123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439 |
- <!-- HTML header for doxygen 1.8.10-->
- <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
- <html xmlns="http://www.w3.org/1999/xhtml">
- <head>
- <meta http-equiv="Content-Type" content="text/xhtml;charset=UTF-8"/>
- <meta http-equiv="X-UA-Compatible" content="IE=9"/>
- <meta name="generator" content="Doxygen 1.8.11"/>
- <title>Intel® Enhanced Privacy ID SDK: fileparser</title>
- <link href="tabs.css" rel="stylesheet" type="text/css"/>
- <script type="text/javascript" src="jquery.js"></script>
- <script type="text/javascript" src="dynsections.js"></script>
- <link href="navtree.css" rel="stylesheet" type="text/css"/>
- <script type="text/javascript" src="resize.js"></script>
- <script type="text/javascript" src="navtreedata.js"></script>
- <script type="text/javascript" src="navtree.js"></script>
- <script type="text/javascript">
- $(document).ready(initResizable);
- $(window).load(resizeHeight);
- </script>
- <link href="doxygen.css" rel="stylesheet" type="text/css" />
- <link href="epidstyle.css" rel="stylesheet" type="text/css"/>
- </head>
- <body>
- <div id="top"><!-- do not remove this div, it is closed by doxygen! -->
- <div id="titlearea">
- <table cellspacing="0" cellpadding="0">
- <tbody>
- <tr style="height: 56px;">
- <td id="projectalign" style="padding-left: 0.5em;">
- <div id="projectname"><a
- onclick="storeLink('index.html')"
- id="projectlink"
- class="index.html"
- href="index.html">Intel® Enhanced Privacy ID SDK</a>
-  <span id="projectnumber">2.0.0</span>
- </div>
- </td>
- </tr>
- </tbody>
- </table>
- </div>
- <!-- end header part -->
- <!-- Generated by Doxygen 1.8.11 -->
- </div><!-- top -->
- <div id="side-nav" class="ui-resizable side-nav-resizable">
- <div id="nav-tree">
- <div id="nav-tree-contents">
- <div id="nav-sync" class="sync"></div>
- </div>
- </div>
- <div id="splitbar" style="-moz-user-select:none;"
- class="ui-resizable-handle">
- </div>
- </div>
- <script type="text/javascript">
- $(document).ready(function(){initNavTree('group___file_parser.html','');});
- </script>
- <div id="doc-content">
- <div class="header">
- <div class="summary">
- <a href="#nested-classes">Data Structures</a> |
- <a href="#enum-members">Enumerations</a> |
- <a href="#func-members">Functions</a> |
- <a href="#var-members">Variables</a> </div>
- <div class="headertitle">
- <div class="title">fileparser<div class="ingroups"><a class="el" href="group___epid_module.html">epid</a> » <a class="el" href="group___epid_common.html">common</a></div></div> </div>
- </div><!--header-->
- <div class="contents">
- <p>Parser for issuer material.
- <a href="#details">More...</a></p>
- <table class="memberdecls">
- <tr class="heading"><td colspan="2"><h2 class="groupheader"><a name="nested-classes"></a>
- Data Structures</h2></td></tr>
- <tr class="memitem:"><td class="memItemLeft" align="right" valign="top">struct  </td><td class="memItemRight" valign="bottom"><a class="el" href="struct_epid_file_header.html">EpidFileHeader</a></td></tr>
- <tr class="memdesc:"><td class="mdescLeft"> </td><td class="mdescRight">Intel(R) EPID binary file header. <a href="struct_epid_file_header.html#details">More...</a><br /></td></tr>
- <tr class="separator:"><td class="memSeparator" colspan="2"> </td></tr>
- <tr class="memitem:"><td class="memItemLeft" align="right" valign="top">struct  </td><td class="memItemRight" valign="bottom"><a class="el" href="struct_epid_ca_certificate.html">EpidCaCertificate</a></td></tr>
- <tr class="memdesc:"><td class="mdescLeft"> </td><td class="mdescRight">IoT CA Certificate binary format. <a href="struct_epid_ca_certificate.html#details">More...</a><br /></td></tr>
- <tr class="separator:"><td class="memSeparator" colspan="2"> </td></tr>
- </table><table class="memberdecls">
- <tr class="heading"><td colspan="2"><h2 class="groupheader"><a name="enum-members"></a>
- Enumerations</h2></td></tr>
- <tr class="memitem:ga9a33be7edc6b4c7a867fb07bd2bddecb"><td class="memItemLeft" align="right" valign="top">enum  </td><td class="memItemRight" valign="bottom"><a class="el" href="group___file_parser.html#ga9a33be7edc6b4c7a867fb07bd2bddecb">EpidFileType</a> { <br />
-   <a class="el" href="group___file_parser.html#gga9a33be7edc6b4c7a867fb07bd2bddecbac24554caafe2db01e2daed413188cd92">kIssuingCaPubKeyFile</a>,
- <a class="el" href="group___file_parser.html#gga9a33be7edc6b4c7a867fb07bd2bddecba1f8d8c4b253403a35c51e05d34a7ca1e">kGroupPubKeyFile</a>,
- <a class="el" href="group___file_parser.html#gga9a33be7edc6b4c7a867fb07bd2bddecba692b4141bff8225bee6000750b0da322">kPrivRlFile</a>,
- <a class="el" href="group___file_parser.html#gga9a33be7edc6b4c7a867fb07bd2bddecba8aead4b6aab87a1efb2d7e8c77a9b710">kSigRlFile</a>,
- <br />
-   <a class="el" href="group___file_parser.html#gga9a33be7edc6b4c7a867fb07bd2bddecba8e5247daee3999540e6cb24d4c2b3770">kGroupRlFile</a>,
- <a class="el" href="group___file_parser.html#gga9a33be7edc6b4c7a867fb07bd2bddecbac708ba9e56eaeac0f1256457cbd45911">kPrivRlRequestFile</a>,
- <a class="el" href="group___file_parser.html#gga9a33be7edc6b4c7a867fb07bd2bddecbac52e5fe24a12424316f655b9b7c62600">kSigRlRequestFile</a>,
- <a class="el" href="group___file_parser.html#gga9a33be7edc6b4c7a867fb07bd2bddecbab772fa1e3f221af125ffb34b86b3f24c">kGroupRlRequestFile</a>,
- <br />
-   <a class="el" href="group___file_parser.html#gga9a33be7edc6b4c7a867fb07bd2bddecbac6d742ea3dd3b17f6d763970ac84b811">kNumFileTypes</a>
- <br />
- }<tr class="memdesc:ga9a33be7edc6b4c7a867fb07bd2bddecb"><td class="mdescLeft"> </td><td class="mdescRight">Recognized Intel(R) EPID file types. <a href="group___file_parser.html#ga9a33be7edc6b4c7a867fb07bd2bddecb">More...</a><br /></td></tr>
- </td></tr>
- <tr class="separator:ga9a33be7edc6b4c7a867fb07bd2bddecb"><td class="memSeparator" colspan="2"> </td></tr>
- </table><table class="memberdecls">
- <tr class="heading"><td colspan="2"><h2 class="groupheader"><a name="func-members"></a>
- Functions</h2></td></tr>
- <tr class="memitem:ga43fdbc1bf2edd3695d21cb457365afbb"><td class="memItemLeft" align="right" valign="top"><a class="el" href="group___error_codes.html#gafdb27c77c2c4b32c807e326a8a0da360">EpidStatus</a> </td><td class="memItemRight" valign="bottom"><a class="el" href="group___file_parser.html#ga43fdbc1bf2edd3695d21cb457365afbb">EpidParseGroupPubKeyFile</a> (void const *buf, size_t len, <a class="el" href="struct_epid_ca_certificate.html">EpidCaCertificate</a> const *cert, <a class="el" href="struct_group_pub_key.html">GroupPubKey</a> *pubkey)</td></tr>
- <tr class="memdesc:ga43fdbc1bf2edd3695d21cb457365afbb"><td class="mdescLeft"> </td><td class="mdescRight">Extracts group public key from buffer in issuer binary format. <a href="#ga43fdbc1bf2edd3695d21cb457365afbb">More...</a><br /></td></tr>
- <tr class="separator:ga43fdbc1bf2edd3695d21cb457365afbb"><td class="memSeparator" colspan="2"> </td></tr>
- <tr class="memitem:gadc033fb23e3cbda56aa7e3d412060b7e"><td class="memItemLeft" align="right" valign="top"><a class="el" href="group___error_codes.html#gafdb27c77c2c4b32c807e326a8a0da360">EpidStatus</a> </td><td class="memItemRight" valign="bottom"><a class="el" href="group___file_parser.html#gadc033fb23e3cbda56aa7e3d412060b7e">EpidParsePrivRlFile</a> (void const *buf, size_t len, <a class="el" href="struct_epid_ca_certificate.html">EpidCaCertificate</a> const *cert, <a class="el" href="struct_priv_rl.html">PrivRl</a> *rl, size_t *rl_len)</td></tr>
- <tr class="memdesc:gadc033fb23e3cbda56aa7e3d412060b7e"><td class="mdescLeft"> </td><td class="mdescRight">Extracts private key revocation list from buffer in issuer binary format. <a href="#gadc033fb23e3cbda56aa7e3d412060b7e">More...</a><br /></td></tr>
- <tr class="separator:gadc033fb23e3cbda56aa7e3d412060b7e"><td class="memSeparator" colspan="2"> </td></tr>
- <tr class="memitem:ga237ef5a43076aa6fc6eb18829a93da3f"><td class="memItemLeft" align="right" valign="top"><a class="el" href="group___error_codes.html#gafdb27c77c2c4b32c807e326a8a0da360">EpidStatus</a> </td><td class="memItemRight" valign="bottom"><a class="el" href="group___file_parser.html#ga237ef5a43076aa6fc6eb18829a93da3f">EpidParseSigRlFile</a> (void const *buf, size_t len, <a class="el" href="struct_epid_ca_certificate.html">EpidCaCertificate</a> const *cert, <a class="el" href="struct_sig_rl.html">SigRl</a> *rl, size_t *rl_len)</td></tr>
- <tr class="memdesc:ga237ef5a43076aa6fc6eb18829a93da3f"><td class="mdescLeft"> </td><td class="mdescRight">Extracts signature revocation list from buffer in issuer binary format. <a href="#ga237ef5a43076aa6fc6eb18829a93da3f">More...</a><br /></td></tr>
- <tr class="separator:ga237ef5a43076aa6fc6eb18829a93da3f"><td class="memSeparator" colspan="2"> </td></tr>
- <tr class="memitem:gad767f72dc55307b872a8b5600da3fd6f"><td class="memItemLeft" align="right" valign="top"><a class="el" href="group___error_codes.html#gafdb27c77c2c4b32c807e326a8a0da360">EpidStatus</a> </td><td class="memItemRight" valign="bottom"><a class="el" href="group___file_parser.html#gad767f72dc55307b872a8b5600da3fd6f">EpidParseGroupRlFile</a> (void const *buf, size_t len, <a class="el" href="struct_epid_ca_certificate.html">EpidCaCertificate</a> const *cert, <a class="el" href="struct_group_rl.html">GroupRl</a> *rl, size_t *rl_len)</td></tr>
- <tr class="memdesc:gad767f72dc55307b872a8b5600da3fd6f"><td class="mdescLeft"> </td><td class="mdescRight">Extracts group revocation list from buffer in issuer binary format. <a href="#gad767f72dc55307b872a8b5600da3fd6f">More...</a><br /></td></tr>
- <tr class="separator:gad767f72dc55307b872a8b5600da3fd6f"><td class="memSeparator" colspan="2"> </td></tr>
- </table><table class="memberdecls">
- <tr class="heading"><td colspan="2"><h2 class="groupheader"><a name="var-members"></a>
- Variables</h2></td></tr>
- <tr class="memitem:ga3770c39a0546c79447c9d4159d794c33"><td class="memItemLeft" align="right" valign="top"><a class="anchor" id="ga3770c39a0546c79447c9d4159d794c33"></a>
- const <a class="el" href="struct_oct_str16.html">OctStr16</a> </td><td class="memItemRight" valign="bottom"><a class="el" href="group___file_parser.html#ga3770c39a0546c79447c9d4159d794c33">kEpidFileTypeCode</a> [<a class="el" href="group___file_parser.html#gga9a33be7edc6b4c7a867fb07bd2bddecbac6d742ea3dd3b17f6d763970ac84b811">kNumFileTypes</a>]</td></tr>
- <tr class="memdesc:ga3770c39a0546c79447c9d4159d794c33"><td class="mdescLeft"> </td><td class="mdescRight">Encoding of issuer material file types. <br /></td></tr>
- <tr class="separator:ga3770c39a0546c79447c9d4159d794c33"><td class="memSeparator" colspan="2"> </td></tr>
- </table>
- <a name="details" id="details"></a><h2 class="groupheader">Detailed Description</h2>
- <p>Parser for issuer material. </p>
- <p>Provides an API for parsing buffers formatted according to the various IoT Intel(R) EPID binary file formats. </p>
- <h2 class="groupheader">Enumeration Type Documentation</h2>
- <a class="anchor" id="ga9a33be7edc6b4c7a867fb07bd2bddecb"></a>
- <div class="memitem">
- <div class="memproto">
- <table class="memname">
- <tr>
- <td class="memname">enum <a class="el" href="group___file_parser.html#ga9a33be7edc6b4c7a867fb07bd2bddecb">EpidFileType</a></td>
- </tr>
- </table>
- </div><div class="memdoc">
- <p>Recognized Intel(R) EPID file types. </p>
- <table class="fieldtable">
- <tr><th colspan="2">Enumerator</th></tr><tr><td class="fieldname"><a class="anchor" id="gga9a33be7edc6b4c7a867fb07bd2bddecbac24554caafe2db01e2daed413188cd92"></a>kIssuingCaPubKeyFile </td><td class="fielddoc">
- <p>IoT Issuing CA public key file. </p>
- </td></tr>
- <tr><td class="fieldname"><a class="anchor" id="gga9a33be7edc6b4c7a867fb07bd2bddecba1f8d8c4b253403a35c51e05d34a7ca1e"></a>kGroupPubKeyFile </td><td class="fielddoc">
- <p>Group Public Key Output File Format. </p>
- </td></tr>
- <tr><td class="fieldname"><a class="anchor" id="gga9a33be7edc6b4c7a867fb07bd2bddecba692b4141bff8225bee6000750b0da322"></a>kPrivRlFile </td><td class="fielddoc">
- <p>Binary Private Key Revocation List. </p>
- </td></tr>
- <tr><td class="fieldname"><a class="anchor" id="gga9a33be7edc6b4c7a867fb07bd2bddecba8aead4b6aab87a1efb2d7e8c77a9b710"></a>kSigRlFile </td><td class="fielddoc">
- <p>Binary Signature Revocation List. </p>
- </td></tr>
- <tr><td class="fieldname"><a class="anchor" id="gga9a33be7edc6b4c7a867fb07bd2bddecba8e5247daee3999540e6cb24d4c2b3770"></a>kGroupRlFile </td><td class="fielddoc">
- <p>Binary Group Revocation List. </p>
- </td></tr>
- <tr><td class="fieldname"><a class="anchor" id="gga9a33be7edc6b4c7a867fb07bd2bddecbac708ba9e56eaeac0f1256457cbd45911"></a>kPrivRlRequestFile </td><td class="fielddoc">
- <p>Binary Private Key Revocation Request. </p>
- </td></tr>
- <tr><td class="fieldname"><a class="anchor" id="gga9a33be7edc6b4c7a867fb07bd2bddecbac52e5fe24a12424316f655b9b7c62600"></a>kSigRlRequestFile </td><td class="fielddoc">
- <p>Binary Signature Revocation Request. </p>
- </td></tr>
- <tr><td class="fieldname"><a class="anchor" id="gga9a33be7edc6b4c7a867fb07bd2bddecbab772fa1e3f221af125ffb34b86b3f24c"></a>kGroupRlRequestFile </td><td class="fielddoc">
- <p>Binary Group Revocation Request. </p>
- </td></tr>
- <tr><td class="fieldname"><a class="anchor" id="gga9a33be7edc6b4c7a867fb07bd2bddecbac6d742ea3dd3b17f6d763970ac84b811"></a>kNumFileTypes </td><td class="fielddoc">
- <p>Maximum number of file types. </p>
- </td></tr>
- </table>
- </div>
- </div>
- <h2 class="groupheader">Function Documentation</h2>
- <a class="anchor" id="ga43fdbc1bf2edd3695d21cb457365afbb"></a>
- <div class="memitem">
- <div class="memproto">
- <table class="memname">
- <tr>
- <td class="memname"><a class="el" href="group___error_codes.html#gafdb27c77c2c4b32c807e326a8a0da360">EpidStatus</a> EpidParseGroupPubKeyFile </td>
- <td>(</td>
- <td class="paramtype">void const * </td>
- <td class="paramname"><em>buf</em>, </td>
- </tr>
- <tr>
- <td class="paramkey"></td>
- <td></td>
- <td class="paramtype">size_t </td>
- <td class="paramname"><em>len</em>, </td>
- </tr>
- <tr>
- <td class="paramkey"></td>
- <td></td>
- <td class="paramtype"><a class="el" href="struct_epid_ca_certificate.html">EpidCaCertificate</a> const * </td>
- <td class="paramname"><em>cert</em>, </td>
- </tr>
- <tr>
- <td class="paramkey"></td>
- <td></td>
- <td class="paramtype"><a class="el" href="struct_group_pub_key.html">GroupPubKey</a> * </td>
- <td class="paramname"><em>pubkey</em> </td>
- </tr>
- <tr>
- <td></td>
- <td>)</td>
- <td></td><td></td>
- </tr>
- </table>
- </div><div class="memdoc">
- <p>Extracts group public key from buffer in issuer binary format. </p>
- <p>Extracts the first group public key from a buffer with format of Intel(R) EPID 2.0 Group Public Key Certificate Binary File. The function validates that the first public key was signed by the private key corresponding to the provided CA certificate and the size of the input buffer is correct.</p>
- <dl class="section warning"><dt>Warning</dt><dd>It is the responsibility of the caller to authenticate the <a class="el" href="struct_epid_ca_certificate.html" title="IoT CA Certificate binary format. ">EpidCaCertificate</a>.</dd></dl>
- <dl class="params"><dt>Parameters</dt><dd>
- <table class="params">
- <tr><td class="paramdir">[in]</td><td class="paramname">buf</td><td>Pointer to buffer containing public key to extract.</td></tr>
- <tr><td class="paramdir">[in]</td><td class="paramname">len</td><td>The size of buf in bytes.</td></tr>
- <tr><td class="paramdir">[in]</td><td class="paramname">cert</td><td>The issuing CA public key certificate.</td></tr>
- <tr><td class="paramdir">[out]</td><td class="paramname">pubkey</td><td>The extracted group public key.</td></tr>
- </table>
- </dd>
- </dl>
- <dl class="section return"><dt>Returns</dt><dd><a class="el" href="group___error_codes.html#gafdb27c77c2c4b32c807e326a8a0da360" title="Return status for SDK functions. ">EpidStatus</a></dd></dl>
- <dl class="retval"><dt>Return values</dt><dd>
- <table class="retval">
- <tr><td class="paramname"><a class="el" href="group___error_codes.html#ggafdb27c77c2c4b32c807e326a8a0da360aeedd19b8a1cbdecf963f90b4860e02b8" title="Signature is invalid. ">kEpidSigInvalid</a></td><td>Parsing failed due to data authentication failure. </td></tr>
- </table>
- </dd>
- </dl>
- </div>
- </div>
- <a class="anchor" id="gad767f72dc55307b872a8b5600da3fd6f"></a>
- <div class="memitem">
- <div class="memproto">
- <table class="memname">
- <tr>
- <td class="memname"><a class="el" href="group___error_codes.html#gafdb27c77c2c4b32c807e326a8a0da360">EpidStatus</a> EpidParseGroupRlFile </td>
- <td>(</td>
- <td class="paramtype">void const * </td>
- <td class="paramname"><em>buf</em>, </td>
- </tr>
- <tr>
- <td class="paramkey"></td>
- <td></td>
- <td class="paramtype">size_t </td>
- <td class="paramname"><em>len</em>, </td>
- </tr>
- <tr>
- <td class="paramkey"></td>
- <td></td>
- <td class="paramtype"><a class="el" href="struct_epid_ca_certificate.html">EpidCaCertificate</a> const * </td>
- <td class="paramname"><em>cert</em>, </td>
- </tr>
- <tr>
- <td class="paramkey"></td>
- <td></td>
- <td class="paramtype"><a class="el" href="struct_group_rl.html">GroupRl</a> * </td>
- <td class="paramname"><em>rl</em>, </td>
- </tr>
- <tr>
- <td class="paramkey"></td>
- <td></td>
- <td class="paramtype">size_t * </td>
- <td class="paramname"><em>rl_len</em> </td>
- </tr>
- <tr>
- <td></td>
- <td>)</td>
- <td></td><td></td>
- </tr>
- </table>
- </div><div class="memdoc">
- <p>Extracts group revocation list from buffer in issuer binary format. </p>
- <p>Extracts the group revocation list from a buffer with format of Binary Group Certificate Revocation List File. The function validates that the revocation list was signed by the private key corresponding to the provided CA certificate and the size of the input buffer is correct.</p>
- <p>To determine the required size of the revocation list output buffer, provide a null pointer for the output buffer.</p>
- <dl class="section warning"><dt>Warning</dt><dd>It is the responsibility of the caller to authenticate the <a class="el" href="struct_epid_ca_certificate.html" title="IoT CA Certificate binary format. ">EpidCaCertificate</a>.</dd></dl>
- <dl class="params"><dt>Parameters</dt><dd>
- <table class="params">
- <tr><td class="paramdir">[in]</td><td class="paramname">buf</td><td>Pointer to buffer containing the revocation list to extract.</td></tr>
- <tr><td class="paramdir">[in]</td><td class="paramname">len</td><td>The size of buf in bytes.</td></tr>
- <tr><td class="paramdir">[in]</td><td class="paramname">cert</td><td>The issuing CA public key certificate.</td></tr>
- <tr><td class="paramdir">[out]</td><td class="paramname">rl</td><td>The extracted revocation list. If Null, rl_len is filled with the required output buffer size.</td></tr>
- <tr><td class="paramdir">[in,out]</td><td class="paramname">rl_len</td><td>The size of rl in bytes.</td></tr>
- </table>
- </dd>
- </dl>
- <dl class="section return"><dt>Returns</dt><dd><a class="el" href="group___error_codes.html#gafdb27c77c2c4b32c807e326a8a0da360" title="Return status for SDK functions. ">EpidStatus</a></dd></dl>
- <dl class="retval"><dt>Return values</dt><dd>
- <table class="retval">
- <tr><td class="paramname"><a class="el" href="group___error_codes.html#ggafdb27c77c2c4b32c807e326a8a0da360aeedd19b8a1cbdecf963f90b4860e02b8" title="Signature is invalid. ">kEpidSigInvalid</a></td><td>Parsing failed due to data authentication failure. </td></tr>
- </table>
- </dd>
- </dl>
- </div>
- </div>
- <a class="anchor" id="gadc033fb23e3cbda56aa7e3d412060b7e"></a>
- <div class="memitem">
- <div class="memproto">
- <table class="memname">
- <tr>
- <td class="memname"><a class="el" href="group___error_codes.html#gafdb27c77c2c4b32c807e326a8a0da360">EpidStatus</a> EpidParsePrivRlFile </td>
- <td>(</td>
- <td class="paramtype">void const * </td>
- <td class="paramname"><em>buf</em>, </td>
- </tr>
- <tr>
- <td class="paramkey"></td>
- <td></td>
- <td class="paramtype">size_t </td>
- <td class="paramname"><em>len</em>, </td>
- </tr>
- <tr>
- <td class="paramkey"></td>
- <td></td>
- <td class="paramtype"><a class="el" href="struct_epid_ca_certificate.html">EpidCaCertificate</a> const * </td>
- <td class="paramname"><em>cert</em>, </td>
- </tr>
- <tr>
- <td class="paramkey"></td>
- <td></td>
- <td class="paramtype"><a class="el" href="struct_priv_rl.html">PrivRl</a> * </td>
- <td class="paramname"><em>rl</em>, </td>
- </tr>
- <tr>
- <td class="paramkey"></td>
- <td></td>
- <td class="paramtype">size_t * </td>
- <td class="paramname"><em>rl_len</em> </td>
- </tr>
- <tr>
- <td></td>
- <td>)</td>
- <td></td><td></td>
- </tr>
- </table>
- </div><div class="memdoc">
- <p>Extracts private key revocation list from buffer in issuer binary format. </p>
- <p>Extracts the private key revocation list from a buffer with format of Binary Private Key Revocation List File. The function validates that the revocation list was signed by the private key corresponding to the provided CA certificate and the size of the input buffer is correct.</p>
- <p>To determine the required size of the revocation list output buffer, provide a null pointer for the output buffer.</p>
- <dl class="section warning"><dt>Warning</dt><dd>It is the responsibility of the caller to authenticate the <a class="el" href="struct_epid_ca_certificate.html" title="IoT CA Certificate binary format. ">EpidCaCertificate</a>.</dd></dl>
- <dl class="params"><dt>Parameters</dt><dd>
- <table class="params">
- <tr><td class="paramdir">[in]</td><td class="paramname">buf</td><td>Pointer to buffer containing the revocation list to extract.</td></tr>
- <tr><td class="paramdir">[in]</td><td class="paramname">len</td><td>The size of buf in bytes.</td></tr>
- <tr><td class="paramdir">[in]</td><td class="paramname">cert</td><td>The issuing CA public key certificate.</td></tr>
- <tr><td class="paramdir">[out]</td><td class="paramname">rl</td><td>The extracted revocation list. If Null, rl_len is filled with the required output buffer size.</td></tr>
- <tr><td class="paramdir">[in,out]</td><td class="paramname">rl_len</td><td>The size of rl in bytes.</td></tr>
- </table>
- </dd>
- </dl>
- <dl class="section return"><dt>Returns</dt><dd><a class="el" href="group___error_codes.html#gafdb27c77c2c4b32c807e326a8a0da360" title="Return status for SDK functions. ">EpidStatus</a></dd></dl>
- <dl class="retval"><dt>Return values</dt><dd>
- <table class="retval">
- <tr><td class="paramname"><a class="el" href="group___error_codes.html#ggafdb27c77c2c4b32c807e326a8a0da360aeedd19b8a1cbdecf963f90b4860e02b8" title="Signature is invalid. ">kEpidSigInvalid</a></td><td>Parsing failed due to data authentication failure. </td></tr>
- </table>
- </dd>
- </dl>
- </div>
- </div>
- <a class="anchor" id="ga237ef5a43076aa6fc6eb18829a93da3f"></a>
- <div class="memitem">
- <div class="memproto">
- <table class="memname">
- <tr>
- <td class="memname"><a class="el" href="group___error_codes.html#gafdb27c77c2c4b32c807e326a8a0da360">EpidStatus</a> EpidParseSigRlFile </td>
- <td>(</td>
- <td class="paramtype">void const * </td>
- <td class="paramname"><em>buf</em>, </td>
- </tr>
- <tr>
- <td class="paramkey"></td>
- <td></td>
- <td class="paramtype">size_t </td>
- <td class="paramname"><em>len</em>, </td>
- </tr>
- <tr>
- <td class="paramkey"></td>
- <td></td>
- <td class="paramtype"><a class="el" href="struct_epid_ca_certificate.html">EpidCaCertificate</a> const * </td>
- <td class="paramname"><em>cert</em>, </td>
- </tr>
- <tr>
- <td class="paramkey"></td>
- <td></td>
- <td class="paramtype"><a class="el" href="struct_sig_rl.html">SigRl</a> * </td>
- <td class="paramname"><em>rl</em>, </td>
- </tr>
- <tr>
- <td class="paramkey"></td>
- <td></td>
- <td class="paramtype">size_t * </td>
- <td class="paramname"><em>rl_len</em> </td>
- </tr>
- <tr>
- <td></td>
- <td>)</td>
- <td></td><td></td>
- </tr>
- </table>
- </div><div class="memdoc">
- <p>Extracts signature revocation list from buffer in issuer binary format. </p>
- <p>Extracts the signature based revocation list from a buffer with format of Binary Signature Revocation List File. The function validates that the revocation list was signed by the private key corresponding to the provided CA certificate and the size of the input buffer is correct.</p>
- <p>To determine the required size of the revocation list output buffer, provide a null pointer for the output buffer.</p>
- <dl class="section warning"><dt>Warning</dt><dd>It is the responsibility of the caller to authenticate the <a class="el" href="struct_epid_ca_certificate.html" title="IoT CA Certificate binary format. ">EpidCaCertificate</a>.</dd></dl>
- <dl class="params"><dt>Parameters</dt><dd>
- <table class="params">
- <tr><td class="paramdir">[in]</td><td class="paramname">buf</td><td>Pointer to buffer containing the revocation list to extract.</td></tr>
- <tr><td class="paramdir">[in]</td><td class="paramname">len</td><td>The size of buf in bytes.</td></tr>
- <tr><td class="paramdir">[in]</td><td class="paramname">cert</td><td>The issuing CA public key certificate.</td></tr>
- <tr><td class="paramdir">[out]</td><td class="paramname">rl</td><td>The extracted revocation list. If Null, rl_len is filled with the required output buffer size.</td></tr>
- <tr><td class="paramdir">[in,out]</td><td class="paramname">rl_len</td><td>The size of rl in bytes.</td></tr>
- </table>
- </dd>
- </dl>
- <dl class="section return"><dt>Returns</dt><dd><a class="el" href="group___error_codes.html#gafdb27c77c2c4b32c807e326a8a0da360" title="Return status for SDK functions. ">EpidStatus</a></dd></dl>
- <dl class="retval"><dt>Return values</dt><dd>
- <table class="retval">
- <tr><td class="paramname"><a class="el" href="group___error_codes.html#ggafdb27c77c2c4b32c807e326a8a0da360aeedd19b8a1cbdecf963f90b4860e02b8" title="Signature is invalid. ">kEpidSigInvalid</a></td><td>Parsing failed due to data authentication failure. </td></tr>
- </table>
- </dd>
- </dl>
- </div>
- </div>
- </div><!-- contents -->
- </div><!-- doc-content -->
- <!-- HTML footer for doxygen 1.8.10-->
- <!-- start footer part -->
- <div id="nav-path" class="navpath"><!-- id is needed for treeview function! -->
- <ul>
- <li class="footer">
- © 2016 Intel Corporation
- </li>
- </ul>
- </div>
- </body>
- </html>
|