx, + const struct asn_TYPE_descriptor_s *td, const asn_oer_constraints_t *constraints, + void **struct_ptr, const void *buf_ptr, size_t size) +{ + return asn_OP_CHOICE.oer_decoder(opt_codec_ctx, td, constraints, struct_ptr, buf_ptr, size); +} + + +static int Time32_print_struct(const asn_TYPE_descriptor_t *td, const void *sptr, + int ilevel, asn_app_consume_bytes_f *cb, void *app_key) { + int rc = NativeInteger_print(td, sptr, ilevel, cb, app_key); + if(rc == 0){ + const long *native = (const long *)sptr; + if(native) { + const char * s = stritsdate32(*native); + if(s){ + if(cb(" --(", 4, app_key) < 0) return -1; + if(cb(s, strlen(s), app_key) < 0) return -1; + if(cb(")", 1, app_key) < 0) return -1; + } + } + } + return rc; +} +int main(int argc, char ** argv) +{ + // set default time to the begining of this year + //_setup_default_time(); + + //parse options + argc = coptions(argc, argv, COPT_NOAUTOHELP , _options); + if(argc < 2){ + if(argc<0 && (((int)0)-argc)<((sizeof(_options)/sizeof(_options[0]))-1)){ + printf("Unknown option %s\n", argv[0-argc]); + } + + if(COPT_EHELP != argc){ + const char * a = strrchr(argv[0], '/'); + if (a == NULL) a = argv[0]; + coptions_help(stdout, a, COPT_HELP_NOVALUES, _options, " [signer] [count]"); + return -1; + } + } + + if (_searchPath == NULL) _searchPath = _outPath; + if (_keyPath == NULL) _keyPath = _outPath; + if(_xer) _view = 1; + + _outKeyFormat = copts_enum_value(_options, 3, _key_formats); + + if (argc > 2) { + // set signer certificate file name + _signerName = argv[2]; + } + + if(ecc_api_init()){ + fprintf(stderr, "Cannot initialize ECC engine\n"); + return -1; + } + + _profileName = cstrdup(cstrlastpathelement(argv[1])); + if(_profileName){ + char * p = strrchr(_profileName, '.'); + if(p) *p = 0; + } + if (_certName == NULL) { + _certName = _profileName; + } + + + //load XER file + char * buf = malloc(CERT_MAX_SIZE); + char * ebuf; + EtsiTs103097Certificate_t * cert = NULL; + + ebuf = cstrnload(buf, CERT_MAX_SIZE, argv[1]); + if(ebuf == NULL){ + fprintf(stderr, "%s: Certificate%s not found\n", argv[1], (_view)?"":" profile"); + return -1; + } + + FILE * f; + asn_dec_rval_t rc_d; + asn_enc_rval_t rc_e; + + asn_TYPE_operation_t issuerOps = *asn_DEF_IssuerIdentifier.op; + asn_DEF_IssuerIdentifier.op = &issuerOps; + + asn_TYPE_operation_t tbsOps = *asn_DEF_ToBeSignedCertificate.op; + asn_DEF_ToBeSignedCertificate.op = &tbsOps; + + asn_TYPE_operation_t signatureOps = *asn_DEF_Signature.op; + asn_DEF_Signature.op = &signatureOps; + + asn_TYPE_operation_t countryOnlyOps = *asn_DEF_CountryOnly.op; + asn_DEF_CountryOnly.op = &countryOnlyOps; + + asn_TYPE_operation_t publicVerificationKeyOps = *asn_DEF_PublicVerificationKey.op; + asn_DEF_PublicVerificationKey.op = &publicVerificationKeyOps; + + asn_TYPE_operation_t serviceSpecificPermissionsOps = *asn_DEF_ServiceSpecificPermissions.op; + asn_DEF_ServiceSpecificPermissions.op = &serviceSpecificPermissionsOps; + + asn_TYPE_operation_t time32Ops = *asn_DEF_Time32.op; + asn_DEF_Time32.op = &time32Ops; + + issuerOps.xer_decoder = IssuerIdentifier_xer_decoder; + tbsOps.oer_encoder = ToBeSignedCertificate_oer_encoder; + signatureOps.oer_encoder = Signature_oer_encoder; + countryOnlyOps.xer_decoder = CountryOnly_xer_decoder; + publicVerificationKeyOps.oer_decoder = PublicVerificationKey_oer_decoder; + serviceSpecificPermissionsOps.oer_decoder = ServiceSpecificPermissions_oer_decoder; + time32Ops.print_struct = Time32_print_struct; + + if(_view) { + char hash[50], hash_hex[256]; + size_t hLen; + rc_d = asn_decode(NULL, ATS_BASIC_OER, &asn_DEF_EtsiTs103097Certificate, (void**)&cert, buf, ebuf - buf); + if (rc_d.code != RC_OK){ + fprintf(stderr, "%s: failed to load at position %d\n %.30s\n", argv[1], (int)rc_d.consumed, buf + rc_d.consumed); + return -1; + } + if (!_xer){ + if (cert->toBeSigned.verifyKeyIndicator.present == VerificationKeyIndicator_PR_verificationKey && + cert->toBeSigned.verifyKeyIndicator.choice.verificationKey.present == PublicVerificationKey_PR_ecdsaBrainpoolP384r1) { + hLen = 48; + sha384_calculate(hash, (const char*)buf, rc_d.consumed); + } + else{ + hLen = 32; + sha256_calculate(hash, (const char*)buf, rc_d.consumed); + } + *_bin2hex(hash_hex, sizeof(hash_hex), hash, hLen) = 0; + } + + rc_e = asn_encode_to_buffer(NULL, _xer ? ATS_CANONICAL_XER : ATS_NONSTANDARD_PLAINTEXT, &asn_DEF_EtsiTs103097Certificate, cert, buf, CERT_MAX_SIZE); + if (rc_e.encoded <0){ + fprintf(stderr, "%s: %s encoding failed for %s\n", argv[1], _xer ? "XER" : "text", rc_e.failed_type->name); + return -1; + } + if (!_xer){ + fprintf(stderr, "Hash : %s\n", hash_hex); + fprintf(stderr, "Digest: %s\n", hash_hex + (hLen-8) * 2); + } + fwrite(buf, 1, rc_e.encoded, stdout); + return 0; + } + + void * rv_req_key = NULL; + void * rv_eph_key = NULL; + + PublicVerificationKey_PR hashType = PublicVerificationKey_PR_NOTHING; + + rc_d = asn_decode(NULL, ATS_BASIC_XER, &asn_DEF_EtsiTs103097Certificate, (void**)&cert, buf, ebuf - buf); + if (rc_d.code != RC_OK){ + fprintf(stderr, "%s: failed to load at position %d\n %.30s\n", _profileName, (int)rc_d.consumed, buf + rc_d.consumed); + return -1; + } + + //check signer + if (!_signerName && cert->issuer.present != IssuerIdentifier_PR_self){ + fprintf(stderr, "%s: unknown signer\n", argv[1]); + return -1; + } + if (_signerName){ + cvstrncpy(buf, CERT_MAX_SIZE, _searchPath, "/", _signerName, ".oer", NULL); + ebuf = cstrnload(buf, CERT_MAX_SIZE, buf); + if (ebuf == NULL){ + fprintf(stderr, "%s: signer certificate not found", _signerName); + return -1; + } + // decode it to detect hash algorythm + asn_dec_rval_t rc_d; + EtsiTs103097Certificate_t * signer = NULL; + rc_d = asn_decode(NULL, ATS_BASIC_OER, &asn_DEF_EtsiTs103097Certificate, (void**)&signer, buf, ebuf - buf); + if (rc_d.code != RC_OK){ + fprintf(stderr, "%s: failed to load signer certificate at position %d\n %.30s\n", _signerName, (int)rc_d.consumed, buf + rc_d.consumed); + return -1; + } + switch (signer->toBeSigned.verifyKeyIndicator.present){ + case VerificationKeyIndicator_PR_verificationKey: + hashType = signer->toBeSigned.verifyKeyIndicator.choice.verificationKey.present; + break; + case VerificationKeyIndicator_PR_reconstructionValue: + hashType = PublicVerificationKey_PR_ecdsaNistP256; + break; + case VerificationKeyIndicator_PR_NOTHING: + fprintf(stderr, "%s: signer verification indicator type is unknown\n", _signerName); + return -1; + } + _tbsHashType = hashType; + + if (signer->signature && signer->signature->choice.ecdsaNistP256Signature.rSig.present != EccP256CurvePoint_PR_x_only) { + char* pTypePtr = buf + rc_d.consumed - 1 - (2 * _pk_type_to_hashsize[hashType]); + *pTypePtr = 0x80; + } + + switch (hashType){ + case PublicVerificationKey_PR_ecdsaBrainpoolP256r1: + case PublicVerificationKey_PR_ecdsaNistP256: + if (cert->issuer.present == IssuerIdentifier_PR_NOTHING) + cert->issuer.present = IssuerIdentifier_PR_sha256AndDigest; + sha256_calculate(_signerHashBuf, buf, ebuf - buf); + _signerHash = &_signerHashBuf[0]; + _signerHashLength = sha256_hash_size; + OCTET_STRING_fromBuf(&cert->issuer.choice.sha256AndDigest, &_signerHash[sha256_hash_size-8], 8); + break; + case PublicVerificationKey_PR_ecdsaBrainpoolP384r1: + case PublicVerificationKey_PR_ecdsaNistP384: + if (cert->issuer.present == IssuerIdentifier_PR_NOTHING) + cert->issuer.present = IssuerIdentifier_PR_sha384AndDigest; + sha384_calculate(_signerHashBuf, buf, ebuf - buf); + _signerHash = &_signerHashBuf[0]; + _signerHashLength = sha384_hash_size; + OCTET_STRING_fromBuf(&cert->issuer.choice.sha384AndDigest, &_signerHash[sha384_hash_size - 8], 8); + break; + case PublicVerificationKey_PR_ecsigSm2: + default: + fprintf(stderr, "%s: signer verification key type curve is unknown\n", _signerName); + return -1; + } + if (signer){ + ASN_STRUCT_FREE(asn_DEF_EtsiTs103097Certificate, signer); + } + } else { + // self-signed + // use hash(empty string) + switch (cert->toBeSigned.verifyKeyIndicator.present){ + case VerificationKeyIndicator_PR_verificationKey: + hashType = cert->toBeSigned.verifyKeyIndicator.choice.verificationKey.present; + break; + case VerificationKeyIndicator_PR_reconstructionValue: + fprintf(stderr, "%s: self-signed certificate can not contain reconstruction value\n", _signerName); + return -1; + case VerificationKeyIndicator_PR_NOTHING: + fprintf(stderr, "%s: signer verification indicator type is unknown\n", _signerName); + return -1; + } + + _tbsHashType = hashType; + + switch (hashType) { + case PublicVerificationKey_PR_ecdsaBrainpoolP256r1: + case PublicVerificationKey_PR_ecdsaNistP256: + _signerHash = &sha256_emptyString[0]; + _signerHashLength = sha256_hash_size; + break; + case PublicVerificationKey_PR_ecdsaBrainpoolP384r1: + case PublicVerificationKey_PR_ecdsaNistP384: + _signerHash = &sha384_emptyString[0]; + _signerHashLength = sha384_hash_size; + break; + case PublicVerificationKey_PR_ecsigSm2: + _signerHash = &sm3_emptyString[0]; + _signerHashLength = sm3_hash_size; + break; + default: + fprintf(stderr, "Unknown verification key curve type\n"); + return -1; + } + } + + char gSuffix[8] = { 0x00 }; + for (int gi = 1; gi <= _genCount; gi++) { + if (_genCount > 1) { + sprintf(gSuffix, ".%03d", gi); + } + // generate keys if necessary + // buf = name of private key file + int rc = -1; + cvstrncpy(buf, CERT_MAX_SIZE, _keyPath, "/", _certName, gSuffix, EXT_VKEY, NULL); + switch (cert->toBeSigned.verifyKeyIndicator.present) { + case VerificationKeyIndicator_PR_verificationKey: + switch (cert->toBeSigned.verifyKeyIndicator.choice.verificationKey.present) { + case PublicVerificationKey_PR_ecdsaNistP256: + rc = fill_curve_point_eccP256(&cert->toBeSigned.verifyKeyIndicator.choice.verificationKey.choice.ecdsaNistP256, ecies_nistp256, buf); + break; + case PublicVerificationKey_PR_ecdsaBrainpoolP256r1: + rc = fill_curve_point_eccP256(&cert->toBeSigned.verifyKeyIndicator.choice.verificationKey.choice.ecdsaBrainpoolP256r1, ecies_brainpoolp256r, buf); + break; + case PublicVerificationKey_PR_ecdsaBrainpoolP384r1: + rc = fill_curve_point_eccP384(&cert->toBeSigned.verifyKeyIndicator.choice.verificationKey.choice.ecdsaBrainpoolP384r1, ecies_brainpoolp384r, buf); + break; + case PublicVerificationKey_PR_ecdsaNistP384: + rc = fill_curve_point_eccP384(&cert->toBeSigned.verifyKeyIndicator.choice.verificationKey.choice.ecdsaNistP384, ecies_nistp384, buf); + break; + default: + fprintf(stderr, "Unknown verification key curve type\n"); + return -1; + } + if (rc < 0) { + fprintf(stderr, "%s: Cannot prepare verification key of type %s\n", buf, + asn_MBR_PublicVerificationKey_1[cert->toBeSigned.verifyKeyIndicator.choice.verificationKey.present - 1].name + ); + return -1; + } + break; + case VerificationKeyIndicator_PR_reconstructionValue: + rv_req_key = ecc_key_gen(ecies_nistp256); + // look for CA key + rv_eph_key = fill_reconstruction_value(&cert->toBeSigned.verifyKeyIndicator.choice.reconstructionValue, rv_req_key); + if (rv_eph_key == NULL) { + fprintf(stderr, "%s: Cannot calculate reconstruction value \n", buf); + ecc_key_free(rv_req_key); + rv_req_key = NULL; + return -1; + } + rc = 0; + break; + case VerificationKeyIndicator_PR_NOTHING: + default: + fprintf(stderr, "%s: Unknown verification key indicator type %d\n", buf, cert->toBeSigned.verifyKeyIndicator.present - 1); + break; + } + if (rc < 0) { + return -1; + } + if (cert->toBeSigned.encryptionKey) { + rc = -1; + cvstrncpy(buf, CERT_MAX_SIZE, _keyPath, "/", _certName, gSuffix, EXT_EKEY, NULL); + switch (cert->toBeSigned.encryptionKey->publicKey.present) { + case BasePublicEncryptionKey_PR_NOTHING: + cert->toBeSigned.encryptionKey->publicKey.present = BasePublicEncryptionKey_PR_eciesNistP256; + case BasePublicEncryptionKey_PR_eciesNistP256: + rc = fill_curve_point_eccP256(&cert->toBeSigned.encryptionKey->publicKey.choice.eciesNistP256, ecies_nistp256, buf); + break; + case BasePublicEncryptionKey_PR_eciesBrainpoolP256r1: + rc = fill_curve_point_eccP256(&cert->toBeSigned.encryptionKey->publicKey.choice.eciesBrainpoolP256r1, ecies_brainpoolp256r, buf); + break; + default: + fprintf(stderr, "Unknown encryption key curve type %d\n", cert->toBeSigned.encryptionKey->publicKey.present); + break; + } + if (rc < 0) { + fprintf(stderr, "%s: Cannot prepare encryption key\n", buf); + return -1; + } + } + + cvstrncpy(buf, CERT_MAX_SIZE, _outPath, "/", _certName, gSuffix, EXT_CERT, NULL); + f = fopen(buf, "wb"); + if (f == NULL) { + perror(buf); + return -1; + } + + _cert = cert; + // Encode as OER + rc_e = asn_encode_to_buffer(NULL, ATS_CANONICAL_OER, &asn_DEF_EtsiTs103097Certificate, cert, buf, CERT_MAX_SIZE); + if (rc_e.encoded < 0) { + fprintf(stderr, "%s: OER encoding failed for %s\n", _certName, rc_e.failed_type->name); + return -1; + } + fwrite(buf, 1, rc_e.encoded, f); + fclose(f); + + if (rv_eph_key) { + const char* sName = _signerName; + if (sName == NULL && _cert->issuer.present == IssuerIdentifier_PR_self) + sName = _certName; + + void* ca = search_private_key(sName, ecies_nistp256); + if (ca == NULL) { + fprintf(stderr, "FATAL: Private key for %s not found\n", sName); + } + + char h[48]; + int hl = 0; + // calculate joint hash + memcpy(_tbsHash + _tbsHashLength, _signerHash, _signerHashLength); + sha256_calculate(h, _tbsHash, _tbsHashLength + _signerHashLength); + hl = sha256_hash_size; + + if (_debug) { + char hex[48 * 3 + 1]; + *_bin2hex(hex, sizeof(hex), _tbsHash, _tbsHashLength) = 0; + fprintf(stderr, "DEBUG: ToBeSignedHash[%d]=%s\n", _tbsHashLength, hex); + *_bin2hex(hex, sizeof(hex), _signerHash, _signerHashLength) = 0; + fprintf(stderr, "DEBUG: SignerHash[%d]=%s\n", _signerHashLength, hex); + *_bin2hex(hex, sizeof(hex), h, hl) = 0; + fprintf(stderr, "DEBUG: JoinedHash[%d]=%s\n", hl, hex); + } + + cvstrncpy(buf, CERT_MAX_SIZE, _keyPath, "/", _certName, NULL); + process_reconstruction_value(rv_req_key, rv_eph_key, ca, h, buf); + ecc_key_free(ca); + ecc_key_free(rv_eph_key); + ecc_key_free(rv_req_key); + } + } + if (cert) { + ASN_STRUCT_FREE(asn_DEF_EtsiTs103097Certificate, cert); + } + return 0; +} + +static int is_CurvePoint_empty(EccP256CurvePoint_t* point) +{ + switch (point->present){ + case EccP256CurvePoint_PR_x_only: + case EccP256CurvePoint_PR_compressed_y_0: + case EccP256CurvePoint_PR_compressed_y_1: + return point->choice.x_only.size < 32; + case EccP256CurvePoint_PR_uncompressedP256: + return point->choice.uncompressedP256.x.size < 32 || point->choice.uncompressedP256.y.size < 32; + default: + break; + } + return 1; +} + +static void * gen_or_load_public_key(ecc_curve_id curveType, char * keyPath) +{ + void * key = NULL; + char * e_pub = keyPath + strlen(keyPath); + if(!_force){ + // check for public key + strcpy(e_pub, EXT_PUB); + key = ecc_key_public_load(keyPath, curveType); + if (_debug && key){ + fprintf(stderr, "DEBUG: use pre-generated key %s\n", keyPath); + } + *e_pub = 0; + } else { + remove(keyPath); + } + if (key == NULL){ + key = ecc_key_private_load(keyPath, curveType); + if (key == NULL){ + if (_no_gen){ + fprintf(stderr, "ERROR: Key %s or %s%s not found\n", keyPath, keyPath, EXT_PUB); + return NULL; + } + if (_debug){ + fprintf(stderr, "DEBUG: generate key %s\n", keyPath); + } + key = ecc_key_gen(curveType); + if(key == NULL){ + fprintf(stderr, "ERROR: key %s generation failed for curve %s\n", keyPath, _pk_curve_names[curveType & 7]); + return NULL; + } + ecc_key_private_save(key, keyPath, _outKeyFormat); + strcpy(e_pub, EXT_PUB); + ecc_key_public_save(key, keyPath, _outKeyFormat, 0); + } else { + if (_debug){ + fprintf(stderr, "DEBUG: use pre-generated key %s\n", keyPath); + } + } + } + return key; +} + +static int fill_curve_point_eccP256(EccP256CurvePoint_t* point, ecc_curve_id curveType, char * keyPath) +{ + return fill_curve_point_eccP384((EccP384CurvePoint_t*)point, curveType, keyPath); +} + +static void _fill_curve_point(EccP384CurvePoint_t * point, int fsize, const char * x, const char * y, int sign) +{ + OCTET_STRING_fromBuf(&point->choice.x_only, x, fsize); + if (point->present == EccP384CurvePoint_PR_uncompressedP384){ + OCTET_STRING_fromBuf(&point->choice.uncompressedP384.y, y, fsize); + } + else if (point->present == EccP384CurvePoint_PR_compressed_y_0 || point->present == EccP384CurvePoint_PR_compressed_y_1){ + point->present = sign ? EccP384CurvePoint_PR_compressed_y_1 : EccP384CurvePoint_PR_compressed_y_0; + } +} + +static int fill_curve_point_eccP384(EccP384CurvePoint_t* point, ecc_curve_id curveType, char * keyPath) +{ + char x[48], y[48]; + int compressed_y; + int fsize; + int rc = -1; + void * key = gen_or_load_public_key(curveType, keyPath); + if(NULL == key) return -1; + + fsize = ecc_key_public(key, x, y, &compressed_y); + + if (fsize > 0){ + _fill_curve_point(point, fsize, x, y, compressed_y); + if (_debug){ + char hex [256]; + *_bin2hex(hex, sizeof(hex), x, fsize) = 0; + fprintf(stderr, "DEBUG: %s_pub.x=%s\n", keyPath, hex); + *_bin2hex(hex, sizeof(hex), y, fsize) = 0; + fprintf(stderr, "DEBUG: %s_pub.y=%s\n", keyPath, hex); + } + rc = 0; + }else{ + fprintf(stderr, "ERROR: %s - unknown public key\n", keyPath); + } + ecc_key_free(key); + return rc; +} + +static void * fill_reconstruction_value(EccP256CurvePoint_t * point, void * r_key) +{ + char x[48], y[48]; + int compressed_y; + + void * eph = ecc_recvalue(r_key, x, y, &compressed_y); + if(eph){ + + _fill_curve_point((EccP384CurvePoint_t*)point, sha256_hash_size, x, y, compressed_y); + } + return eph; +} + +static void process_reconstruction_value(void * r_key, void * eph, void * ca, unsigned char * H, char * keyPath){ + // reconstruct private key + void * u_key = ecc_reconstruct(r_key, eph, ca, H); + if(u_key){ + char * e = keyPath + strlen(keyPath); + e = cstrcpy(e, EXT_VKEY); + ecc_key_private_save(u_key, keyPath, _outKeyFormat); + strcpy(e, EXT_PUB); + ecc_key_public_save(u_key, keyPath, _outKeyFormat, 0); + ecc_key_free(u_key); + } +} diff --git a/certgen/certidx.c b/certgen/certidx.c index baccbeae464bc9c08b064474eb2bcaa2d93ee9d4..ec169ab1303f2858e5b633f3d3e92e901a084372 100644 --- a/certgen/certidx.c +++ b/certgen/certidx.c @@ -1,233 +1,233 @@ -#ifndef _CRT_SECURE_NO_WARNINGS -#define _CRT_SECURE_NO_WARNINGS -#endif -#include -#include "../cshared/copts.h" -#include "../cshared/cstr.h" - -#include "EtsiTs103097Certificate.h" - -#if defined(CYGWIN) || !defined(WIN32) -#include - -#if !defined(_GLOB_H_) && 0 -#define _GLOB_H_ -typedef struct { - size_t gl_pathc; /* Count of total paths so far. */ - size_t gl_matchc; /* Count of paths matching pattern. */ - size_t gl_offs; /* Reserved at beginning of gl_pathv. */ - int gl_flags; /* Copy of flags parameter to glob. */ - char **gl_pathv; /* List of paths matching pattern. */ -}glob_t; - -int glob (const char * pattern, int flags , int (*)(const char *, int), glob_t * gl); -void globfree (glob_t *); -int glob_pattern_p (const char *, int); - -#endif // _GLOB_H_ -#endif - -#include "ecc_api.h" - -#define CERT_MAX_SIZE 0x10000 - -static const char * _outPath = "-"; -static int _canonicalize = 1; -static int _fnames = 0; -static FILE * _out; - -static copt_t _options [] = { - { "h?", "help", COPT_HELP, NULL, "Print this help page" }, - { "o", "out", COPT_STR, (void*)&_outPath, "Output path [stdout by default]" }, - { "C", "no-canonicalize", COPT_BOOLI, (void*)&_canonicalize, "No canonicalize" }, - { "n", "fnames", COPT_BOOL, (void*)&_fnames, "Use file names instead of IDs" }, - { NULL, NULL, COPT_END, NULL, NULL } -}; - -char * _bin2hex(char * hex, size_t hlen, const char * bin, size_t blen); - -HashAlgorithm_t CertificateWholeHashAlgorithm(const EtsiTs103097Certificate_t * const cert, const char * name); - -int process_cert(const pchar_t * name, uint8_t * buf, const uint8_t * end); - -static ecc_curve_id _pk_type_to_curveid[] = { - 0, - ecies_nistp256, //Signature_PR_ecdsaNistP256Signature, - ecies_brainpoolp256r, //Signature_PR_ecdsaBrainpoolP256r1Signature, - ecies_brainpoolp384r //Signature_PR_ecdsaBrainpoolP384r1Signature -}; - -int main(int argc, char ** argv) -{ - //parse options - argc = coptions(argc, argv, COPT_HELP_NOVALUES , _options); - if(argc < 2){ - if(argc < 0 && (0-argc)<((sizeof(_options)/sizeof(_options[0]))-1)){ - printf("Unknown option %s\n", argv[0-argc]); - } - const char * a = strrchr(argv[0], '/'); - if (a == NULL) a = argv[0]; - coptions_help(stdout, a, COPT_HELP_NOVALUES, _options, "... certificate files ..."); - return -1; - } - - if(ecc_api_init()){ - fprintf(stderr, "Cannot initialize ECC engine\n"); - return -1; - } - - if(!cstrequal("-", _outPath)){ - _out = fopen(_outPath, "wb"); - if(_out == NULL){ - perror(_outPath); - return -1; - } - }else{ - _out = stdout; - } - - char * buf = malloc(CERT_MAX_SIZE); - char * ebuf; - - for(int argi=1; argi 0){ - const pchar_t* fname = cstrlastpathelement(argv[argi]); - if(!_fnames) *cstrpathextension(fname) = 0; - process_cert(fname, buf, ebuf); - }else{ - // check if it is a mask -#if defined(_GLOB_H_) - glob_t gl = {0}; - if(0 == glob( argv[argi], 0, NULL, &gl )){ - for (size_t i=0; i 0) { - const pchar_t* fname = cstrlastpathelement(gl.gl_pathv[i]); - if(!_fnames) *cstrpathextension(fname) = 0; - process_cert(fname, buf, ebuf); - } - } - globfree (&gl); - } -#elif defined(WIN32) -// try use the FindFile approach - WIN32_FIND_DATA fd; - size_t len = cstrlen(argv[argi]); - pchar_t * path = cstralloc(len + MAX_PATH); - cstrcpy(path, argv[argi]); - pchar_t * fname = (pchar_t*) cstrlastpathelement(path); - HANDLE h = FindFirstFile(path, &fd); - if(INVALID_HANDLE_VALUE != h) do { - cstrcpy(fname, fd.cFileName); - ebuf = cstrnload(buf, CERT_MAX_SIZE, path); - if(ebuf && (ebuf - buf) > 0){ - if(!_fnames) *cstrpathextension(fname) = 0; - process_cert(fname, buf, ebuf); - } - }while(FindNextFile(h, &fd)); - FindClose(h); -#endif - } - } - free(buf); - return 0; -} - -typedef struct its_asn_codec_ctx_s { - asn_codec_ctx_t ctx; - ecc_curve_id curve; - size_t mcount; - struct { - uint8_t* ptr; - size_t shift; - }move[8]; -}its_asn_codec_ctx_t; - -static int update_ecc_curve(ecc_curve_id curve, EccP256CurvePoint_t* p) -{ - if (p->present == EccP256CurvePoint_PR_uncompressedP256 || p->present == EccP256CurvePoint_PR_x_only) { - void* key = ecc_key_public_set(curve, p->present - 1, p->choice.uncompressedP256.x.buf, p->choice.uncompressedP256.y.buf); - if (key) { - int sign; - char x[48], y[48]; - ecc_key_public(key, &x[0], &y[0], &sign); - p->present = EccP256CurvePoint_PR_compressed_y_0 + (sign ? 1 : 0); - ecc_key_free(key); - return 1; - } - } - return 0; -} - -int process_cert(const pchar_t * name, uint8_t * buf, const uint8_t * ebuf) -{ - // determine the hash alg - EtsiTs103097Certificate_t * cert = NULL; - asn_dec_rval_t rc_d; - its_asn_codec_ctx_t ctx = {{0}}; - int updated = 0; - HashAlgorithm_t halg; - rc_d = asn_decode(&ctx.ctx, ATS_BASIC_OER, &asn_DEF_EtsiTs103097Certificate, (void**)&cert, buf, ebuf - buf); - if (rc_d.code != RC_OK){ - fprintf(stderr, "%s: ERROR: failed to load at position %d\n %.30s\n", name, (int)rc_d.consumed, buf + rc_d.consumed); - return -1; - } - - if (_canonicalize) { - if (cert->toBeSigned.verifyKeyIndicator.present == VerificationKeyIndicator_PR_verificationKey) { - // use ecdsaBrainpoolP256r1. other variantes has the same structure - updated += update_ecc_curve(_pk_type_to_curveid[cert->toBeSigned.verifyKeyIndicator.choice.verificationKey.present], - &cert->toBeSigned.verifyKeyIndicator.choice.verificationKey.choice.ecdsaNistP256); - } - else if (cert->toBeSigned.verifyKeyIndicator.present == VerificationKeyIndicator_PR_reconstructionValue) { - if (cert->toBeSigned.verifyKeyIndicator.choice.reconstructionValue.present != EccP256CurvePoint_PR_compressed_y_0 && - cert->toBeSigned.verifyKeyIndicator.choice.reconstructionValue.present != EccP256CurvePoint_PR_compressed_y_1) { - fprintf(stderr, "%s: ERROR: reconstruction value should be in compressed form\n", name); - return -1; - } - } - if (cert->toBeSigned.encryptionKey) { - updated += update_ecc_curve(_pk_type_to_curveid[cert->toBeSigned.encryptionKey->publicKey.present], - &cert->toBeSigned.encryptionKey->publicKey.choice.eciesNistP256); - } - - if (cert->signature) { - if (cert->signature->choice.ecdsaNistP256Signature.rSig.present != EccP256CurvePoint_PR_x_only) { - cert->signature->choice.ecdsaNistP256Signature.rSig.present = EccP256CurvePoint_PR_x_only; - updated++; - } - } - if (updated) { - asn_enc_rval_t rc_e = asn_encode_to_buffer(NULL, ATS_CANONICAL_OER, &asn_DEF_EtsiTs103097Certificate, cert, buf, CERT_MAX_SIZE); - if (rc_e.encoded < 0) { - fprintf(stderr, "%s: ERROR: OER encoding failed for canonicalized certificate at type %s\n", name, rc_e.failed_type->name); - return -1; - } - rc_d.consumed = rc_e.encoded; - } - } - - halg = CertificateWholeHashAlgorithm(cert, name); - - ASN_STRUCT_FREE(asn_DEF_EtsiTs103097Certificate, cert); - - uint8_t hash[256]; - uint8_t * digest; - switch(halg) { - case HashAlgorithm_sha256: - sha256_calculate(&hash[0], buf, rc_d.consumed); - digest = &hash[32 - 8]; - break; - case HashAlgorithm_sha384: - sha384_calculate(&hash[0], buf, rc_d.consumed); - digest = &hash[48 - 8]; - break; - default: - return -1; - } - char hex[20]; - * cstr_bin2hex(hex, sizeof(hex), digest, 8) = 0; - fprintf(_out, "%s %s\n", hex, name); - return 0; -} +#ifndef _CRT_SECURE_NO_WARNINGS +#define _CRT_SECURE_NO_WARNINGS +#endif +#include +#include "../cshared/copts.h" +#include "../cshared/cstr.h" + +#include "EtsiTs103097Certificate.h" + +#if defined(CYGWIN) || !defined(WIN32) +#include + +#if !defined(_GLOB_H_) && 0 +#define _GLOB_H_ +typedef struct { + size_t gl_pathc; /* Count of total paths so far. */ + size_t gl_matchc; /* Count of paths matching pattern. */ + size_t gl_offs; /* Reserved at beginning of gl_pathv. */ + int gl_flags; /* Copy of flags parameter to glob. */ + char **gl_pathv; /* List of paths matching pattern. */ +}glob_t; + +int glob (const char * pattern, int flags , int (*)(const char *, int), glob_t * gl); +void globfree (glob_t *); +int glob_pattern_p (const char *, int); + +#endif // _GLOB_H_ +#endif + +#include "ecc_api.h" + +#define CERT_MAX_SIZE 0x10000 + +static const char * _outPath = "-"; +static int _canonicalize = 1; +static int _fnames = 0; +static FILE * _out; + +static copt_t _options [] = { + { "h?", "help", COPT_HELP, NULL, "Print this help page" }, + { "o", "out", COPT_STR, (void*)&_outPath, "Output path [stdout by default]" }, + { "C", "no-canonicalize", COPT_BOOLI, (void*)&_canonicalize, "No canonicalize" }, + { "n", "fnames", COPT_BOOL, (void*)&_fnames, "Use file names instead of IDs" }, + { NULL, NULL, COPT_END, NULL, NULL } +}; + +char * _bin2hex(char * hex, size_t hlen, const char * bin, size_t blen); + +HashAlgorithm_t CertificateWholeHashAlgorithm(const EtsiTs103097Certificate_t * const cert, const char * name); + +int process_cert(const pchar_t * name, uint8_t * buf, const uint8_t * end); + +static ecc_curve_id _pk_type_to_curveid[] = { + 0, + ecies_nistp256, //Signature_PR_ecdsaNistP256Signature, + ecies_brainpoolp256r, //Signature_PR_ecdsaBrainpoolP256r1Signature, + ecies_brainpoolp384r //Signature_PR_ecdsaBrainpoolP384r1Signature +}; + +int main(int argc, char ** argv) +{ + //parse options + argc = coptions(argc, argv, COPT_HELP_NOVALUES , _options); + if(argc < 2){ + if(argc < 0 && (0-argc)<((sizeof(_options)/sizeof(_options[0]))-1)){ + printf("Unknown option %s\n", argv[0-argc]); + } + const char * a = strrchr(argv[0], '/'); + if (a == NULL) a = argv[0]; + coptions_help(stdout, a, COPT_HELP_NOVALUES, _options, "... certificate files ..."); + return -1; + } + + if(ecc_api_init()){ + fprintf(stderr, "Cannot initialize ECC engine\n"); + return -1; + } + + if(!cstrequal("-", _outPath)){ + _out = fopen(_outPath, "wb"); + if(_out == NULL){ + perror(_outPath); + return -1; + } + }else{ + _out = stdout; + } + + char * buf = malloc(CERT_MAX_SIZE); + char * ebuf; + + for(int argi=1; argi 0){ + const pchar_t* fname = cstrlastpathelement(argv[argi]); + if(!_fnames) *cstrpathextension(fname) = 0; + process_cert(fname, buf, ebuf); + }else{ + // check if it is a mask +#if defined(_GLOB_H_) + glob_t gl = {0}; + if(0 == glob( argv[argi], 0, NULL, &gl )){ + for (size_t i=0; i 0) { + const pchar_t* fname = cstrlastpathelement(gl.gl_pathv[i]); + if(!_fnames) *cstrpathextension(fname) = 0; + process_cert(fname, buf, ebuf); + } + } + globfree (&gl); + } +#elif defined(WIN32) +// try use the FindFile approach + WIN32_FIND_DATA fd; + size_t len = cstrlen(argv[argi]); + pchar_t * path = cstralloc(len + MAX_PATH); + cstrcpy(path, argv[argi]); + pchar_t * fname = (pchar_t*) cstrlastpathelement(path); + HANDLE h = FindFirstFile(path, &fd); + if(INVALID_HANDLE_VALUE != h) do { + cstrcpy(fname, fd.cFileName); + ebuf = cstrnload(buf, CERT_MAX_SIZE, path); + if(ebuf && (ebuf - buf) > 0){ + if(!_fnames) *cstrpathextension(fname) = 0; + process_cert(fname, buf, ebuf); + } + }while(FindNextFile(h, &fd)); + FindClose(h); +#endif + } + } + free(buf); + return 0; +} + +typedef struct its_asn_codec_ctx_s { + asn_codec_ctx_t ctx; + ecc_curve_id curve; + size_t mcount; + struct { + uint8_t* ptr; + size_t shift; + }move[8]; +}its_asn_codec_ctx_t; + +static int update_ecc_curve(ecc_curve_id curve, EccP256CurvePoint_t* p) +{ + if (p->present == EccP256CurvePoint_PR_uncompressedP256 || p->present == EccP256CurvePoint_PR_x_only) { + void* key = ecc_key_public_set(curve, p->present - 1, p->choice.uncompressedP256.x.buf, p->choice.uncompressedP256.y.buf); + if (key) { + int sign; + char x[48], y[48]; + ecc_key_public(key, &x[0], &y[0], &sign); + p->present = EccP256CurvePoint_PR_compressed_y_0 + (sign ? 1 : 0); + ecc_key_free(key); + return 1; + } + } + return 0; +} + +int process_cert(const pchar_t * name, uint8_t * buf, const uint8_t * ebuf) +{ + // determine the hash alg + EtsiTs103097Certificate_t * cert = NULL; + asn_dec_rval_t rc_d; + its_asn_codec_ctx_t ctx = {{0}}; + int updated = 0; + HashAlgorithm_t halg; + rc_d = asn_decode(&ctx.ctx, ATS_BASIC_OER, &asn_DEF_EtsiTs103097Certificate, (void**)&cert, buf, ebuf - buf); + if (rc_d.code != RC_OK){ + fprintf(stderr, "%s: ERROR: failed to load at position %d\n %.30s\n", name, (int)rc_d.consumed, buf + rc_d.consumed); + return -1; + } + + if (_canonicalize) { + if (cert->toBeSigned.verifyKeyIndicator.present == VerificationKeyIndicator_PR_verificationKey) { + // use ecdsaBrainpoolP256r1. other variantes has the same structure + updated += update_ecc_curve(_pk_type_to_curveid[cert->toBeSigned.verifyKeyIndicator.choice.verificationKey.present], + &cert->toBeSigned.verifyKeyIndicator.choice.verificationKey.choice.ecdsaNistP256); + } + else if (cert->toBeSigned.verifyKeyIndicator.present == VerificationKeyIndicator_PR_reconstructionValue) { + if (cert->toBeSigned.verifyKeyIndicator.choice.reconstructionValue.present != EccP256CurvePoint_PR_compressed_y_0 && + cert->toBeSigned.verifyKeyIndicator.choice.reconstructionValue.present != EccP256CurvePoint_PR_compressed_y_1) { + fprintf(stderr, "%s: ERROR: reconstruction value should be in compressed form\n", name); + return -1; + } + } + if (cert->toBeSigned.encryptionKey) { + updated += update_ecc_curve(_pk_type_to_curveid[cert->toBeSigned.encryptionKey->publicKey.present], + &cert->toBeSigned.encryptionKey->publicKey.choice.eciesNistP256); + } + + if (cert->signature) { + if (cert->signature->choice.ecdsaNistP256Signature.rSig.present != EccP256CurvePoint_PR_x_only) { + cert->signature->choice.ecdsaNistP256Signature.rSig.present = EccP256CurvePoint_PR_x_only; + updated++; + } + } + if (updated) { + asn_enc_rval_t rc_e = asn_encode_to_buffer(NULL, ATS_CANONICAL_OER, &asn_DEF_EtsiTs103097Certificate, cert, buf, CERT_MAX_SIZE); + if (rc_e.encoded < 0) { + fprintf(stderr, "%s: ERROR: OER encoding failed for canonicalized certificate at type %s\n", name, rc_e.failed_type->name); + return -1; + } + rc_d.consumed = rc_e.encoded; + } + } + + halg = CertificateWholeHashAlgorithm(cert, name); + + ASN_STRUCT_FREE(asn_DEF_EtsiTs103097Certificate, cert); + + uint8_t hash[256]; + uint8_t * digest; + switch(halg) { + case HashAlgorithm_sha256: + sha256_calculate(&hash[0], buf, rc_d.consumed); + digest = &hash[32 - 8]; + break; + case HashAlgorithm_sha384: + sha384_calculate(&hash[0], buf, rc_d.consumed); + digest = &hash[48 - 8]; + break; + default: + return -1; + } + char hex[20]; + * cstr_bin2hex(hex, sizeof(hex), digest, 8) = 0; + fprintf(_out, "%s %s\n", hex, name); + return 0; +} diff --git a/certgen/ecc_api.h b/certgen/ecc_api.h index e3f1723b4bfb83b6096ee1c9a199c699e43c9428..48573d1b06f4371d7df9f4707f2dbdef7722190b 100644 --- a/certgen/ecc_api.h +++ b/certgen/ecc_api.h @@ -1,87 +1,87 @@ -/********************************************************************* -###################################################################### -## -## Created by: Denis Filatov -## -## Copyleft (c) 2015 -## This code is provided under the CeCill-C license agreement. -###################################################################### -*********************************************************************/ -#ifndef ecc_api_h -#define ecc_api_h - -#include - -#ifdef __cplusplus -extern "C" { -#endif - - - -typedef enum { - ecies_nistp256, - ecies_brainpoolp256r, - ecies_brainpoolp384r, - ecies_nistp384, - ecies_sm2 -}ecc_curve_id; - -int ecc_api_init(); -int ecc_api_done(); -const char* ecc_curve_name(ecc_curve_id curve); -typedef enum { - sha_256, - sha_384, - sm3 -}ecc_hash_id; - -typedef enum { - aes_128_ccm -}ecc_sym_algorithm; - -typedef enum { - ecc_bin, - ecc_hex, - ecc_pem -}ecc_format; - -typedef enum { - ecc_x_only = 0, - ecc_compressed_y0 = 2, - ecc_compressed_y1 = 3, - ecc_uncompressed = 4 -}ecc_point_type; - -extern const char sha256_emptyString[]; -extern const char sha384_emptyString[]; -extern const char sm3_emptyString[]; - -void * ecc_key_gen(ecc_curve_id pk_alg); -void * ecc_key_init(ecc_curve_id pk_alg, const char* pkey); -void ecc_key_free(void*); -int ecc_key_private(void*, char* buf); -int ecc_key_public(void*, char* x, char* y, int * psign); -int ecc_key_private_save(void*, const char* path, ecc_format format); -void * ecc_key_private_load(const char* path, ecc_curve_id pk_alg); -int ecc_key_public_save(void*, const char* path, ecc_format format, int compressed); -void * ecc_key_public_load(const char* path, ecc_curve_id pk_alg); -void * ecc_key_public_set(ecc_curve_id pk_alg, ecc_point_type ptype, const char * px, const char * py); - -#define sha256_hash_size 32 -#define sha384_hash_size 48 -#define sm3_hash_size 32 - -int sha256_calculate(char* hash, const char * ptr, size_t len); -int sha384_calculate(char* hash, const char * ptr, size_t len); -int sm3_calculate(char* hash, const char * ptr, size_t len); - -void * ecc_recvalue(void * req, char * px, char * py, int * psign); -void * ecc_reconstruct(void * req, void * eph, void * ca, unsigned char * H); - -int ecc_sign(void * key, const char * hash, int hlength, char *r, char *s); -int ecc_verify(void * key, const char * hash, int hlength, const char *r, const char *s); - -#ifdef __cplusplus -} -#endif -#endif +/********************************************************************* +###################################################################### +## +## Created by: Denis Filatov +## +## Copyleft (c) 2015 +## This code is provided under the CeCill-C license agreement. +###################################################################### +*********************************************************************/ +#ifndef ecc_api_h +#define ecc_api_h + +#include + +#ifdef __cplusplus +extern "C" { +#endif + + + +typedef enum { + ecies_nistp256, + ecies_brainpoolp256r, + ecies_brainpoolp384r, + ecies_nistp384, + ecies_sm2 +}ecc_curve_id; + +int ecc_api_init(); +int ecc_api_done(); +const char* ecc_curve_name(ecc_curve_id curve); +typedef enum { + sha_256, + sha_384, + sm3 +}ecc_hash_id; + +typedef enum { + aes_128_ccm +}ecc_sym_algorithm; + +typedef enum { + ecc_bin, + ecc_hex, + ecc_pem +}ecc_format; + +typedef enum { + ecc_x_only = 0, + ecc_compressed_y0 = 2, + ecc_compressed_y1 = 3, + ecc_uncompressed = 4 +}ecc_point_type; + +extern const char sha256_emptyString[]; +extern const char sha384_emptyString[]; +extern const char sm3_emptyString[]; + +void * ecc_key_gen(ecc_curve_id pk_alg); +void * ecc_key_init(ecc_curve_id pk_alg, const char* pkey); +void ecc_key_free(void*); +int ecc_key_private(void*, char* buf); +int ecc_key_public(void*, char* x, char* y, int * psign); +int ecc_key_private_save(void*, const char* path, ecc_format format); +void * ecc_key_private_load(const char* path, ecc_curve_id pk_alg); +int ecc_key_public_save(void*, const char* path, ecc_format format, int compressed); +void * ecc_key_public_load(const char* path, ecc_curve_id pk_alg); +void * ecc_key_public_set(ecc_curve_id pk_alg, ecc_point_type ptype, const char * px, const char * py); + +#define sha256_hash_size 32 +#define sha384_hash_size 48 +#define sm3_hash_size 32 + +int sha256_calculate(char* hash, const char * ptr, size_t len); +int sha384_calculate(char* hash, const char * ptr, size_t len); +int sm3_calculate(char* hash, const char * ptr, size_t len); + +void * ecc_recvalue(void * req, char * px, char * py, int * psign); +void * ecc_reconstruct(void * req, void * eph, void * ca, unsigned char * H); + +int ecc_sign(void * key, const char * hash, int hlength, char *r, char *s); +int ecc_verify(void * key, const char * hash, int hlength, const char *r, const char *s); + +#ifdef __cplusplus +} +#endif +#endif diff --git a/certgen/ecc_openssl.c b/certgen/ecc_openssl.c index cd6482e91fca067c475777b124d7288d0a321341..c7b216bf57e6d1c1f89afb2f5dd04d5d61d766d6 100644 --- a/certgen/ecc_openssl.c +++ b/certgen/ecc_openssl.c @@ -1,654 +1,654 @@ -/********************************************************************* -###################################################################### -## -## Created by: Denis Filatov -## -## Copyleft (c) 2015 -## This code is provided under the CeCill-C license agreement. -###################################################################### -*********************************************************************/ -#include -#include -#include -#include -#include -#include -#include - -#include "ecc_api.h" - -#define FIELD_SIZE 32 - -#define ARRAYSIZE(A) (sizeof(A)/sizeof(A[0])) - -#if OPENSSL_VERSION_NUMBER < 0x10101000L -#define EC_POINT_get_affine_coordinates EC_POINT_get_affine_coordinates_GFp -#define EC_POINT_set_affine_coordinates EC_POINT_set_affine_coordinates_GFp -#define EC_POINT_set_compressed_coordinates EC_POINT_set_compressed_coordinates_GFp -void ECDSA_SIG_get0(const ECDSA_SIG *sig, const BIGNUM **pr, const BIGNUM **ps) -{ if (pr != NULL) - *pr = sig->r; - if (ps != NULL) - *ps = sig->s; -} - -int ECDSA_SIG_set0(ECDSA_SIG *sig, BIGNUM *r, BIGNUM *s) -{ - if (r == NULL || s == NULL) - return 0; - BN_clear_free(sig->r); - BN_clear_free(sig->s); - sig->r = r; - sig->s = s; - return 1; -} -#endif -char * _bin2hex(char * hex, size_t hlen, const char * bin, size_t blen); - -typedef struct { - int nid; - const char * name; - size_t fsize; -}ecc_api_curve_data; - -static ecc_api_curve_data _config[] = { - { - NID_X9_62_prime256v1, SN_X9_62_prime256v1, 32 - }, - { - NID_brainpoolP256r1, SN_brainpoolP256r1, 32 - }, - { - NID_brainpoolP384r1, SN_brainpoolP384r1, 48 - }, - { - NID_secp384r1, SN_secp384r1, 48 - }, - { - NID_sm2, SN_sm2, 32 - }, -}; - -static EC_GROUP * _curves[ARRAYSIZE(_config)] = { NULL }; - -const char sha256_emptyString[] = { - 0xe3, 0xb0, 0xc4, 0x42, 0x98, 0xfc, 0x1c, 0x14, 0x9a, 0xfb, 0xf4, 0xc8, 0x99, 0x6f, 0xb9, 0x24, - 0x27, 0xae, 0x41, 0xe4, 0x64, 0x9b, 0x93, 0x4c, 0xa4, 0x95, 0x99, 0x1b, 0x78, 0x52, 0xb8, 0x55 -}; - -const char sha384_emptyString[] = { - 0x38, 0xb0, 0x60, 0xa7, 0x51, 0xac, 0x96, 0x38, 0x4c, 0xd9, 0x32, 0x7e, 0xb1, 0xb1, 0xe3, 0x6a, - 0x21, 0xfd, 0xb7, 0x11, 0x14, 0xbe, 0x07, 0x43, 0x4c, 0x0c, 0xc7, 0xbf, 0x63, 0xf6, 0xe1, 0xda, - 0x27, 0x4e, 0xde, 0xbf, 0xe7, 0x6f, 0x65, 0xfb, 0xd5, 0x1a, 0xd2, 0xf1, 0x48, 0x98, 0xb9, 0x5b -}; - -const char sm3_emptyString[] = { - 0x1A, 0xB2, 0x1D, 0x83, 0x55, 0xCF, 0xA1, 0x7F, 0x8E, 0x61, 0x19, 0x48, 0x31, 0xE8, 0x1A, 0x8F, - 0x22, 0xBE, 0xC8, 0xC7, 0x28, 0xFE, 0xFB, 0x74, 0x7E, 0xD0, 0x35, 0xEB, 0x50, 0x82, 0xAA, 0x2B -}; - -static BIGNUM * bn_256 = NULL; -int ecc_api_init() -{ - int i; - for (i = 0; i < ARRAYSIZE(_config); i++){ - _curves[i] = EC_GROUP_new_by_curve_name(_config[i].nid); - } - bn_256 = BN_new(); BN_set_word(bn_256, 256); - return 0; -} - -int ecc_api_done() -{ - int i; - for (i = 0; i < ARRAYSIZE(_config); i++){ - EC_GROUP_free(_curves[i]); - } - BN_free(bn_256); - return 0; -} - -const char* ecc_curve_name(ecc_curve_id curve) -{ - if (curve < ARRAYSIZE(_config)) { - return _config[curve].name; - } - return "unknown curve id"; -} - -static EC_KEY * EC_KEY_new_with_group(const EC_GROUP * g) -{ - EC_KEY * key = EC_KEY_new(); - if (key){ - EC_KEY_set_group(key, g); - EC_KEY_set_asn1_flag(key, OPENSSL_EC_NAMED_CURVE); - } - return key; -} - -static EC_KEY * EC_KEY_generate_with_group(const EC_GROUP * g) -{ - EC_KEY * key = EC_KEY_new(); - if (key){ - EC_KEY_set_group(key, g); - EC_KEY_set_asn1_flag(key, OPENSSL_EC_NAMED_CURVE); - if (!EC_KEY_generate_key(key)){ - ERR_print_errors_fp(stderr); - fflush(stderr); - EC_KEY_free(key); - key = NULL; - } - } - return key; -} - -void * ecc_key_gen(ecc_curve_id pk_alg) -{ - return EC_KEY_generate_with_group(_curves[pk_alg]); -} - -void * ecc_key_init(ecc_curve_id pk_alg, const char* priv_buf) -{ - EC_KEY * eckey = NULL; - BIGNUM * bn = BN_new(); - const EC_GROUP * group = _curves[pk_alg]; - int fsize = (EC_GROUP_get_degree(group) + 7) / 8; - if (group){ - if (BN_bin2bn((const unsigned char*)priv_buf, fsize, bn)){ - eckey = EC_KEY_new(); - if (eckey){ - if (EC_KEY_set_group(eckey, group)){ - if (EC_KEY_set_private_key(eckey, bn)){ - EC_POINT * point; - point = EC_POINT_new(group); - if (EC_POINT_mul(group, point, bn, NULL, NULL, NULL)){ - EC_KEY_set_public_key(eckey, point); - } - EC_POINT_free(point); - } - } - } - } - } - BN_free(bn); - return (void*)eckey; -} - -void ecc_key_free(void* key) -{ - EC_KEY_free(key); -} - -int ecc_key_private(void* key, char* buf) -{ - int len = -1; - if (key){ - const BIGNUM * bn; - bn = EC_KEY_get0_private_key(key); - if (bn){ - len = BN_num_bytes(bn); - if (buf){ - BN_bn2bin(bn, (unsigned char*)buf); - } - } - } - return len; -} - -static int ecc_fill_point(const EC_GROUP * g, const EC_POINT * p, char * px, char * py, int * psign) -{ - BIGNUM *x, *y; - int fsize = -1; - //fill public key data - x = BN_new(); - y = BN_new(); - if (EC_POINT_get_affine_coordinates_GFp(g, p, x, y, NULL)){ - fsize = (EC_GROUP_get_degree(g) + 7) / 8; - int bcount = BN_num_bytes(x); - for(; bcount < fsize; bcount++) - *(px++) = 0; // add padding with zeros - BN_bn2bin(x, (unsigned char*)px); - - bcount = BN_num_bytes(y); - for(; bcount < fsize; bcount++) - *(py++) = 0; // add padding with zeros - BN_bn2bin(y, (unsigned char*)py); - if (psign) * psign = BN_is_odd(y); - } - BN_clear_free(x); BN_clear_free(y); - return fsize; -} - -int ecc_key_public(void* key, char * px, char * py, int * psign) -{ - const EC_GROUP * ecgroup; - const EC_POINT * ecpoint; - const EC_KEY * eckey = (EC_KEY*)key; - if( key && px && py ) { - ecgroup = EC_KEY_get0_group(eckey); - ecpoint = EC_KEY_get0_public_key(eckey); - if(ecgroup && ecpoint){ - return ecc_fill_point(ecgroup, ecpoint, px, py, psign); - } - } - return -1; -} - -static int _pass_cb(char *buf, int size, int rwflag, void *u) -{ - fprintf(stderr, "Ask for a pass phrase"); - return 0; -} - -int ecc_key_private_save(void* key, const char* path, ecc_format format) -{ - int rc = -1; - EC_KEY * eckey = (EC_KEY *)key; - if (eckey){ - FILE * f = fopen(path, "wb"); - if (f){ - if (format == ecc_pem){ - rc = PEM_write_ECPrivateKey(f, eckey, NULL, NULL, 0, _pass_cb, NULL) ? 0 : -1; - if (rc < 0){ - ERR_print_errors_fp(stderr); - } - } - else{ - const EC_GROUP * ecgroup = EC_KEY_get0_group(eckey); - int fsize = (EC_GROUP_get_degree(ecgroup) + 7) / 8; - const BIGNUM * ecbn; - ecbn = EC_KEY_get0_private_key(eckey); - if (ecbn){ - int bnlen = BN_num_bytes(ecbn); - size_t len = (bnlen < fsize) ? fsize : bnlen; - char * buf = (char *)OPENSSL_malloc(len*2+1); - if (bnlen < len) memset(buf, 0, len - bnlen); - BN_bn2bin(ecbn, (unsigned char *)(buf + len - bnlen)); - if (format == ecc_hex){ - char * c = _bin2hex(buf, len * 2 + 1, buf, len); - *c = 0; - len = c - buf; - rc = 0; - } - rc = (len == fwrite(buf, 1, len, f)) ? 0 : -1; - OPENSSL_free(buf); - } - } - fclose(f); - if (rc < 0){ - ERR_print_errors_fp(stderr); - remove(path); - rc = -1; - } - } - else{ - perror(path); - } - } - return rc; -} - -void * ecc_key_private_load(const char* path, ecc_curve_id pk_alg) -{ - EC_KEY * eckey = NULL; - FILE * f = fopen(path, "rb"); - if (f){ - eckey = PEM_read_ECPrivateKey(f, NULL, NULL, NULL); - if (eckey == NULL){ - BIGNUM * bn = NULL; - fseek(f, 0, SEEK_END); - int len = ftell(f); - fseek(f, 0, SEEK_SET); - char * buf = OPENSSL_malloc(len + 1); - if (len == fread(buf, 1, len, f)){ - buf[len] = 0; - // try hex first - if (len != BN_hex2bn(&bn, buf)){ - if (bn){ - BN_free(bn); bn = NULL; - } - bn = BN_bin2bn((const unsigned char*)buf, len, NULL); - } - } - OPENSSL_free(buf); - if (bn){ - eckey = EC_KEY_new(); - if (eckey){ - EC_KEY_set_group(eckey, _curves[pk_alg]); - if (EC_KEY_set_private_key(eckey, bn)){ - EC_POINT * point; - const EC_GROUP * group; - group = EC_KEY_get0_group(eckey); - point = EC_POINT_new(group); - if (EC_POINT_mul(group, point, bn, NULL, NULL, NULL)){ - EC_KEY_set_public_key(eckey, point); - } - EC_POINT_free(point); - } - else{ - EC_KEY_free(eckey); eckey = NULL; - } - } - BN_free(bn); - } - } - fclose(f); - } - return eckey; -} - -int ecc_key_public_save(void* key, const char* path, ecc_format format, int compressed) -{ - EC_KEY * eckey = (EC_KEY *)key; - int rc = -1; - if (eckey){ - FILE * f = fopen(path, "wb"); - if (f){ - if (format == ecc_pem){ - rc = PEM_write_EC_PUBKEY(f, eckey) ? 0 : -1; - } - else{ - size_t len; - char * buf = NULL; - const EC_POINT * point = EC_KEY_get0_public_key(eckey); - const EC_GROUP * group = EC_KEY_get0_group(eckey); - point_conversion_form_t form = compressed ? POINT_CONVERSION_COMPRESSED : POINT_CONVERSION_UNCOMPRESSED; - - if (format == ecc_hex){ - buf = EC_POINT_point2hex(group, point, form, NULL); - len = strlen(buf); - } - else if (format == ecc_bin){ - len = EC_POINT_point2oct(group, point, form, NULL, 0, NULL); - if (len > 0){ - buf = OPENSSL_malloc(len + 1); - if (len != EC_POINT_point2oct(group, point, form, (unsigned char*)buf, len, NULL)){ - OPENSSL_free(buf); buf = NULL; - } - } - } - if (buf){ - if (len == fwrite(buf, 1, len, f)){ - rc = 0; - } - OPENSSL_free(buf); buf = NULL; - } - } - fclose(f); - if (rc < 0){ - ERR_print_errors_fp(stderr); - remove(path); - } - } - else{ - perror(path); - } - } - return rc; -} - -void * ecc_key_public_set(ecc_curve_id pk_alg, ecc_point_type ptype, const char * px, const char * py) -{ - EC_KEY * eckey = NULL; - EC_POINT * point = NULL; - const EC_GROUP * group; - BIGNUM *x, *y = NULL; - int rc = 0; - int fsize; - - group = _curves[pk_alg]; - point = EC_POINT_new(group); - fsize = (EC_GROUP_get_degree(group) + 7) / 8; - x = BN_bin2bn((const unsigned char*)px, fsize, NULL); - if (x){ - if (ptype == ecc_uncompressed){ - y = BN_bin2bn((const unsigned char*)py, fsize, NULL); - if (y){ - rc = EC_POINT_set_affine_coordinates_GFp(group, point, x, y, NULL); - BN_clear_free(y); - } - } - else { - rc = EC_POINT_set_compressed_coordinates_GFp(group, point, x, ptype & 1, NULL); - } - BN_clear_free(x); - if (rc){ - eckey = EC_KEY_new(); - if (eckey){ - EC_KEY_set_group(eckey, group); - EC_KEY_set_public_key(eckey, point); - } - } - } - EC_POINT_free(point); - return eckey; -} - -void * ecc_key_public_load(const char* path, ecc_curve_id pk_alg) -{ - EC_KEY * eckey = NULL; - FILE * f = fopen(path, "rb"); - EC_POINT * point = NULL; - const EC_GROUP * group = _curves[pk_alg]; - if (f){ - eckey = PEM_read_EC_PUBKEY(f, &eckey, NULL, NULL); - if (eckey == NULL){ - fseek(f, 0, SEEK_END); - size_t len = ftell(f); - fseek(f, 0, SEEK_SET); - char * buf = OPENSSL_malloc(len + 1); - if (len == fread(buf, 1, len, f)){ - buf[len] = 0; - // try hex first - point = EC_POINT_hex2point(group, buf, NULL, NULL); - if (point == NULL){ - // try oct - point = EC_POINT_new(group); - if (!EC_POINT_oct2point(group, point, (const unsigned char*)buf, len, NULL)){ - EC_POINT_free(point); - point = NULL; - } - } - if (point){ - eckey = EC_KEY_new(); - if (eckey){ - EC_KEY_set_group(eckey, group); - EC_KEY_set_public_key(eckey, point); - } - EC_POINT_free(point); - } - } - OPENSSL_free(buf); - } - fclose(f); - } - return eckey; -} - -int sha256_calculate(char* hash, const char * ptr, size_t len) -{ - SHA256_CTX ctx; - SHA256_Init(&ctx); - SHA256_Update(&ctx, ptr, len); - SHA256_Final((unsigned char*)hash, &ctx); - return 0; -} - -int sha384_calculate(char* hash, const char * ptr, size_t len) -{ - SHA512_CTX ctx; - SHA384_Init(&ctx); - SHA384_Update(&ctx, ptr, len); - SHA384_Final((unsigned char*)hash, &ctx); - return 0; -} - -int sm3_calculate(char* hash, const char * ptr, size_t len) -{ - SHA256_CTX ctx; - SHA256_Init(&ctx); - SHA256_Update(&ctx, ptr, len); - SHA256_Final((unsigned char*)hash, &ctx); - return 0; -} - -int ecc_sign(void * key, const char * hash, int hlength, char *r, char *s) -{ - EC_KEY * eckey; - - eckey = EC_KEY_dup((EC_KEY*)key); - if(eckey){ - ECDSA_SIG * ecdsa; - int fsize = (EC_GROUP_get_degree(EC_KEY_get0_group(eckey)) + 7) / 8; - ecdsa = ECDSA_do_sign(hash, hlength, eckey); - EC_KEY_free(eckey); - if (ecdsa){ - int i, bcount; - const BIGNUM* sr; - const BIGNUM* ss; -# if defined(OPENSSL_VERSION_NUMBER) && OPENSSL_VERSION_NUMBER >= 0x10100000L - ECDSA_SIG_get0(ecdsa, &sr, &ss); -#else - sr = ecdsa->r; - ss = ecdsa->s; -#endif - bcount = BN_num_bytes(sr); - for(i=bcount; i < fsize; i++) - *(r++) = 0; // add padding with zeros - BN_bn2bin(sr, r); - bcount = BN_num_bytes(ss); - for(i=bcount; i < fsize; i++) - *(s++) = 0; // add padding with zeros - BN_bn2bin(ss, s); - ECDSA_SIG_free(ecdsa); - return 0; - } - } - return -1; -} - -int ecc_verify(void * key, const char * hash, int hlength, const char *r, const char *s) -{ - int rc = -1; - EC_KEY * eckey; - ECDSA_SIG * ecdsa; - eckey = EC_KEY_dup((EC_KEY*)key); - if (eckey){ - BIGNUM* sr; - BIGNUM* ss; - int fsize = (EC_GROUP_get_degree(EC_KEY_get0_group(eckey)) + 7) / 8; - ecdsa = ECDSA_SIG_new(); - sr = BN_new(); ss = BN_new(); - BN_bin2bn(r, fsize, sr); - BN_bin2bn(s, fsize, ss); -#if defined(OPENSSL_VERSION_NUMBER) && OPENSSL_VERSION_NUMBER >= 0x10100000L - ECDSA_SIG_set0(ecdsa, sr, ss); -#else - ecdsa->r = sr; - ecdsa->s = ss; -#endif - rc = ECDSA_do_verify(hash, hlength, ecdsa, eckey); - ECDSA_SIG_free(ecdsa); - BN_free(sr); BN_free(ss); - } - return rc; -} - -/** - * @brief Calculate Reconstruction Value for implicit certificate - * Create public and private key at the same time - * - * @param req_key [in] EC_KEY containing request key - * @param ca_key [in] EC_KEY containing CA private key - * @param px [in] X coordinate of reconstruction value - * @param py [in] Y coordinate of reconstruction value - * @param psign [in] 0/1 sign of the Y coordinate - * @return EC_KEY - end entity private/public key pair - */ -void * ecc_recvalue(void * req, char * px, char * py, int * psign) -{ - const EC_GROUP * g = EC_KEY_get0_group(req); - if( !g ){ - return NULL; - } - - // generate eph key - EC_KEY * eph = EC_KEY_generate_with_group(g); - if (!eph){ - return NULL; - } - - // generate public reconstruction value - EC_POINT * Q = EC_POINT_new(g); - EC_POINT_add(g, Q, EC_KEY_get0_public_key(eph), EC_KEY_get0_public_key(req), NULL); - ecc_fill_point(g, Q, px, py, psign); - EC_POINT_free(Q); - - return eph; -} - -void * ecc_reconstruct(void * req, void * eph, void * ca, unsigned char * H) -{ - const EC_GROUP * g = EC_KEY_get0_group(req); - if( !g ){ - return NULL; - } - const BIGNUM * order = EC_GROUP_get0_order(g); - BN_CTX * ctx = BN_CTX_new(); - BN_CTX_start(ctx); - - - int fsize = (EC_GROUP_get_degree(g) + 7) / 8; - BIGNUM * h = BN_CTX_get(ctx); - BN_bin2bn(H, fsize, h); - BN_rshift1(h, h); - - // Private reconstruction value - // r = (H * kEph + dCA) % order - BIGNUM * r = BN_CTX_get(ctx); - BIGNUM * b1 = BN_CTX_get(ctx); - BN_mul(b1, EC_KEY_get0_private_key(eph), h, ctx); - BN_mod_add(r, b1, EC_KEY_get0_private_key(ca), order, ctx); - - // Private key reconstruction - // dU = (H * kReq + r) % order - BIGNUM * dU = BN_CTX_get(ctx); - BN_mul(b1, h, EC_KEY_get0_private_key(req), ctx); - BN_mod_add(dU, b1, r, order, ctx); - - // Public key reconstruction - // QU = H * Prv + QCA - EC_POINT * p = EC_POINT_new(g); - EC_POINT_mul(g, p, dU, NULL, NULL, ctx); - - EC_KEY * ukey = EC_KEY_new_with_group(g); - EC_KEY_set_private_key(ukey, dU); - EC_KEY_set_public_key(ukey, p); - EC_POINT_free(p); - - BN_CTX_end(ctx); - BN_CTX_free(ctx); - - return ukey; -} - -static const char* _hexDigits = "0123456789ABCDEF"; -char * _bin2hex(char * hex, size_t hlen, const char * bin, size_t blen) -{ - const unsigned char *b, *e; - char * s; - - // sanity check - if (hlen >= 0 && hlen < blen * 2) return NULL; - - b = (const unsigned char *)bin; - e = b + blen - 1; - s = hex + blen * 2; - if (s < hex + hlen) *s = 0; - for (; b <= e; e--){ - *(--s) = _hexDigits[(*e) & 0xF]; - *(--s) = _hexDigits[(*e) >> 4]; - } - return hex + blen * 2; -} - +/********************************************************************* +###################################################################### +## +## Created by: Denis Filatov +## +## Copyleft (c) 2015 +## This code is provided under the CeCill-C license agreement. +###################################################################### +*********************************************************************/ +#include +#include +#include +#include +#include +#include +#include + +#include "ecc_api.h" + +#define FIELD_SIZE 32 + +#define ARRAYSIZE(A) (sizeof(A)/sizeof(A[0])) + +#if OPENSSL_VERSION_NUMBER < 0x10101000L +#define EC_POINT_get_affine_coordinates EC_POINT_get_affine_coordinates_GFp +#define EC_POINT_set_affine_coordinates EC_POINT_set_affine_coordinates_GFp +#define EC_POINT_set_compressed_coordinates EC_POINT_set_compressed_coordinates_GFp +void ECDSA_SIG_get0(const ECDSA_SIG *sig, const BIGNUM **pr, const BIGNUM **ps) +{ if (pr != NULL) + *pr = sig->r; + if (ps != NULL) + *ps = sig->s; +} + +int ECDSA_SIG_set0(ECDSA_SIG *sig, BIGNUM *r, BIGNUM *s) +{ + if (r == NULL || s == NULL) + return 0; + BN_clear_free(sig->r); + BN_clear_free(sig->s); + sig->r = r; + sig->s = s; + return 1; +} +#endif +char * _bin2hex(char * hex, size_t hlen, const char * bin, size_t blen); + +typedef struct { + int nid; + const char * name; + size_t fsize; +}ecc_api_curve_data; + +static ecc_api_curve_data _config[] = { + { + NID_X9_62_prime256v1, SN_X9_62_prime256v1, 32 + }, + { + NID_brainpoolP256r1, SN_brainpoolP256r1, 32 + }, + { + NID_brainpoolP384r1, SN_brainpoolP384r1, 48 + }, + { + NID_secp384r1, SN_secp384r1, 48 + }, + { + NID_sm2, SN_sm2, 32 + }, +}; + +static EC_GROUP * _curves[ARRAYSIZE(_config)] = { NULL }; + +const char sha256_emptyString[] = { + 0xe3, 0xb0, 0xc4, 0x42, 0x98, 0xfc, 0x1c, 0x14, 0x9a, 0xfb, 0xf4, 0xc8, 0x99, 0x6f, 0xb9, 0x24, + 0x27, 0xae, 0x41, 0xe4, 0x64, 0x9b, 0x93, 0x4c, 0xa4, 0x95, 0x99, 0x1b, 0x78, 0x52, 0xb8, 0x55 +}; + +const char sha384_emptyString[] = { + 0x38, 0xb0, 0x60, 0xa7, 0x51, 0xac, 0x96, 0x38, 0x4c, 0xd9, 0x32, 0x7e, 0xb1, 0xb1, 0xe3, 0x6a, + 0x21, 0xfd, 0xb7, 0x11, 0x14, 0xbe, 0x07, 0x43, 0x4c, 0x0c, 0xc7, 0xbf, 0x63, 0xf6, 0xe1, 0xda, + 0x27, 0x4e, 0xde, 0xbf, 0xe7, 0x6f, 0x65, 0xfb, 0xd5, 0x1a, 0xd2, 0xf1, 0x48, 0x98, 0xb9, 0x5b +}; + +const char sm3_emptyString[] = { + 0x1A, 0xB2, 0x1D, 0x83, 0x55, 0xCF, 0xA1, 0x7F, 0x8E, 0x61, 0x19, 0x48, 0x31, 0xE8, 0x1A, 0x8F, + 0x22, 0xBE, 0xC8, 0xC7, 0x28, 0xFE, 0xFB, 0x74, 0x7E, 0xD0, 0x35, 0xEB, 0x50, 0x82, 0xAA, 0x2B +}; + +static BIGNUM * bn_256 = NULL; +int ecc_api_init() +{ + int i; + for (i = 0; i < ARRAYSIZE(_config); i++){ + _curves[i] = EC_GROUP_new_by_curve_name(_config[i].nid); + } + bn_256 = BN_new(); BN_set_word(bn_256, 256); + return 0; +} + +int ecc_api_done() +{ + int i; + for (i = 0; i < ARRAYSIZE(_config); i++){ + EC_GROUP_free(_curves[i]); + } + BN_free(bn_256); + return 0; +} + +const char* ecc_curve_name(ecc_curve_id curve) +{ + if (curve < ARRAYSIZE(_config)) { + return _config[curve].name; + } + return "unknown curve id"; +} + +static EC_KEY * EC_KEY_new_with_group(const EC_GROUP * g) +{ + EC_KEY * key = EC_KEY_new(); + if (key){ + EC_KEY_set_group(key, g); + EC_KEY_set_asn1_flag(key, OPENSSL_EC_NAMED_CURVE); + } + return key; +} + +static EC_KEY * EC_KEY_generate_with_group(const EC_GROUP * g) +{ + EC_KEY * key = EC_KEY_new(); + if (key){ + EC_KEY_set_group(key, g); + EC_KEY_set_asn1_flag(key, OPENSSL_EC_NAMED_CURVE); + if (!EC_KEY_generate_key(key)){ + ERR_print_errors_fp(stderr); + fflush(stderr); + EC_KEY_free(key); + key = NULL; + } + } + return key; +} + +void * ecc_key_gen(ecc_curve_id pk_alg) +{ + return EC_KEY_generate_with_group(_curves[pk_alg]); +} + +void * ecc_key_init(ecc_curve_id pk_alg, const char* priv_buf) +{ + EC_KEY * eckey = NULL; + BIGNUM * bn = BN_new(); + const EC_GROUP * group = _curves[pk_alg]; + int fsize = (EC_GROUP_get_degree(group) + 7) / 8; + if (group){ + if (BN_bin2bn((const unsigned char*)priv_buf, fsize, bn)){ + eckey = EC_KEY_new(); + if (eckey){ + if (EC_KEY_set_group(eckey, group)){ + if (EC_KEY_set_private_key(eckey, bn)){ + EC_POINT * point; + point = EC_POINT_new(group); + if (EC_POINT_mul(group, point, bn, NULL, NULL, NULL)){ + EC_KEY_set_public_key(eckey, point); + } + EC_POINT_free(point); + } + } + } + } + } + BN_free(bn); + return (void*)eckey; +} + +void ecc_key_free(void* key) +{ + EC_KEY_free(key); +} + +int ecc_key_private(void* key, char* buf) +{ + int len = -1; + if (key){ + const BIGNUM * bn; + bn = EC_KEY_get0_private_key(key); + if (bn){ + len = BN_num_bytes(bn); + if (buf){ + BN_bn2bin(bn, (unsigned char*)buf); + } + } + } + return len; +} + +static int ecc_fill_point(const EC_GROUP * g, const EC_POINT * p, char * px, char * py, int * psign) +{ + BIGNUM *x, *y; + int fsize = -1; + //fill public key data + x = BN_new(); + y = BN_new(); + if (EC_POINT_get_affine_coordinates_GFp(g, p, x, y, NULL)){ + fsize = (EC_GROUP_get_degree(g) + 7) / 8; + int bcount = BN_num_bytes(x); + for(; bcount < fsize; bcount++) + *(px++) = 0; // add padding with zeros + BN_bn2bin(x, (unsigned char*)px); + + bcount = BN_num_bytes(y); + for(; bcount < fsize; bcount++) + *(py++) = 0; // add padding with zeros + BN_bn2bin(y, (unsigned char*)py); + if (psign) * psign = BN_is_odd(y); + } + BN_clear_free(x); BN_clear_free(y); + return fsize; +} + +int ecc_key_public(void* key, char * px, char * py, int * psign) +{ + const EC_GROUP * ecgroup; + const EC_POINT * ecpoint; + const EC_KEY * eckey = (EC_KEY*)key; + if( key && px && py ) { + ecgroup = EC_KEY_get0_group(eckey); + ecpoint = EC_KEY_get0_public_key(eckey); + if(ecgroup && ecpoint){ + return ecc_fill_point(ecgroup, ecpoint, px, py, psign); + } + } + return -1; +} + +static int _pass_cb(char *buf, int size, int rwflag, void *u) +{ + fprintf(stderr, "Ask for a pass phrase"); + return 0; +} + +int ecc_key_private_save(void* key, const char* path, ecc_format format) +{ + int rc = -1; + EC_KEY * eckey = (EC_KEY *)key; + if (eckey){ + FILE * f = fopen(path, "wb"); + if (f){ + if (format == ecc_pem){ + rc = PEM_write_ECPrivateKey(f, eckey, NULL, NULL, 0, _pass_cb, NULL) ? 0 : -1; + if (rc < 0){ + ERR_print_errors_fp(stderr); + } + } + else{ + const EC_GROUP * ecgroup = EC_KEY_get0_group(eckey); + int fsize = (EC_GROUP_get_degree(ecgroup) + 7) / 8; + const BIGNUM * ecbn; + ecbn = EC_KEY_get0_private_key(eckey); + if (ecbn){ + int bnlen = BN_num_bytes(ecbn); + size_t len = (bnlen < fsize) ? fsize : bnlen; + char * buf = (char *)OPENSSL_malloc(len*2+1); + if (bnlen < len) memset(buf, 0, len - bnlen); + BN_bn2bin(ecbn, (unsigned char *)(buf + len - bnlen)); + if (format == ecc_hex){ + char * c = _bin2hex(buf, len * 2 + 1, buf, len); + *c = 0; + len = c - buf; + rc = 0; + } + rc = (len == fwrite(buf, 1, len, f)) ? 0 : -1; + OPENSSL_free(buf); + } + } + fclose(f); + if (rc < 0){ + ERR_print_errors_fp(stderr); + remove(path); + rc = -1; + } + } + else{ + perror(path); + } + } + return rc; +} + +void * ecc_key_private_load(const char* path, ecc_curve_id pk_alg) +{ + EC_KEY * eckey = NULL; + FILE * f = fopen(path, "rb"); + if (f){ + eckey = PEM_read_ECPrivateKey(f, NULL, NULL, NULL); + if (eckey == NULL){ + BIGNUM * bn = NULL; + fseek(f, 0, SEEK_END); + int len = ftell(f); + fseek(f, 0, SEEK_SET); + char * buf = OPENSSL_malloc(len + 1); + if (len == fread(buf, 1, len, f)){ + buf[len] = 0; + // try hex first + if (len != BN_hex2bn(&bn, buf)){ + if (bn){ + BN_free(bn); bn = NULL; + } + bn = BN_bin2bn((const unsigned char*)buf, len, NULL); + } + } + OPENSSL_free(buf); + if (bn){ + eckey = EC_KEY_new(); + if (eckey){ + EC_KEY_set_group(eckey, _curves[pk_alg]); + if (EC_KEY_set_private_key(eckey, bn)){ + EC_POINT * point; + const EC_GROUP * group; + group = EC_KEY_get0_group(eckey); + point = EC_POINT_new(group); + if (EC_POINT_mul(group, point, bn, NULL, NULL, NULL)){ + EC_KEY_set_public_key(eckey, point); + } + EC_POINT_free(point); + } + else{ + EC_KEY_free(eckey); eckey = NULL; + } + } + BN_free(bn); + } + } + fclose(f); + } + return eckey; +} + +int ecc_key_public_save(void* key, const char* path, ecc_format format, int compressed) +{ + EC_KEY * eckey = (EC_KEY *)key; + int rc = -1; + if (eckey){ + FILE * f = fopen(path, "wb"); + if (f){ + if (format == ecc_pem){ + rc = PEM_write_EC_PUBKEY(f, eckey) ? 0 : -1; + } + else{ + size_t len; + char * buf = NULL; + const EC_POINT * point = EC_KEY_get0_public_key(eckey); + const EC_GROUP * group = EC_KEY_get0_group(eckey); + point_conversion_form_t form = compressed ? POINT_CONVERSION_COMPRESSED : POINT_CONVERSION_UNCOMPRESSED; + + if (format == ecc_hex){ + buf = EC_POINT_point2hex(group, point, form, NULL); + len = strlen(buf); + } + else if (format == ecc_bin){ + len = EC_POINT_point2oct(group, point, form, NULL, 0, NULL); + if (len > 0){ + buf = OPENSSL_malloc(len + 1); + if (len != EC_POINT_point2oct(group, point, form, (unsigned char*)buf, len, NULL)){ + OPENSSL_free(buf); buf = NULL; + } + } + } + if (buf){ + if (len == fwrite(buf, 1, len, f)){ + rc = 0; + } + OPENSSL_free(buf); buf = NULL; + } + } + fclose(f); + if (rc < 0){ + ERR_print_errors_fp(stderr); + remove(path); + } + } + else{ + perror(path); + } + } + return rc; +} + +void * ecc_key_public_set(ecc_curve_id pk_alg, ecc_point_type ptype, const char * px, const char * py) +{ + EC_KEY * eckey = NULL; + EC_POINT * point = NULL; + const EC_GROUP * group; + BIGNUM *x, *y = NULL; + int rc = 0; + int fsize; + + group = _curves[pk_alg]; + point = EC_POINT_new(group); + fsize = (EC_GROUP_get_degree(group) + 7) / 8; + x = BN_bin2bn((const unsigned char*)px, fsize, NULL); + if (x){ + if (ptype == ecc_uncompressed){ + y = BN_bin2bn((const unsigned char*)py, fsize, NULL); + if (y){ + rc = EC_POINT_set_affine_coordinates_GFp(group, point, x, y, NULL); + BN_clear_free(y); + } + } + else { + rc = EC_POINT_set_compressed_coordinates_GFp(group, point, x, ptype & 1, NULL); + } + BN_clear_free(x); + if (rc){ + eckey = EC_KEY_new(); + if (eckey){ + EC_KEY_set_group(eckey, group); + EC_KEY_set_public_key(eckey, point); + } + } + } + EC_POINT_free(point); + return eckey; +} + +void * ecc_key_public_load(const char* path, ecc_curve_id pk_alg) +{ + EC_KEY * eckey = NULL; + FILE * f = fopen(path, "rb"); + EC_POINT * point = NULL; + const EC_GROUP * group = _curves[pk_alg]; + if (f){ + eckey = PEM_read_EC_PUBKEY(f, &eckey, NULL, NULL); + if (eckey == NULL){ + fseek(f, 0, SEEK_END); + size_t len = ftell(f); + fseek(f, 0, SEEK_SET); + char * buf = OPENSSL_malloc(len + 1); + if (len == fread(buf, 1, len, f)){ + buf[len] = 0; + // try hex first + point = EC_POINT_hex2point(group, buf, NULL, NULL); + if (point == NULL){ + // try oct + point = EC_POINT_new(group); + if (!EC_POINT_oct2point(group, point, (const unsigned char*)buf, len, NULL)){ + EC_POINT_free(point); + point = NULL; + } + } + if (point){ + eckey = EC_KEY_new(); + if (eckey){ + EC_KEY_set_group(eckey, group); + EC_KEY_set_public_key(eckey, point); + } + EC_POINT_free(point); + } + } + OPENSSL_free(buf); + } + fclose(f); + } + return eckey; +} + +int sha256_calculate(char* hash, const char * ptr, size_t len) +{ + SHA256_CTX ctx; + SHA256_Init(&ctx); + SHA256_Update(&ctx, ptr, len); + SHA256_Final((unsigned char*)hash, &ctx); + return 0; +} + +int sha384_calculate(char* hash, const char * ptr, size_t len) +{ + SHA512_CTX ctx; + SHA384_Init(&ctx); + SHA384_Update(&ctx, ptr, len); + SHA384_Final((unsigned char*)hash, &ctx); + return 0; +} + +int sm3_calculate(char* hash, const char * ptr, size_t len) +{ + SHA256_CTX ctx; + SHA256_Init(&ctx); + SHA256_Update(&ctx, ptr, len); + SHA256_Final((unsigned char*)hash, &ctx); + return 0; +} + +int ecc_sign(void * key, const char * hash, int hlength, char *r, char *s) +{ + EC_KEY * eckey; + + eckey = EC_KEY_dup((EC_KEY*)key); + if(eckey){ + ECDSA_SIG * ecdsa; + int fsize = (EC_GROUP_get_degree(EC_KEY_get0_group(eckey)) + 7) / 8; + ecdsa = ECDSA_do_sign(hash, hlength, eckey); + EC_KEY_free(eckey); + if (ecdsa){ + int i, bcount; + const BIGNUM* sr; + const BIGNUM* ss; +# if defined(OPENSSL_VERSION_NUMBER) && OPENSSL_VERSION_NUMBER >= 0x10100000L + ECDSA_SIG_get0(ecdsa, &sr, &ss); +#else + sr = ecdsa->r; + ss = ecdsa->s; +#endif + bcount = BN_num_bytes(sr); + for(i=bcount; i < fsize; i++) + *(r++) = 0; // add padding with zeros + BN_bn2bin(sr, r); + bcount = BN_num_bytes(ss); + for(i=bcount; i < fsize; i++) + *(s++) = 0; // add padding with zeros + BN_bn2bin(ss, s); + ECDSA_SIG_free(ecdsa); + return 0; + } + } + return -1; +} + +int ecc_verify(void * key, const char * hash, int hlength, const char *r, const char *s) +{ + int rc = -1; + EC_KEY * eckey; + ECDSA_SIG * ecdsa; + eckey = EC_KEY_dup((EC_KEY*)key); + if (eckey){ + BIGNUM* sr; + BIGNUM* ss; + int fsize = (EC_GROUP_get_degree(EC_KEY_get0_group(eckey)) + 7) / 8; + ecdsa = ECDSA_SIG_new(); + sr = BN_new(); ss = BN_new(); + BN_bin2bn(r, fsize, sr); + BN_bin2bn(s, fsize, ss); +#if defined(OPENSSL_VERSION_NUMBER) && OPENSSL_VERSION_NUMBER >= 0x10100000L + ECDSA_SIG_set0(ecdsa, sr, ss); +#else + ecdsa->r = sr; + ecdsa->s = ss; +#endif + rc = ECDSA_do_verify(hash, hlength, ecdsa, eckey); + ECDSA_SIG_free(ecdsa); + BN_free(sr); BN_free(ss); + } + return rc; +} + +/** + * @brief Calculate Reconstruction Value for implicit certificate + * Create public and private key at the same time + * + * @param req_key [in] EC_KEY containing request key + * @param ca_key [in] EC_KEY containing CA private key + * @param px [in] X coordinate of reconstruction value + * @param py [in] Y coordinate of reconstruction value + * @param psign [in] 0/1 sign of the Y coordinate + * @return EC_KEY - end entity private/public key pair + */ +void * ecc_recvalue(void * req, char * px, char * py, int * psign) +{ + const EC_GROUP * g = EC_KEY_get0_group(req); + if( !g ){ + return NULL; + } + + // generate eph key + EC_KEY * eph = EC_KEY_generate_with_group(g); + if (!eph){ + return NULL; + } + + // generate public reconstruction value + EC_POINT * Q = EC_POINT_new(g); + EC_POINT_add(g, Q, EC_KEY_get0_public_key(eph), EC_KEY_get0_public_key(req), NULL); + ecc_fill_point(g, Q, px, py, psign); + EC_POINT_free(Q); + + return eph; +} + +void * ecc_reconstruct(void * req, void * eph, void * ca, unsigned char * H) +{ + const EC_GROUP * g = EC_KEY_get0_group(req); + if( !g ){ + return NULL; + } + const BIGNUM * order = EC_GROUP_get0_order(g); + BN_CTX * ctx = BN_CTX_new(); + BN_CTX_start(ctx); + + + int fsize = (EC_GROUP_get_degree(g) + 7) / 8; + BIGNUM * h = BN_CTX_get(ctx); + BN_bin2bn(H, fsize, h); + BN_rshift1(h, h); + + // Private reconstruction value + // r = (H * kEph + dCA) % order + BIGNUM * r = BN_CTX_get(ctx); + BIGNUM * b1 = BN_CTX_get(ctx); + BN_mul(b1, EC_KEY_get0_private_key(eph), h, ctx); + BN_mod_add(r, b1, EC_KEY_get0_private_key(ca), order, ctx); + + // Private key reconstruction + // dU = (H * kReq + r) % order + BIGNUM * dU = BN_CTX_get(ctx); + BN_mul(b1, h, EC_KEY_get0_private_key(req), ctx); + BN_mod_add(dU, b1, r, order, ctx); + + // Public key reconstruction + // QU = H * Prv + QCA + EC_POINT * p = EC_POINT_new(g); + EC_POINT_mul(g, p, dU, NULL, NULL, ctx); + + EC_KEY * ukey = EC_KEY_new_with_group(g); + EC_KEY_set_private_key(ukey, dU); + EC_KEY_set_public_key(ukey, p); + EC_POINT_free(p); + + BN_CTX_end(ctx); + BN_CTX_free(ctx); + + return ukey; +} + +static const char* _hexDigits = "0123456789ABCDEF"; +char * _bin2hex(char * hex, size_t hlen, const char * bin, size_t blen) +{ + const unsigned char *b, *e; + char * s; + + // sanity check + if (hlen >= 0 && hlen < blen * 2) return NULL; + + b = (const unsigned char *)bin; + e = b + blen - 1; + s = hex + blen * 2; + if (s < hex + hlen) *s = 0; + for (; b <= e; e--){ + *(--s) = _hexDigits[(*e) & 0xF]; + *(--s) = _hexDigits[(*e) >> 4]; + } + return hex + blen * 2; +} + diff --git a/certgen/keygen.c b/certgen/keygen.c index 39de50e02e303d6f3677b439270e08e03ba7bf1f..9c14d23fb1686c7b1266c71f2f2213f74f1a1192 100644 --- a/certgen/keygen.c +++ b/certgen/keygen.c @@ -1,97 +1,97 @@ -/********************************************************************* -###################################################################### -## -## Created by: Denis Filatov -## -## Copyleft (c) 2015 -## This code is provided under the CeCill-C license agreement. -###################################################################### -*********************************************************************/ -#include "ecc_api.h" -#include -#include "../cshared/copts.h" -#include "../cshared/cstr.h" - -static const char *_outPath = "."; -static int _certCount = 1; -static ecc_format _outFormat_public = 0; -static ecc_format _outFormat_private = 0; -static ecc_curve_id _curve = 0; -static int _compressed = 1; - -static const char * _o_formats[] = { - "bin", "hex", "pem", NULL -}; - -static const char * _o_curves[] = { - "nist256", "bpool256", "bpool384", "nist384", "sm2", NULL -}; - -static char * _keyname = "key"; - -static copt_t options [] = { - { "h?", "help", COPT_HELP, NULL, "Print this help page" }, - { "o", "out", COPT_STR, (void*)&_outPath, "Output path [current dir by default]" }, - { NULL, "format-private", COPT_STRENUM, (void*)_o_formats, "Private key output format (bin|hex|pem)[binary by default]" }, - { NULL, "format-public", COPT_STRENUM, (void*)_o_formats, "Public key output format (bin|hex|pem)[binary by default]" }, - { "O", "format", COPT_STRENUM, (void*)_o_formats, "Output format (bin|hex|pem)[binary by default]" }, - { "a", "curve", COPT_STRENUM, (void*)_o_curves, "Curve to be used (nist256|bpool256|bpool384|nist384|sm2)[nist256 by default]" }, - { "u", "uncompressed", COPT_IBOOL, &_compressed, "Write public key in uncompressed form" }, - { "n", "count", COPT_INT, (void*)&_certCount, "Key pair count (1 by default)" }, - { NULL, NULL, COPT_END, NULL, NULL } -}; - -int main(int argc, char** argv) -{ - argc = coptions(argc, argv, COPT_HELP_NOVALUES , options); - - if(argc < 1){ - if(argc<0 && (0-argc)<((sizeof(options)/sizeof(options[0]))-1)){ - printf("Unknown option %s\n", argv[0-argc]); - } - const char * a = strrchr(argv[0], '/'); - if (a == NULL) a = argv[0]; - coptions_help(stdout, a, COPT_HELP_NOVALUES, options, ""); - return -1; - } - int n = copts_enum_value(options, 4, _o_formats); - _outFormat_private = _outFormat_public = n; - n = copts_enum_value(options, 2, _o_formats); - if(n != 0) _outFormat_private = n; - n = copts_enum_value(options, 3, _o_formats); - if(n != 0) _outFormat_public = n; - - _curve = copts_enum_value(options, 5, _o_curves); - if (argc == 1){ - argc = 2; - argv[1] = _keyname; - } - - if(0 == ecc_api_init()){ - char s[1024], *path; - size_t len; - path = cvstrncpy(s, sizeof(s), _outPath, "/", NULL); - len = s+sizeof(s)-path; - - for (int i = 1; i < argc; i++){ - const char * keyname = argv[i]; - for (int count = 0; count < _certCount; count++){ - void * key = ecc_key_gen(_curve); - if (key){ - char * e; - if (_certCount == 1) - e = cstrncpy(path, len, keyname); - else - e = path + sprintf(path, "%s_%03d", keyname, count + 1); - cvstrncpy(e, len - (e - path), ".", _o_curves[_curve], NULL); - ecc_key_private_save(key, s, _outFormat_private); - cvstrncpy(e, len - (e - path), "_pub.", _o_curves[_curve], NULL); - ecc_key_public_save(key, s, _outFormat_public, _compressed); - ecc_key_free(key); - } - } - } - } - ecc_api_done(); - return 0; -} +/********************************************************************* +###################################################################### +## +## Created by: Denis Filatov +## +## Copyleft (c) 2015 +## This code is provided under the CeCill-C license agreement. +###################################################################### +*********************************************************************/ +#include "ecc_api.h" +#include +#include "../cshared/copts.h" +#include "../cshared/cstr.h" + +static const char *_outPath = "."; +static int _certCount = 1; +static ecc_format _outFormat_public = 0; +static ecc_format _outFormat_private = 0; +static ecc_curve_id _curve = 0; +static int _compressed = 1; + +static const char * _o_formats[] = { + "bin", "hex", "pem", NULL +}; + +static const char * _o_curves[] = { + "nist256", "bpool256", "bpool384", "nist384", "sm2", NULL +}; + +static char * _keyname = "key"; + +static copt_t options [] = { + { "h?", "help", COPT_HELP, NULL, "Print this help page" }, + { "o", "out", COPT_STR, (void*)&_outPath, "Output path [current dir by default]" }, + { NULL, "format-private", COPT_STRENUM, (void*)_o_formats, "Private key output format (bin|hex|pem)[binary by default]" }, + { NULL, "format-public", COPT_STRENUM, (void*)_o_formats, "Public key output format (bin|hex|pem)[binary by default]" }, + { "O", "format", COPT_STRENUM, (void*)_o_formats, "Output format (bin|hex|pem)[binary by default]" }, + { "a", "curve", COPT_STRENUM, (void*)_o_curves, "Curve to be used (nist256|bpool256|bpool384|nist384|sm2)[nist256 by default]" }, + { "u", "uncompressed", COPT_IBOOL, &_compressed, "Write public key in uncompressed form" }, + { "n", "count", COPT_INT, (void*)&_certCount, "Key pair count (1 by default)" }, + { NULL, NULL, COPT_END, NULL, NULL } +}; + +int main(int argc, char** argv) +{ + argc = coptions(argc, argv, COPT_HELP_NOVALUES , options); + + if(argc < 1){ + if(argc<0 && (0-argc)<((sizeof(options)/sizeof(options[0]))-1)){ + printf("Unknown option %s\n", argv[0-argc]); + } + const char * a = strrchr(argv[0], '/'); + if (a == NULL) a = argv[0]; + coptions_help(stdout, a, COPT_HELP_NOVALUES, options, ""); + return -1; + } + int n = copts_enum_value(options, 4, _o_formats); + _outFormat_private = _outFormat_public = n; + n = copts_enum_value(options, 2, _o_formats); + if(n != 0) _outFormat_private = n; + n = copts_enum_value(options, 3, _o_formats); + if(n != 0) _outFormat_public = n; + + _curve = copts_enum_value(options, 5, _o_curves); + if (argc == 1){ + argc = 2; + argv[1] = _keyname; + } + + if(0 == ecc_api_init()){ + char s[1024], *path; + size_t len; + path = cvstrncpy(s, sizeof(s), _outPath, "/", NULL); + len = s+sizeof(s)-path; + + for (int i = 1; i < argc; i++){ + const char * keyname = argv[i]; + for (int count = 0; count < _certCount; count++){ + void * key = ecc_key_gen(_curve); + if (key){ + char * e; + if (_certCount == 1) + e = cstrncpy(path, len, keyname); + else + e = path + sprintf(path, "%s_%03d", keyname, count + 1); + cvstrncpy(e, len - (e - path), ".", _o_curves[_curve], NULL); + ecc_key_private_save(key, s, _outFormat_private); + cvstrncpy(e, len - (e - path), "_pub.", _o_curves[_curve], NULL); + ecc_key_public_save(key, s, _outFormat_public, _compressed); + ecc_key_free(key); + } + } + } + } + ecc_api_done(); + return 0; +}