summaryrefslogtreecommitdiffstats
path: root/lib/libkrb5/generated/asn1_SAMFlags.c
diff options
context:
space:
mode:
authorbiorn <biorn@openbsd.org>2006-04-14 08:24:41 +0000
committerbiorn <biorn@openbsd.org>2006-04-14 08:24:41 +0000
commit46084eb79687a54d7f12671102443abc6d6f4b8e (patch)
tree95aa7363dc758152c9594aad55cf511b3228eceb /lib/libkrb5/generated/asn1_SAMFlags.c
parentMerge of heimdal 0.7.2 (diff)
downloadwireguard-openbsd-46084eb79687a54d7f12671102443abc6d6f4b8e.tar.xz
wireguard-openbsd-46084eb79687a54d7f12671102443abc6d6f4b8e.zip
fix for heimdal 0.7.2
Diffstat (limited to 'lib/libkrb5/generated/asn1_SAMFlags.c')
-rw-r--r--lib/libkrb5/generated/asn1_SAMFlags.c126
1 files changed, 126 insertions, 0 deletions
diff --git a/lib/libkrb5/generated/asn1_SAMFlags.c b/lib/libkrb5/generated/asn1_SAMFlags.c
new file mode 100644
index 00000000000..5aba152a05a
--- /dev/null
+++ b/lib/libkrb5/generated/asn1_SAMFlags.c
@@ -0,0 +1,126 @@
+/* Generated from /home/biorn/src/lib/libkrb5/../../kerberosV/src/lib/asn1/k5.asn1 */
+/* Do not edit */
+
+#include <stdio.h>
+#include <stdlib.h>
+#include <time.h>
+#include <string.h>
+#include <errno.h>
+#include <krb5_asn1.h>
+#include <asn1_err.h>
+#include <der.h>
+#include <parse_units.h>
+
+#define BACK if (e) return e; p -= l; len -= l; ret += l
+
+int
+encode_SAMFlags(unsigned char *p, size_t len, const SAMFlags *data, size_t *size)
+{
+size_t ret = 0;
+size_t l;
+int i, e;
+
+i = 0;
+{
+unsigned char c = 0;
+*p-- = c; len--; ret++;
+c = 0;
+*p-- = c; len--; ret++;
+c = 0;
+*p-- = c; len--; ret++;
+c = 0;
+if(data->must_pk_encrypt_sad) c |= 1<<5;
+if(data->send_encrypted_sad) c |= 1<<6;
+if(data->use_sad_as_key) c |= 1<<7;
+*p-- = c;
+*p-- = 0;
+len -= 2;
+ret += 2;
+}
+
+e = der_put_length_and_tag (p, len, ret, ASN1_C_UNIV, PRIM,UT_BitString, &l);
+BACK;
+*size = ret;
+return 0;
+}
+
+#define FORW if(e) goto fail; p += l; len -= l; ret += l
+
+int
+decode_SAMFlags(const unsigned char *p, size_t len, SAMFlags *data, size_t *size)
+{
+size_t ret = 0, reallen;
+size_t l;
+int e;
+
+memset(data, 0, sizeof(*data));
+reallen = 0;
+e = der_match_tag_and_length (p, len, ASN1_C_UNIV, PRIM, UT_BitString,&reallen, &l);
+FORW;
+if(len < reallen)
+return ASN1_OVERRUN;
+p++;
+len--;
+reallen--;
+ret++;
+data->use_sad_as_key = (*p >> 7) & 1;
+data->send_encrypted_sad = (*p >> 6) & 1;
+data->must_pk_encrypt_sad = (*p >> 5) & 1;
+p += reallen; len -= reallen; ret += reallen;
+if(size) *size = ret;
+return 0;
+fail:
+free_SAMFlags(data);
+return e;
+}
+
+void
+free_SAMFlags(SAMFlags *data)
+{
+}
+
+size_t
+length_SAMFlags(const SAMFlags *data)
+{
+size_t ret = 0;
+ret += 7;
+return ret;
+}
+
+int
+copy_SAMFlags(const SAMFlags *from, SAMFlags *to)
+{
+*(to) = *(from);
+return 0;
+}
+
+unsigned SAMFlags2int(SAMFlags f)
+{
+unsigned r = 0;
+if(f.use_sad_as_key) r |= (1U << 0);
+if(f.send_encrypted_sad) r |= (1U << 1);
+if(f.must_pk_encrypt_sad) r |= (1U << 2);
+return r;
+}
+
+SAMFlags int2SAMFlags(unsigned n)
+{
+ SAMFlags flags;
+
+ flags.use_sad_as_key = (n >> 0) & 1;
+ flags.send_encrypted_sad = (n >> 1) & 1;
+ flags.must_pk_encrypt_sad = (n >> 2) & 1;
+ return flags;
+}
+
+static struct units SAMFlags_units[] = {
+ {"must_pk_encrypt_sad", 1U << 2},
+ {"send_encrypted_sad", 1U << 1},
+ {"use_sad_as_key", 1U << 0},
+ {NULL, 0}
+};
+
+const struct units * asn1_SAMFlags_units(void){
+return SAMFlags_units;
+}
+