亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? user.c

?? cryptlib安全工具包
?? C
?? 第 1 頁 / 共 4 頁
字號:
								  &msgData, CRYPT_IATTRIBUTE_USERID );
		}
	return( status );
	}

/* Read a user's info from a user keyset and verify it using the creating
   SO's key */

#if 0	/*!!!!!!!!!!!!!!! Needs a serious overhaul !!!!!!!!!!!!!!!!!!!!!*/
		/*!!!!!!!!!!!!! Should also do recursive walk !!!!!!!!!!!!!!!!!!*/

CHECK_RETVAL STDC_NONNULL_ARG( ( 1 ) ) \
static int getCheckUserInfo( INOUT USER_FILE_INFO *userFileInfoPtr, 
							 IN_INT_SHORT_Z const int fileRef )
	{
	CRYPT_ALGO_TYPE hashAlgo;
	CRYPT_CONTEXT iHashContext;
	CRYPT_KEYSET iUserKeyset;
	MESSAGE_CREATEOBJECT_INFO createInfo;
	MESSAGE_KEYMGMT_INFO getkeyInfo;
	STREAM stream;
	DYNBUF userDataDB;
	void *hashDataPtr, *signaturePtr;
	int soFileRef, hashDataLength, signatureLength, status;

	assert( isWritePtr( userFileInfoPtr, sizeof( USER_FILE_INFO ) ) );

	REQUIRES( fileRef >= 0 && fileRef < MAX_INTLENGTH_SHORT );

	/* Clear return values */
	memset( userFileInfoPtr, 0, sizeof( USER_FILE_INFO ) );

	/* Open the user keyset and read the user data from it */
	status = openUserKeyset( &iUserKeyset, fileRef, CRYPT_KEYOPT_READONLY );
	if( cryptStatusError( status ) )
		return( status );
	status = dynCreate( &userDataDB, iUserKeyset, 
						CRYPT_IATTRIBUTE_USERINFO );
	krnlSendNotifier( iUserKeyset, IMESSAGE_DECREFCOUNT );
	if( cryptStatusError( status ) )
		return( status );

	/* Burrow into the user info to get the information we need.  We do it
	   this way rather than using envelopes because we don't need the full
	   generality of the enveloping process (we know exactly what data to
	   expect) and to avoid the overhead of de-enveloping data every time a
	   user logs in */
	sMemConnect( &stream, dynData( userDataDB ), dynLength( userDataDB ) );
	readSequence( &stream, NULL );			/* Outer wrapper */
	readUniversal( &stream );				/* ContentType OID */
	readConstructed( &stream, NULL, 0 );	/* Content */
	readSequence( &stream, NULL );
	readUniversal( &stream );				/* Version */
	readSet( &stream, NULL );				/* DigestAlgorithms */
	readAlgoID( &stream, &hashAlgo );
	readSequence( &stream, NULL );			/* EncapContentInfo */
	readUniversal( &stream );				/* ContentType OID */
	readConstructed( &stream, NULL, 0 );	/* Content type wrapper */
	status = readGenericHole( &stream, &hashDataLength, 16, DEFAULT_TAG );
	if( cryptStatusError( status ) )
		{
		sMemDisconnect( &stream );
		dynDestroy( &userDataDB );
		return( status );
		}
	hashDataPtr = sMemBufPtr( &stream );

	/* Read the user info */
	status = readUserData( userFileInfoPtr, hashDataPtr, hashDataLength );
	if( cryptStatusError( status ) )
		{
		sMemDisconnect( &stream );
		dynDestroy( &userDataDB );
		return( status );
		}

	/* Hash the signed data and verify the signature using the SO key */
	setMessageCreateObjectInfo( &createInfo, CRYPT_ALGO_SHA );
	status = krnlSendMessage( SYSTEM_OBJECT_HANDLE,
							  IMESSAGE_DEV_CREATEOBJECT, &createInfo,
							  OBJECT_TYPE_CONTEXT );
	if( cryptStatusError( status ) )
		{
		dynDestroy( &userDataDB );
		sMemDisconnect( &stream );
		return( status );
		}
	iHashContext = createInfo.cryptHandle;
	krnlSendMessage( iHashContext, IMESSAGE_CTX_HASH, hashDataPtr, 
					 hashDataLength );
	status = krnlSendMessage( iHashContext, IMESSAGE_CTX_HASH, "", 0 );
	dynDestroy( &userDataDB );
	if( cryptStatusError( status ) )
		{
		sMemDisconnect( &stream );
		return( status );
		}

	/* Read the signature */
	status = readSet( &stream, &signatureLength );
	signaturePtr = sMemBufPtr( &stream );
	sMemDisconnect( &stream );
	if( cryptStatusError( status ) )
		{
		krnlSendNotifier( iHashContext, IMESSAGE_DECREFCOUNT );
		return( status );
		}

	/* Open the SO keyset and read the SO public key from it */
	status = soFileRef = \
		findUserIndexEntry( USERID_USERID, userFileInfoPtr->creatorID, 
							KEYID_SIZE );
	if( cryptStatusOK( status ) )
		status = openUserKeyset( &iUserKeyset, soFileRef, 
								 CRYPT_KEYOPT_READONLY );
	if( cryptStatusError( status ) )
		{
		krnlSendNotifier( iHashContext, IMESSAGE_DECREFCOUNT );
		return( status );
		}
	setMessageKeymgmtInfo( &getkeyInfo, CRYPT_IKEYID_KEYID,
						   userFileInfoPtr->creatorID, KEYID_SIZE, NULL, 0,
						   KEYMGMT_FLAG_NONE );
	status = krnlSendMessage( iUserKeyset, IMESSAGE_KEY_GETKEY,
							  &getkeyInfo, KEYMGMT_ITEM_PUBLICKEY );
	krnlSendNotifier( iUserKeyset, IMESSAGE_DECREFCOUNT );
	if( cryptStatusError( status ) )
		{
		krnlSendNotifier( iHashContext, IMESSAGE_DECREFCOUNT );
		return( status );
		}

	/* Verify the signature using the SO key */
	status = iCryptCheckSignatureEx( signaturePtr, signatureLength,
									 CRYPT_FORMAT_CRYPTLIB,
									 getkeyInfo.cryptHandle, iHashContext, 
									 NULL );
	krnlSendNotifier( iHashContext, IMESSAGE_DECREFCOUNT );
	krnlSendNotifier( getkeyInfo.cryptHandle, IMESSAGE_DECREFCOUNT );
	if( cryptStatusError( status ) )
		return( status );

	/*!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!*/
	/* MAC (???) using password - needs PKCS #15 changes */
	/*!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!*/

	return( status );
	}
#endif /*!!!!!!!!!!!!!!! Needs a serious overhaul !!!!!!!!!!!!!!!!!!!!!*/

/****************************************************************************
*																			*
*							SO Management Functions							*
*																			*
****************************************************************************/

/* Return the primary SO user info.  This is used as a template to create 
   the primary SO user after a zeroise */

const USER_FILE_INFO *getPrimarySoUserInfo( void )
	{
	return( &primarySOInfo );
	}

/* Sign the user info and write it to the user keyset */

CHECK_RETVAL STDC_NONNULL_ARG( ( 2 ) ) \
static int signUserData( IN_HANDLE const CRYPT_KEYSET iUserKeyset,
						 const USER_INFO *userInfoPtr,
						 IN_HANDLE const CRYPT_CONTEXT iSignContext )
	{
	BYTE userInfoBuffer[ USERDATA_BUFFERSIZE + 8 ];
	int userInfoLength, status;

	assert( isReadPtr( userInfoPtr, sizeof( USER_INFO ) ) );

	REQUIRES( isHandleRangeValid( iUserKeyset ) );
	REQUIRES( isHandleRangeValid( iSignContext ) );

	/* Sign the data via an envelope.  This is kind of heavyweight, but it's 
	   OK because we rarely create new users and it saves having to hand-
	   assemble the data like the PKCS #15 code does */
	status = envelopeSign( userInfoBuffer, userInfoLength, 
						   userInfoBuffer, USERDATA_BUFFERSIZE, 
						   &userInfoLength, CRYPT_CONTENT_DATA, 
						   iSignContext, CRYPT_UNUSED );
	if( cryptStatusError( status ) )
		return( status );

	return( CRYPT_ERROR_SIGNATURE );
	}

CHECK_RETVAL \
static int sigCheckUserData( void )
	{
	return( CRYPT_ERROR_SIGNATURE );
	}

/* Create an SO private key and write it to the user keyset */

CHECK_RETVAL STDC_NONNULL_ARG( ( 2, 3 ) ) \
static int createSOKey( IN_HANDLE const CRYPT_KEYSET iUserKeyset,
						INOUT USER_INFO *userInfoPtr, 
						IN_BUFFER( passwordLength ) const char *password, 
						IN_LENGTH_SHORT const int passwordLength )
	{
	const USER_FILE_INFO *userFileInfo = &userInfoPtr->userFileInfo;
	MESSAGE_CREATEOBJECT_INFO createInfo;
	MESSAGE_DATA msgData;
	const int actionPerms = MK_ACTION_PERM( MESSAGE_CTX_SIGN,
											ACTION_PERM_NONE_EXTERNAL ) | \
							MK_ACTION_PERM( MESSAGE_CTX_SIGCHECK,
											ACTION_PERM_NONE_EXTERNAL );
	int status;

	assert( isReadPtr( userInfoPtr, sizeof( USER_INFO ) ) );
	assert( isReadPtr( password, passwordLength ) );

	REQUIRES( isHandleRangeValid( iUserKeyset ) );
	REQUIRES( passwordLength > 0 && passwordLength < MAX_INTLENGTH_SHORT );

	/* Create the SO private key, making it internal and signature-only */
	setMessageCreateObjectInfo( &createInfo, CRYPT_ALGO_RSA );
	status = krnlSendMessage( SYSTEM_OBJECT_HANDLE, IMESSAGE_DEV_CREATEOBJECT,
							  &createInfo, OBJECT_TYPE_CONTEXT );
	if( cryptStatusError( status ) )
		return( status );
	setMessageData( &msgData, ( void * ) userFileInfo->userName,
					min( userFileInfo->userNameLength, CRYPT_MAX_TEXTSIZE ) );
	krnlSendMessage( createInfo.cryptHandle, IMESSAGE_SETATTRIBUTE_S,
					 &msgData, CRYPT_CTXINFO_LABEL );
	status = krnlSendNotifier( createInfo.cryptHandle, IMESSAGE_CTX_GENKEY );
	if( cryptStatusOK( status ) )
		status = krnlSendMessage( createInfo.cryptHandle,
								  IMESSAGE_SETATTRIBUTE,
								  ( int * ) &actionPerms,
								  CRYPT_IATTRIBUTE_ACTIONPERMS );
	if( cryptStatusError( status ) )
		{
		krnlSendNotifier( createInfo.cryptHandle, IMESSAGE_DECREFCOUNT );
		return( status );
		}

	/* Add the SO private key to the keyset */
	status = addKey( iUserKeyset, createInfo.cryptHandle, 
					 userFileInfo->userID, KEYID_SIZE, password, 
					 passwordLength, TRUE );
	if( cryptStatusError( status ) )
		{
		krnlSendNotifier( createInfo.cryptHandle, IMESSAGE_DECREFCOUNT );
		return( status );
		}

	userInfoPtr->iCryptContext = createInfo.cryptHandle;
	return( CRYPT_OK );
	}

#if 0	/* Currently unused, for future use for CA users */

/* Create a CA secret key and write it to the user keyset */

CHECK_RETVAL STDC_NONNULL_ARG( ( 2, 3 ) ) \
static int createCAKey( IN_HANDLE const CRYPT_KEYSET iUserKeyset,
						INOUT USER_INFO *userInfoPtr, 
						IN_BUFFER( passwordLength ) const char *password, 
						IN_LENGTH_SHORT const int passwordLength )
	{
	MESSAGE_CREATEOBJECT_INFO createInfo;
	MESSAGE_DATA msgData;
	const int actionPerms = MK_ACTION_PERM( MESSAGE_CTX_ENCRYPT,
											ACTION_PERM_NONE_EXTERNAL ) | \
							MK_ACTION_PERM( MESSAGE_CTX_DECRYPT,
											ACTION_PERM_NONE_EXTERNAL );
	int status;

	assert( isReadPtr( userInfoPtr, sizeof( USER_INFO ) ) );
	assert( isReadPtr( password, passwordLength ) );

	REQUIRES( isHandleRangeValid( iUserKeyset ) );
	REQUIRES( passwordLength > 0 && passwordLength < MAX_INTLENGTH_SHORT );

	/* Create the CA secret key, making it internal-only */
	setMessageCreateObjectInfo( &createInfo, CRYPT_ALGO_3DES );
	status = krnlSendMessage( SYSTEM_OBJECT_HANDLE, IMESSAGE_DEV_CREATEOBJECT,
							  &createInfo, OBJECT_TYPE_CONTEXT );
	if( cryptStatusError( status ) )
		return( status );
	setMessageData( &msgData, userInfoPtr->userID, KEYID_SIZE );
	krnlSendMessage( createInfo.cryptHandle, IMESSAGE_SETATTRIBUTE_S,
					 &msgData, CRYPT_CTXINFO_LABEL );
	status = krnlSendNotifier( createInfo.cryptHandle, IMESSAGE_CTX_GENKEY );
	if( cryptStatusOK( status ) )
		status = krnlSendMessage( createInfo.cryptHandle,
								  IMESSAGE_SETATTRIBUTE,
								  ( int * ) &actionPerms,
								  CRYPT_IATTRIBUTE_ACTIONPERMS );
	if( cryptStatusError( status ) )
		{
		krnlSendNotifier( createInfo.cryptHandle, IMESSAGE_DECREFCOUNT );
		return( status );
		}

	/* Add the CA secret key to the keyset */
	status = addKey( iUserKeyset, createInfo.cryptHandle, 
					 userInfoPtr->userID, KEYID_SIZE, password, 
					 passwordLength, FALSE );
	if( cryptStatusError( status ) )
		{
		krnlSendNotifier( createInfo.cryptHandle, IMESSAGE_DECREFCOUNT );
		return( status );
		}

	return( CRYPT_OK );
	}
#endif /* 0 */

/* Create a primary SO user.  This can only occur when we're in the zeroised 
   state */

CHECK_RETVAL STDC_NONNULL_ARG( ( 1, 2 ) ) \
static int createPrimarySoUser( INOUT USER_INFO *userInfoPtr, 
								IN_BUFFER( passwordLength ) const char *password, 
								IN_LENGTH_SHORT const int passwordLength )
	{
	CRYPT_KEYSET iIndexKeyset, iUserKeyset;
	USER_FILE_INFO userIndex;
	BYTE userData[ USERDATA_BUFFERSIZE + 8 ];
	int userDataLength = DUMMY_INIT, status;

	assert( isWritePtr( userInfoPtr, sizeof( USER_INFO ) ) );

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
在线看日本不卡| 亚洲色图丝袜美腿| 日韩一区二区三区av| 欧美日韩免费观看一区三区| 色婷婷av一区二区三区之一色屋| av电影天堂一区二区在线| 国产一区二区伦理片| 国产一区二区三区在线观看免费 | 一区在线观看免费| 国产精品网曝门| 国产精品久久久久久久久动漫| 国产欧美精品一区aⅴ影院 | 亚洲欧美日本在线| 3atv在线一区二区三区| 欧美日本一区二区三区四区| 3d动漫精品啪啪1区2区免费| 欧美一区二区三区白人| 欧美一区二区黄色| 久久免费国产精品| 中文字幕精品—区二区四季| 中文字幕亚洲一区二区va在线| 《视频一区视频二区| 亚洲综合免费观看高清在线观看| 亚洲一区二区三区视频在线| 奇米精品一区二区三区四区| 激情综合色播激情啊| 成人av网站免费观看| 在线影院国内精品| 91精品国产色综合久久久蜜香臀| 精品国产凹凸成av人网站| 中文字幕欧美区| 一区二区三区四区不卡视频| 视频在线在亚洲| 国产酒店精品激情| 91日韩一区二区三区| 4438x亚洲最大成人网| 国产午夜精品一区二区三区嫩草| 亚洲日本在线视频观看| 日韩av中文字幕一区二区| 国产精品1区2区| 一本久久精品一区二区| 欧美一卡2卡三卡4卡5免费| 国产午夜精品一区二区| 亚洲自拍偷拍麻豆| 狠狠色伊人亚洲综合成人| 91免费视频网址| 日韩欧美的一区二区| 亚洲欧洲精品一区二区精品久久久| 午夜在线成人av| 国产不卡在线播放| 欧美日韩成人综合| 国产欧美va欧美不卡在线| 亚洲成av人片一区二区梦乃| 国产精品中文字幕日韩精品| 欧美亚洲免费在线一区| 久久综合狠狠综合久久综合88| 亚洲欧美乱综合| 激情欧美日韩一区二区| 在线观看日韩电影| 国产亲近乱来精品视频| 日韩电影免费一区| 91色在线porny| 久久婷婷国产综合精品青草| 亚洲超丰满肉感bbw| 波多野结衣亚洲一区| 日韩视频免费观看高清完整版在线观看 | 国产不卡视频在线观看| 91精品在线观看入口| 亚洲欧美日韩人成在线播放| 婷婷一区二区三区| 337p亚洲精品色噜噜| 伊人夜夜躁av伊人久久| 欧美日韩视频在线一区二区| 亚洲影视在线观看| 99国内精品久久| 欧美肥大bbwbbw高潮| 久久99热狠狠色一区二区| 欧美一区二区三区在| 亚洲成av人在线观看| 国产裸体歌舞团一区二区| 欧美久久一区二区| 精品一区二区av| 欧美日韩在线免费视频| 一个色综合av| 欧美在线观看一二区| 欧美国产精品久久| 美脚の诱脚舐め脚责91| 在线观看91av| 亚洲激情男女视频| av日韩在线网站| 亚洲国产高清在线| 国产99久久久久| 久久久精品国产免大香伊| 裸体在线国模精品偷拍| 在线不卡的av| 三级欧美在线一区| 欧美日韩国产综合草草| 亚洲一区二区三区四区在线免费观看 | 欧美激情在线看| 国产精品资源网站| 国产欧美视频在线观看| 国产毛片一区二区| 久久久亚洲高清| 国产精品自产自拍| 国产女同互慰高潮91漫画| 国产成人精品一区二| 国产蜜臀av在线一区二区三区| 国产成人综合自拍| 中文字幕二三区不卡| 成人性生交大片免费看视频在线| 国产日韩欧美综合一区| 成人午夜视频在线观看| 国产精品无圣光一区二区| 91在线视频免费91| 一区二区三区精品视频在线| 欧美私模裸体表演在线观看| 亚洲电影在线免费观看| 制服丝袜激情欧洲亚洲| 玖玖九九国产精品| 久久精品综合网| 99久久国产综合色|国产精品| 综合色天天鬼久久鬼色| 欧美性感一类影片在线播放| 视频一区二区三区入口| 精品日本一线二线三线不卡 | 欧美大胆人体bbbb| 国产麻豆成人传媒免费观看| 欧美激情资源网| 在线观看91视频| 麻豆免费看一区二区三区| 久久久精品一品道一区| 91丨porny丨中文| 日韩精品成人一区二区三区| 日韩欧美一级片| 成人自拍视频在线观看| 亚洲精品视频在线观看免费 | 91精品国产综合久久精品app | 亚洲日本va在线观看| 日韩欧美一级二级三级久久久| 91久久精品网| 国产v综合v亚洲欧| 国产成人精品免费| 国产不卡一区视频| 91日韩精品一区| 91在线小视频| 91麻豆精品国产| 国产精品短视频| 天堂成人免费av电影一区| 激情国产一区二区 | 人人超碰91尤物精品国产| 国产综合久久久久影院| 在线观看免费亚洲| 精品国内片67194| 亚洲福利视频三区| 91丝袜美女网| 欧美国产精品中文字幕| 一区二区高清在线| 国产成人免费网站| 日韩欧美一二三| 亚洲视频中文字幕| 久久国产精品99精品国产 | 91天堂素人约啪| 国产欧美综合在线观看第十页| 亚洲综合色成人| 色婷婷久久久亚洲一区二区三区 | 中国av一区二区三区| 免费人成网站在线观看欧美高清| 色婷婷av一区二区三区gif| 欧美一区二区三区公司| 欧美国产精品专区| 国产91精品一区二区麻豆网站| 日韩色视频在线观看| 视频精品一区二区| 欧美精品丝袜中出| 丝袜亚洲另类丝袜在线| 欧美日韩国产首页| 亚洲国产精品一区二区久久恐怖片 | 91在线云播放| 亚洲最新在线观看| 在线观看视频91| 亚洲精品久久嫩草网站秘色| 久久精品国产一区二区| 日韩精品一区二区三区在线播放 | 美腿丝袜亚洲三区| www国产亚洲精品久久麻豆| 国产乱淫av一区二区三区| 久久婷婷国产综合国色天香| 国产91露脸合集magnet | 免费一级片91| 91精品办公室少妇高潮对白| 欧美久久久一区| 国产欧美一区二区精品性色超碰| 一区二区免费视频| 色噜噜偷拍精品综合在线| 男女男精品网站| 日本一区二区视频在线观看| 99久久精品一区二区| 亚洲mv大片欧洲mv大片精品| 欧美一级理论性理论a| 色综合久久88色综合天天|