|
|
DataMuseum.dkPresents historical artifacts from the history of: DKUUG/EUUG Conference tapes |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about DKUUG/EUUG Conference tapes Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metrics - downloadIndex: T a
Length: 2237 (0x8bd)
Types: TextFile
Names: »authen.h«
└─⟦2d1937cfd⟧ Bits:30007241 EUUGD22: P.P 5.0
└─⟦35176feda⟧ »EurOpenD22/isode/isode-6.tar.Z«
└─⟦de7628f85⟧
└─⟦this⟧ »isode-6.0/h/quipu/authen.h«
/* authen.h - parameters for strong authentication */
/*
* $Header: /f/osi/h/quipu/RCS/authen.h,v 7.0 89/11/23 21:56:23 mrose Rel $
*
*
*
* $Log: authen.h,v $
* Revision 7.0 89/11/23 21:56:23 mrose
* Release 6.0
*
*/
/*
* NOTICE
*
* Acquisition, use, and distribution of this module and related
* materials are subject to the restrictions of a license agreement.
* Consult the Preface in the User's Manual for the full terms of
* this agreement.
*
*/
#ifndef QUIPUAUTHEN
#define QUIPUAUTHEN
#include "quipu/name.h"
/* Structures for strong authentication */
struct alg_id {
OID algorithm;
PE asn;
int p_type;
#define ALG_PARM_ABSENT 0
#define ALG_PARM_UNKNOWN 1
#define ALG_PARM_NUMERIC 2
union {
int numeric;
} un;
};
struct random_number {
int n_bits;
char *value;
};
struct key_info {
struct alg_id alg;
int n_bits;
char *value;
};
struct validity {
char *not_before;
char *not_after;
};
struct signature {
struct alg_id alg;
PE encoded;
int n_bits;
char *encrypted;
};
struct certificate {
struct alg_id alg;
int version;
int serial;
DN issuer;
DN subject;
struct validity valid;
struct key_info key;
struct signature sig;
};
struct certificate_list {
struct certificate *cert;
struct certificate *reverse;
struct certificate_list *next;
struct certificate_list *superior;
};
struct revoked_certificate {
struct alg_id alg;
DN subject;
int serial;
char *revocation_date;
struct revoked_certificate *next;
};
struct revocation_list {
struct alg_id alg;
DN issuer;
char *last_update;
struct revoked_certificate *revoked;
struct signature sig;
struct signature sig2;
};
struct ca_record {
struct key_info key;
DN name;
/* parameters controlling jurisdiction would go here */
struct ca_record *next;
};
struct protected_password {
char *passwd;
int n_octets;
char protected;
char *time1;
char *time2;
struct random_number *random1;
struct random_number *random2;
};
struct security_policy {
OID oid;
int p_type;
#define POLICY_PARM_ABSENT 0
#define POLICY_PARM_UNKNOWN 1
#define POLICY_PARM_NUMERIC 2
#define POLICY_PARM_ACCESS 3
union {
int numeric;
} un;
};
#define NULLPOLICY ((struct security_policy *) 0)
#endif