diff options
Diffstat (limited to 'src/lib/libcrypto/evp/evp.h')
-rw-r--r-- | src/lib/libcrypto/evp/evp.h | 743 |
1 files changed, 0 insertions, 743 deletions
diff --git a/src/lib/libcrypto/evp/evp.h b/src/lib/libcrypto/evp/evp.h deleted file mode 100644 index 54215b0905..0000000000 --- a/src/lib/libcrypto/evp/evp.h +++ /dev/null | |||
@@ -1,743 +0,0 @@ | |||
1 | /* crypto/evp/evp.h */ | ||
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | ||
3 | * All rights reserved. | ||
4 | * | ||
5 | * This package is an SSL implementation written | ||
6 | * by Eric Young (eay@cryptsoft.com). | ||
7 | * The implementation was written so as to conform with Netscapes SSL. | ||
8 | * | ||
9 | * This library is free for commercial and non-commercial use as long as | ||
10 | * the following conditions are aheared to. The following conditions | ||
11 | * apply to all code found in this distribution, be it the RC4, RSA, | ||
12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | ||
13 | * included with this distribution is covered by the same copyright terms | ||
14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | ||
15 | * | ||
16 | * Copyright remains Eric Young's, and as such any Copyright notices in | ||
17 | * the code are not to be removed. | ||
18 | * If this package is used in a product, Eric Young should be given attribution | ||
19 | * as the author of the parts of the library used. | ||
20 | * This can be in the form of a textual message at program startup or | ||
21 | * in documentation (online or textual) provided with the package. | ||
22 | * | ||
23 | * Redistribution and use in source and binary forms, with or without | ||
24 | * modification, are permitted provided that the following conditions | ||
25 | * are met: | ||
26 | * 1. Redistributions of source code must retain the copyright | ||
27 | * notice, this list of conditions and the following disclaimer. | ||
28 | * 2. Redistributions in binary form must reproduce the above copyright | ||
29 | * notice, this list of conditions and the following disclaimer in the | ||
30 | * documentation and/or other materials provided with the distribution. | ||
31 | * 3. All advertising materials mentioning features or use of this software | ||
32 | * must display the following acknowledgement: | ||
33 | * "This product includes cryptographic software written by | ||
34 | * Eric Young (eay@cryptsoft.com)" | ||
35 | * The word 'cryptographic' can be left out if the rouines from the library | ||
36 | * being used are not cryptographic related :-). | ||
37 | * 4. If you include any Windows specific code (or a derivative thereof) from | ||
38 | * the apps directory (application code) you must include an acknowledgement: | ||
39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | ||
40 | * | ||
41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | ||
42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | ||
44 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE | ||
45 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | ||
46 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | ||
47 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
48 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | ||
49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | ||
50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | ||
51 | * SUCH DAMAGE. | ||
52 | * | ||
53 | * The licence and distribution terms for any publically available version or | ||
54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | ||
55 | * copied and put under another distribution licence | ||
56 | * [including the GNU Public Licence.] | ||
57 | */ | ||
58 | |||
59 | #ifndef HEADER_ENVELOPE_H | ||
60 | #define HEADER_ENVELOPE_H | ||
61 | |||
62 | #ifdef __cplusplus | ||
63 | extern "C" { | ||
64 | #endif | ||
65 | |||
66 | #ifndef NO_MD2 | ||
67 | #include <openssl/md2.h> | ||
68 | #endif | ||
69 | #ifndef NO_MD5 | ||
70 | #include <openssl/md5.h> | ||
71 | #endif | ||
72 | #ifndef NO_SHA | ||
73 | #include <openssl/sha.h> | ||
74 | #endif | ||
75 | #ifndef NO_RIPEMD | ||
76 | #include <openssl/ripemd.h> | ||
77 | #endif | ||
78 | #ifndef NO_DES | ||
79 | #include <openssl/des.h> | ||
80 | #endif | ||
81 | #ifndef NO_RC4 | ||
82 | #include <openssl/rc4.h> | ||
83 | #endif | ||
84 | #ifndef NO_RC2 | ||
85 | #include <openssl/rc2.h> | ||
86 | #endif | ||
87 | #ifndef NO_RC5 | ||
88 | #include <openssl/rc5.h> | ||
89 | #endif | ||
90 | #ifndef NO_BF | ||
91 | #include <openssl/blowfish.h> | ||
92 | #endif | ||
93 | #ifndef NO_CAST | ||
94 | #include <openssl/cast.h> | ||
95 | #endif | ||
96 | #ifndef NO_IDEA | ||
97 | #include <openssl/idea.h> | ||
98 | #endif | ||
99 | #ifndef NO_MDC2 | ||
100 | #include <openssl/mdc2.h> | ||
101 | #endif | ||
102 | |||
103 | #define EVP_RC2_KEY_SIZE 16 | ||
104 | #define EVP_RC4_KEY_SIZE 16 | ||
105 | #define EVP_BLOWFISH_KEY_SIZE 16 | ||
106 | #define EVP_CAST5_KEY_SIZE 16 | ||
107 | #define EVP_RC5_32_12_16_KEY_SIZE 16 | ||
108 | #define EVP_MAX_MD_SIZE (16+20) /* The SSLv3 md5+sha1 type */ | ||
109 | #define EVP_MAX_KEY_LENGTH 24 | ||
110 | #define EVP_MAX_IV_LENGTH 8 | ||
111 | |||
112 | #define PKCS5_SALT_LEN 8 | ||
113 | /* Default PKCS#5 iteration count */ | ||
114 | #define PKCS5_DEFAULT_ITER 2048 | ||
115 | |||
116 | #ifndef NO_RSA | ||
117 | #include <openssl/rsa.h> | ||
118 | #endif | ||
119 | |||
120 | #ifndef NO_DSA | ||
121 | #include <openssl/dsa.h> | ||
122 | #endif | ||
123 | |||
124 | #ifndef NO_DH | ||
125 | #include <openssl/dh.h> | ||
126 | #endif | ||
127 | |||
128 | #include <openssl/objects.h> | ||
129 | |||
130 | #define EVP_PK_RSA 0x0001 | ||
131 | #define EVP_PK_DSA 0x0002 | ||
132 | #define EVP_PK_DH 0x0004 | ||
133 | #define EVP_PKT_SIGN 0x0010 | ||
134 | #define EVP_PKT_ENC 0x0020 | ||
135 | #define EVP_PKT_EXCH 0x0040 | ||
136 | #define EVP_PKS_RSA 0x0100 | ||
137 | #define EVP_PKS_DSA 0x0200 | ||
138 | #define EVP_PKT_EXP 0x1000 /* <= 512 bit key */ | ||
139 | |||
140 | #define EVP_PKEY_NONE NID_undef | ||
141 | #define EVP_PKEY_RSA NID_rsaEncryption | ||
142 | #define EVP_PKEY_RSA2 NID_rsa | ||
143 | #define EVP_PKEY_DSA NID_dsa | ||
144 | #define EVP_PKEY_DSA1 NID_dsa_2 | ||
145 | #define EVP_PKEY_DSA2 NID_dsaWithSHA | ||
146 | #define EVP_PKEY_DSA3 NID_dsaWithSHA1 | ||
147 | #define EVP_PKEY_DSA4 NID_dsaWithSHA1_2 | ||
148 | #define EVP_PKEY_DH NID_dhKeyAgreement | ||
149 | |||
150 | /* Type needs to be a bit field | ||
151 | * Sub-type needs to be for variations on the method, as in, can it do | ||
152 | * arbitrary encryption.... */ | ||
153 | typedef struct evp_pkey_st | ||
154 | { | ||
155 | int type; | ||
156 | int save_type; | ||
157 | int references; | ||
158 | union { | ||
159 | char *ptr; | ||
160 | #ifndef NO_RSA | ||
161 | struct rsa_st *rsa; /* RSA */ | ||
162 | #endif | ||
163 | #ifndef NO_DSA | ||
164 | struct dsa_st *dsa; /* DSA */ | ||
165 | #endif | ||
166 | #ifndef NO_DH | ||
167 | struct dh_st *dh; /* DH */ | ||
168 | #endif | ||
169 | } pkey; | ||
170 | int save_parameters; | ||
171 | STACK /*X509_ATTRIBUTE*/ *attributes; /* [ 0 ] */ | ||
172 | } EVP_PKEY; | ||
173 | |||
174 | #define EVP_PKEY_MO_SIGN 0x0001 | ||
175 | #define EVP_PKEY_MO_VERIFY 0x0002 | ||
176 | #define EVP_PKEY_MO_ENCRYPT 0x0004 | ||
177 | #define EVP_PKEY_MO_DECRYPT 0x0008 | ||
178 | |||
179 | #if 0 | ||
180 | /* This structure is required to tie the message digest and signing together. | ||
181 | * The lookup can be done by md/pkey_method, oid, oid/pkey_method, or | ||
182 | * oid, md and pkey. | ||
183 | * This is required because for various smart-card perform the digest and | ||
184 | * signing/verification on-board. To handle this case, the specific | ||
185 | * EVP_MD and EVP_PKEY_METHODs need to be closely associated. | ||
186 | * When a PKEY is created, it will have a EVP_PKEY_METHOD associated with it. | ||
187 | * This can either be software or a token to provide the required low level | ||
188 | * routines. | ||
189 | */ | ||
190 | typedef struct evp_pkey_md_st | ||
191 | { | ||
192 | int oid; | ||
193 | EVP_MD *md; | ||
194 | EVP_PKEY_METHOD *pkey; | ||
195 | } EVP_PKEY_MD; | ||
196 | |||
197 | #define EVP_rsa_md2() \ | ||
198 | EVP_PKEY_MD_add(NID_md2WithRSAEncryption,\ | ||
199 | EVP_rsa_pkcs1(),EVP_md2()) | ||
200 | #define EVP_rsa_md5() \ | ||
201 | EVP_PKEY_MD_add(NID_md5WithRSAEncryption,\ | ||
202 | EVP_rsa_pkcs1(),EVP_md5()) | ||
203 | #define EVP_rsa_sha0() \ | ||
204 | EVP_PKEY_MD_add(NID_shaWithRSAEncryption,\ | ||
205 | EVP_rsa_pkcs1(),EVP_sha()) | ||
206 | #define EVP_rsa_sha1() \ | ||
207 | EVP_PKEY_MD_add(NID_sha1WithRSAEncryption,\ | ||
208 | EVP_rsa_pkcs1(),EVP_sha1()) | ||
209 | #define EVP_rsa_ripemd160() \ | ||
210 | EVP_PKEY_MD_add(NID_ripemd160WithRSA,\ | ||
211 | EVP_rsa_pkcs1(),EVP_ripemd160()) | ||
212 | #define EVP_rsa_mdc2() \ | ||
213 | EVP_PKEY_MD_add(NID_mdc2WithRSA,\ | ||
214 | EVP_rsa_octet_string(),EVP_mdc2()) | ||
215 | #define EVP_dsa_sha() \ | ||
216 | EVP_PKEY_MD_add(NID_dsaWithSHA,\ | ||
217 | EVP_dsa(),EVP_mdc2()) | ||
218 | #define EVP_dsa_sha1() \ | ||
219 | EVP_PKEY_MD_add(NID_dsaWithSHA1,\ | ||
220 | EVP_dsa(),EVP_sha1()) | ||
221 | |||
222 | typedef struct evp_pkey_method_st | ||
223 | { | ||
224 | char *name; | ||
225 | int flags; | ||
226 | int type; /* RSA, DSA, an SSLeay specific constant */ | ||
227 | int oid; /* For the pub-key type */ | ||
228 | int encrypt_oid; /* pub/priv key encryption */ | ||
229 | |||
230 | int (*sign)(); | ||
231 | int (*verify)(); | ||
232 | struct { | ||
233 | int | ||
234 | int (*set)(); /* get and/or set the underlying type */ | ||
235 | int (*get)(); | ||
236 | int (*encrypt)(); | ||
237 | int (*decrypt)(); | ||
238 | int (*i2d)(); | ||
239 | int (*d2i)(); | ||
240 | int (*dup)(); | ||
241 | } pub,priv; | ||
242 | int (*set_asn1_parameters)(); | ||
243 | int (*get_asn1_parameters)(); | ||
244 | } EVP_PKEY_METHOD; | ||
245 | #endif | ||
246 | |||
247 | #ifndef EVP_MD | ||
248 | typedef struct env_md_st | ||
249 | { | ||
250 | int type; | ||
251 | int pkey_type; | ||
252 | int md_size; | ||
253 | void (*init)(); | ||
254 | void (*update)(); | ||
255 | void (*final)(); | ||
256 | |||
257 | int (*sign)(); | ||
258 | int (*verify)(); | ||
259 | int required_pkey_type[5]; /*EVP_PKEY_xxx */ | ||
260 | int block_size; | ||
261 | int ctx_size; /* how big does the ctx need to be */ | ||
262 | } EVP_MD; | ||
263 | |||
264 | |||
265 | |||
266 | #define EVP_PKEY_NULL_method NULL,NULL,{0,0,0,0} | ||
267 | |||
268 | #ifndef NO_DSA | ||
269 | #define EVP_PKEY_DSA_method DSA_sign,DSA_verify, \ | ||
270 | {EVP_PKEY_DSA,EVP_PKEY_DSA2,EVP_PKEY_DSA3, \ | ||
271 | EVP_PKEY_DSA4,0} | ||
272 | #else | ||
273 | #define EVP_PKEY_DSA_method EVP_PKEY_NULL_method | ||
274 | #endif | ||
275 | |||
276 | #ifndef NO_RSA | ||
277 | #define EVP_PKEY_RSA_method RSA_sign,RSA_verify, \ | ||
278 | {EVP_PKEY_RSA,EVP_PKEY_RSA2,0,0} | ||
279 | #define EVP_PKEY_RSA_ASN1_OCTET_STRING_method \ | ||
280 | RSA_sign_ASN1_OCTET_STRING, \ | ||
281 | RSA_verify_ASN1_OCTET_STRING, \ | ||
282 | {EVP_PKEY_RSA,EVP_PKEY_RSA2,0,0} | ||
283 | #else | ||
284 | #define EVP_PKEY_RSA_method EVP_PKEY_NULL_method | ||
285 | #define EVP_PKEY_RSA_ASN1_OCTET_STRING_method EVP_PKEY_NULL_method | ||
286 | #endif | ||
287 | |||
288 | #endif /* !EVP_MD */ | ||
289 | |||
290 | typedef struct env_md_ctx_st | ||
291 | { | ||
292 | const EVP_MD *digest; | ||
293 | union { | ||
294 | unsigned char base[4]; | ||
295 | #ifndef NO_MD2 | ||
296 | MD2_CTX md2; | ||
297 | #endif | ||
298 | #ifndef NO_MD5 | ||
299 | MD5_CTX md5; | ||
300 | #endif | ||
301 | #ifndef NO_RIPEMD | ||
302 | RIPEMD160_CTX ripemd160; | ||
303 | #endif | ||
304 | #ifndef NO_SHA | ||
305 | SHA_CTX sha; | ||
306 | #endif | ||
307 | #ifndef NO_MDC2 | ||
308 | MDC2_CTX mdc2; | ||
309 | #endif | ||
310 | } md; | ||
311 | } EVP_MD_CTX; | ||
312 | |||
313 | typedef struct evp_cipher_st | ||
314 | { | ||
315 | int nid; | ||
316 | int block_size; | ||
317 | int key_len; | ||
318 | int iv_len; | ||
319 | void (*init)(); /* init for encryption */ | ||
320 | void (*do_cipher)(); /* encrypt data */ | ||
321 | void (*cleanup)(); /* used by cipher method */ | ||
322 | int ctx_size; /* how big the ctx needs to be */ | ||
323 | /* int set_asn1_parameters(EVP_CIPHER_CTX,ASN1_TYPE *); */ | ||
324 | int (*set_asn1_parameters)(); /* Populate a ASN1_TYPE with parameters */ | ||
325 | /* int get_asn1_parameters(EVP_CIPHER_CTX,ASN1_TYPE *); */ | ||
326 | int (*get_asn1_parameters)(); /* Get parameters from a ASN1_TYPE */ | ||
327 | } EVP_CIPHER; | ||
328 | |||
329 | typedef struct evp_cipher_info_st | ||
330 | { | ||
331 | const EVP_CIPHER *cipher; | ||
332 | unsigned char iv[EVP_MAX_IV_LENGTH]; | ||
333 | } EVP_CIPHER_INFO; | ||
334 | |||
335 | typedef struct evp_cipher_ctx_st | ||
336 | { | ||
337 | const EVP_CIPHER *cipher; | ||
338 | int encrypt; /* encrypt or decrypt */ | ||
339 | int buf_len; /* number we have left */ | ||
340 | |||
341 | unsigned char oiv[EVP_MAX_IV_LENGTH]; /* original iv */ | ||
342 | unsigned char iv[EVP_MAX_IV_LENGTH]; /* working iv */ | ||
343 | unsigned char buf[EVP_MAX_IV_LENGTH]; /* saved partial block */ | ||
344 | int num; /* used by cfb/ofb mode */ | ||
345 | |||
346 | char *app_data; /* application stuff */ | ||
347 | union { | ||
348 | #ifndef NO_RC4 | ||
349 | struct | ||
350 | { | ||
351 | unsigned char key[EVP_RC4_KEY_SIZE]; | ||
352 | RC4_KEY ks; /* working key */ | ||
353 | } rc4; | ||
354 | #endif | ||
355 | #ifndef NO_DES | ||
356 | des_key_schedule des_ks;/* key schedule */ | ||
357 | struct | ||
358 | { | ||
359 | des_key_schedule ks;/* key schedule */ | ||
360 | des_cblock inw; | ||
361 | des_cblock outw; | ||
362 | } desx_cbc; | ||
363 | struct | ||
364 | { | ||
365 | des_key_schedule ks1;/* key schedule */ | ||
366 | des_key_schedule ks2;/* key schedule (for ede) */ | ||
367 | des_key_schedule ks3;/* key schedule (for ede3) */ | ||
368 | } des_ede; | ||
369 | #endif | ||
370 | #ifndef NO_IDEA | ||
371 | IDEA_KEY_SCHEDULE idea_ks;/* key schedule */ | ||
372 | #endif | ||
373 | #ifndef NO_RC2 | ||
374 | RC2_KEY rc2_ks;/* key schedule */ | ||
375 | #endif | ||
376 | #ifndef NO_RC5 | ||
377 | RC5_32_KEY rc5_ks;/* key schedule */ | ||
378 | #endif | ||
379 | #ifndef NO_BF | ||
380 | BF_KEY bf_ks;/* key schedule */ | ||
381 | #endif | ||
382 | #ifndef NO_CAST | ||
383 | CAST_KEY cast_ks;/* key schedule */ | ||
384 | #endif | ||
385 | } c; | ||
386 | } EVP_CIPHER_CTX; | ||
387 | |||
388 | typedef struct evp_Encode_Ctx_st | ||
389 | { | ||
390 | int num; /* number saved in a partial encode/decode */ | ||
391 | int length; /* The length is either the output line length | ||
392 | * (in input bytes) or the shortest input line | ||
393 | * length that is ok. Once decoding begins, | ||
394 | * the length is adjusted up each time a longer | ||
395 | * line is decoded */ | ||
396 | unsigned char enc_data[80]; /* data to encode */ | ||
397 | int line_num; /* number read on current line */ | ||
398 | int expect_nl; | ||
399 | } EVP_ENCODE_CTX; | ||
400 | |||
401 | /* Password based encryption function */ | ||
402 | typedef int (EVP_PBE_KEYGEN)(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, | ||
403 | ASN1_TYPE *param, EVP_CIPHER *cipher, | ||
404 | EVP_MD *md, int en_de); | ||
405 | |||
406 | #define EVP_PKEY_assign_RSA(pkey,rsa) EVP_PKEY_assign((pkey),EVP_PKEY_RSA,\ | ||
407 | (char *)(rsa)) | ||
408 | #define EVP_PKEY_assign_DSA(pkey,dsa) EVP_PKEY_assign((pkey),EVP_PKEY_DSA,\ | ||
409 | (char *)(dsa)) | ||
410 | #define EVP_PKEY_assign_DH(pkey,dh) EVP_PKEY_assign((pkey),EVP_PKEY_DH,\ | ||
411 | (char *)(dh)) | ||
412 | |||
413 | /* Add some extra combinations */ | ||
414 | #define EVP_get_digestbynid(a) EVP_get_digestbyname(OBJ_nid2sn(a)) | ||
415 | #define EVP_get_digestbyobj(a) EVP_get_digestbynid(OBJ_obj2nid(a)) | ||
416 | #define EVP_get_cipherbynid(a) EVP_get_cipherbyname(OBJ_nid2sn(a)) | ||
417 | #define EVP_get_cipherbyobj(a) EVP_get_cipherbynid(OBJ_obj2nid(a)) | ||
418 | |||
419 | #define EVP_MD_type(e) ((e)->type) | ||
420 | #define EVP_MD_pkey_type(e) ((e)->pkey_type) | ||
421 | #define EVP_MD_size(e) ((e)->md_size) | ||
422 | #define EVP_MD_block_size(e) ((e)->block_size) | ||
423 | |||
424 | #define EVP_MD_CTX_md(e) ((e)->digest) | ||
425 | #define EVP_MD_CTX_size(e) EVP_MD_size((e)->digest) | ||
426 | #define EVP_MD_CTX_block_size(e) EVP_MD_block_size((e)->digest) | ||
427 | #define EVP_MD_CTX_type(e) EVP_MD_type((e)->digest) | ||
428 | |||
429 | #define EVP_CIPHER_nid(e) ((e)->nid) | ||
430 | #define EVP_CIPHER_block_size(e) ((e)->block_size) | ||
431 | #define EVP_CIPHER_key_length(e) ((e)->key_len) | ||
432 | #define EVP_CIPHER_iv_length(e) ((e)->iv_len) | ||
433 | |||
434 | #define EVP_CIPHER_CTX_cipher(e) ((e)->cipher) | ||
435 | #define EVP_CIPHER_CTX_nid(e) ((e)->cipher->nid) | ||
436 | #define EVP_CIPHER_CTX_block_size(e) ((e)->cipher->block_size) | ||
437 | #define EVP_CIPHER_CTX_key_length(e) ((e)->cipher->key_len) | ||
438 | #define EVP_CIPHER_CTX_iv_length(e) ((e)->cipher->iv_len) | ||
439 | #define EVP_CIPHER_CTX_get_app_data(e) ((e)->app_data) | ||
440 | #define EVP_CIPHER_CTX_set_app_data(e,d) ((e)->app_data=(char *)(d)) | ||
441 | #define EVP_CIPHER_CTX_type(c) EVP_CIPHER_type(EVP_CIPHER_CTX_cipher(c)) | ||
442 | |||
443 | #define EVP_ENCODE_LENGTH(l) (((l+2)/3*4)+(l/48+1)*2+80) | ||
444 | #define EVP_DECODE_LENGTH(l) ((l+3)/4*3+80) | ||
445 | |||
446 | #define EVP_SignInit(a,b) EVP_DigestInit(a,b) | ||
447 | #define EVP_SignUpdate(a,b,c) EVP_DigestUpdate(a,b,c) | ||
448 | #define EVP_VerifyInit(a,b) EVP_DigestInit(a,b) | ||
449 | #define EVP_VerifyUpdate(a,b,c) EVP_DigestUpdate(a,b,c) | ||
450 | #define EVP_OpenUpdate(a,b,c,d,e) EVP_DecryptUpdate(a,b,c,d,e) | ||
451 | #define EVP_SealUpdate(a,b,c,d,e) EVP_EncryptUpdate(a,b,c,d,e) | ||
452 | |||
453 | #ifdef CONST_STRICT | ||
454 | void BIO_set_md(BIO *,const EVP_MD *md); | ||
455 | #else | ||
456 | # define BIO_set_md(b,md) BIO_ctrl(b,BIO_C_SET_MD,0,(char *)md) | ||
457 | #endif | ||
458 | #define BIO_get_md(b,mdp) BIO_ctrl(b,BIO_C_GET_MD,0,(char *)mdp) | ||
459 | #define BIO_get_md_ctx(b,mdcp) BIO_ctrl(b,BIO_C_GET_MD_CTX,0,(char *)mdcp) | ||
460 | #define BIO_get_cipher_status(b) BIO_ctrl(b,BIO_C_GET_CIPHER_STATUS,0,NULL) | ||
461 | #define BIO_get_cipher_ctx(b,c_pp) BIO_ctrl(b,BIO_C_GET_CIPHER_CTX,0,(char *)c_pp) | ||
462 | |||
463 | #define EVP_Cipher(c,o,i,l) (c)->cipher->do_cipher((c),(o),(i),(l)) | ||
464 | |||
465 | #define EVP_add_cipher_alias(n,alias) \ | ||
466 | OBJ_NAME_add((alias),OBJ_NAME_TYPE_CIPHER_METH|OBJ_NAME_ALIAS,(n)) | ||
467 | #define EVP_add_digest_alias(n,alias) \ | ||
468 | OBJ_NAME_add((alias),OBJ_NAME_TYPE_MD_METH|OBJ_NAME_ALIAS,(n)) | ||
469 | #define EVP_delete_cipher_alias(alias) \ | ||
470 | OBJ_NAME_remove(alias,OBJ_NAME_TYPE_CIPHER_METH|OBJ_NAME_ALIAS); | ||
471 | #define EVP_delete_digest_alias(alias) \ | ||
472 | OBJ_NAME_remove(alias,OBJ_NAME_TYPE_MD_METH|OBJ_NAME_ALIAS); | ||
473 | |||
474 | |||
475 | int EVP_MD_CTX_copy(EVP_MD_CTX *out,EVP_MD_CTX *in); | ||
476 | void EVP_DigestInit(EVP_MD_CTX *ctx, const EVP_MD *type); | ||
477 | void EVP_DigestUpdate(EVP_MD_CTX *ctx,const void *d, | ||
478 | unsigned int cnt); | ||
479 | void EVP_DigestFinal(EVP_MD_CTX *ctx,unsigned char *md,unsigned int *s); | ||
480 | |||
481 | int EVP_read_pw_string(char *buf,int length,const char *prompt,int verify); | ||
482 | void EVP_set_pw_prompt(char *prompt); | ||
483 | char * EVP_get_pw_prompt(void); | ||
484 | |||
485 | int EVP_BytesToKey(const EVP_CIPHER *type,EVP_MD *md,unsigned char *salt, | ||
486 | unsigned char *data, int datal, int count, | ||
487 | unsigned char *key,unsigned char *iv); | ||
488 | |||
489 | void EVP_EncryptInit(EVP_CIPHER_CTX *ctx,const EVP_CIPHER *type, | ||
490 | unsigned char *key, unsigned char *iv); | ||
491 | void EVP_EncryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, | ||
492 | int *outl, unsigned char *in, int inl); | ||
493 | void EVP_EncryptFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl); | ||
494 | |||
495 | void EVP_DecryptInit(EVP_CIPHER_CTX *ctx,const EVP_CIPHER *type, | ||
496 | unsigned char *key, unsigned char *iv); | ||
497 | void EVP_DecryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, | ||
498 | int *outl, unsigned char *in, int inl); | ||
499 | int EVP_DecryptFinal(EVP_CIPHER_CTX *ctx, unsigned char *outm, int *outl); | ||
500 | |||
501 | void EVP_CipherInit(EVP_CIPHER_CTX *ctx,const EVP_CIPHER *type, | ||
502 | unsigned char *key,unsigned char *iv,int enc); | ||
503 | void EVP_CipherUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, | ||
504 | int *outl, unsigned char *in, int inl); | ||
505 | int EVP_CipherFinal(EVP_CIPHER_CTX *ctx, unsigned char *outm, int *outl); | ||
506 | |||
507 | int EVP_SignFinal(EVP_MD_CTX *ctx,unsigned char *md,unsigned int *s, | ||
508 | EVP_PKEY *pkey); | ||
509 | |||
510 | int EVP_VerifyFinal(EVP_MD_CTX *ctx,unsigned char *sigbuf, | ||
511 | unsigned int siglen,EVP_PKEY *pkey); | ||
512 | |||
513 | int EVP_OpenInit(EVP_CIPHER_CTX *ctx,EVP_CIPHER *type,unsigned char *ek, | ||
514 | int ekl,unsigned char *iv,EVP_PKEY *priv); | ||
515 | int EVP_OpenFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl); | ||
516 | |||
517 | int EVP_SealInit(EVP_CIPHER_CTX *ctx, EVP_CIPHER *type, unsigned char **ek, | ||
518 | int *ekl, unsigned char *iv,EVP_PKEY **pubk, int npubk); | ||
519 | void EVP_SealFinal(EVP_CIPHER_CTX *ctx,unsigned char *out,int *outl); | ||
520 | |||
521 | void EVP_EncodeInit(EVP_ENCODE_CTX *ctx); | ||
522 | void EVP_EncodeUpdate(EVP_ENCODE_CTX *ctx,unsigned char *out, | ||
523 | int *outl,unsigned char *in,int inl); | ||
524 | void EVP_EncodeFinal(EVP_ENCODE_CTX *ctx,unsigned char *out,int *outl); | ||
525 | int EVP_EncodeBlock(unsigned char *t, const unsigned char *f, int n); | ||
526 | |||
527 | void EVP_DecodeInit(EVP_ENCODE_CTX *ctx); | ||
528 | int EVP_DecodeUpdate(EVP_ENCODE_CTX *ctx,unsigned char *out,int *outl, | ||
529 | unsigned char *in, int inl); | ||
530 | int EVP_DecodeFinal(EVP_ENCODE_CTX *ctx, unsigned | ||
531 | char *out, int *outl); | ||
532 | int EVP_DecodeBlock(unsigned char *t, const unsigned char *f, int n); | ||
533 | |||
534 | void ERR_load_EVP_strings(void ); | ||
535 | |||
536 | void EVP_CIPHER_CTX_init(EVP_CIPHER_CTX *a); | ||
537 | void EVP_CIPHER_CTX_cleanup(EVP_CIPHER_CTX *a); | ||
538 | |||
539 | #ifdef HEADER_BIO_H | ||
540 | BIO_METHOD *BIO_f_md(void); | ||
541 | BIO_METHOD *BIO_f_base64(void); | ||
542 | BIO_METHOD *BIO_f_cipher(void); | ||
543 | BIO_METHOD *BIO_f_reliable(void); | ||
544 | void BIO_set_cipher(BIO *b,const EVP_CIPHER *c,unsigned char *k, | ||
545 | unsigned char *i, int enc); | ||
546 | #endif | ||
547 | |||
548 | EVP_MD *EVP_md_null(void); | ||
549 | EVP_MD *EVP_md2(void); | ||
550 | EVP_MD *EVP_md5(void); | ||
551 | EVP_MD *EVP_sha(void); | ||
552 | EVP_MD *EVP_sha1(void); | ||
553 | EVP_MD *EVP_dss(void); | ||
554 | EVP_MD *EVP_dss1(void); | ||
555 | EVP_MD *EVP_mdc2(void); | ||
556 | EVP_MD *EVP_ripemd160(void); | ||
557 | |||
558 | EVP_CIPHER *EVP_enc_null(void); /* does nothing :-) */ | ||
559 | EVP_CIPHER *EVP_des_ecb(void); | ||
560 | EVP_CIPHER *EVP_des_ede(void); | ||
561 | EVP_CIPHER *EVP_des_ede3(void); | ||
562 | EVP_CIPHER *EVP_des_cfb(void); | ||
563 | EVP_CIPHER *EVP_des_ede_cfb(void); | ||
564 | EVP_CIPHER *EVP_des_ede3_cfb(void); | ||
565 | EVP_CIPHER *EVP_des_ofb(void); | ||
566 | EVP_CIPHER *EVP_des_ede_ofb(void); | ||
567 | EVP_CIPHER *EVP_des_ede3_ofb(void); | ||
568 | EVP_CIPHER *EVP_des_cbc(void); | ||
569 | EVP_CIPHER *EVP_des_ede_cbc(void); | ||
570 | EVP_CIPHER *EVP_des_ede3_cbc(void); | ||
571 | EVP_CIPHER *EVP_desx_cbc(void); | ||
572 | EVP_CIPHER *EVP_rc4(void); | ||
573 | EVP_CIPHER *EVP_rc4_40(void); | ||
574 | EVP_CIPHER *EVP_idea_ecb(void); | ||
575 | EVP_CIPHER *EVP_idea_cfb(void); | ||
576 | EVP_CIPHER *EVP_idea_ofb(void); | ||
577 | EVP_CIPHER *EVP_idea_cbc(void); | ||
578 | EVP_CIPHER *EVP_rc2_ecb(void); | ||
579 | EVP_CIPHER *EVP_rc2_cbc(void); | ||
580 | EVP_CIPHER *EVP_rc2_40_cbc(void); | ||
581 | EVP_CIPHER *EVP_rc2_64_cbc(void); | ||
582 | EVP_CIPHER *EVP_rc2_cfb(void); | ||
583 | EVP_CIPHER *EVP_rc2_ofb(void); | ||
584 | EVP_CIPHER *EVP_bf_ecb(void); | ||
585 | EVP_CIPHER *EVP_bf_cbc(void); | ||
586 | EVP_CIPHER *EVP_bf_cfb(void); | ||
587 | EVP_CIPHER *EVP_bf_ofb(void); | ||
588 | EVP_CIPHER *EVP_cast5_ecb(void); | ||
589 | EVP_CIPHER *EVP_cast5_cbc(void); | ||
590 | EVP_CIPHER *EVP_cast5_cfb(void); | ||
591 | EVP_CIPHER *EVP_cast5_ofb(void); | ||
592 | EVP_CIPHER *EVP_rc5_32_12_16_cbc(void); | ||
593 | EVP_CIPHER *EVP_rc5_32_12_16_ecb(void); | ||
594 | EVP_CIPHER *EVP_rc5_32_12_16_cfb(void); | ||
595 | EVP_CIPHER *EVP_rc5_32_12_16_ofb(void); | ||
596 | |||
597 | void OpenSSL_add_all_algorithms(void); | ||
598 | void OpenSSL_add_all_ciphers(void); | ||
599 | void OpenSSL_add_all_digests(void); | ||
600 | #define SSLeay_add_all_algorithms() OpenSSL_add_all_algorithms() | ||
601 | #define SSLeay_add_all_ciphers() OpenSSL_add_all_ciphers() | ||
602 | #define SSLeay_add_all_digests() OpenSSL_add_all_digests() | ||
603 | |||
604 | int EVP_add_cipher(EVP_CIPHER *cipher); | ||
605 | int EVP_add_digest(EVP_MD *digest); | ||
606 | |||
607 | const EVP_CIPHER *EVP_get_cipherbyname(const char *name); | ||
608 | const EVP_MD *EVP_get_digestbyname(const char *name); | ||
609 | void EVP_cleanup(void); | ||
610 | |||
611 | int EVP_PKEY_decrypt(unsigned char *dec_key,unsigned char *enc_key, | ||
612 | int enc_key_len,EVP_PKEY *private_key); | ||
613 | int EVP_PKEY_encrypt(unsigned char *enc_key, | ||
614 | unsigned char *key,int key_len,EVP_PKEY *pub_key); | ||
615 | int EVP_PKEY_type(int type); | ||
616 | int EVP_PKEY_bits(EVP_PKEY *pkey); | ||
617 | int EVP_PKEY_size(EVP_PKEY *pkey); | ||
618 | int EVP_PKEY_assign(EVP_PKEY *pkey,int type,char *key); | ||
619 | #ifndef NO_RSA | ||
620 | int EVP_PKEY_set1_RSA(EVP_PKEY *pkey,RSA *key); | ||
621 | RSA * EVP_PKEY_get1_RSA(EVP_PKEY *pkey); | ||
622 | #endif | ||
623 | #ifndef NO_DSA | ||
624 | int EVP_PKEY_set1_DSA(EVP_PKEY *pkey,DSA *key); | ||
625 | DSA * EVP_PKEY_get1_DSA(EVP_PKEY *pkey); | ||
626 | #endif | ||
627 | #ifndef NO_DH | ||
628 | int EVP_PKEY_set1_DH(EVP_PKEY *pkey,DH *key); | ||
629 | DH * EVP_PKEY_get1_DH(EVP_PKEY *pkey); | ||
630 | #endif | ||
631 | EVP_PKEY * EVP_PKEY_new(void); | ||
632 | void EVP_PKEY_free(EVP_PKEY *pkey); | ||
633 | EVP_PKEY * d2i_PublicKey(int type,EVP_PKEY **a, unsigned char **pp, | ||
634 | long length); | ||
635 | int i2d_PublicKey(EVP_PKEY *a, unsigned char **pp); | ||
636 | |||
637 | EVP_PKEY * d2i_PrivateKey(int type,EVP_PKEY **a, unsigned char **pp, | ||
638 | long length); | ||
639 | EVP_PKEY * d2i_AutoPrivateKey(EVP_PKEY **a, unsigned char **pp, | ||
640 | long length); | ||
641 | int i2d_PrivateKey(EVP_PKEY *a, unsigned char **pp); | ||
642 | |||
643 | int EVP_PKEY_copy_parameters(EVP_PKEY *to,EVP_PKEY *from); | ||
644 | int EVP_PKEY_missing_parameters(EVP_PKEY *pkey); | ||
645 | int EVP_PKEY_save_parameters(EVP_PKEY *pkey,int mode); | ||
646 | int EVP_PKEY_cmp_parameters(EVP_PKEY *a,EVP_PKEY *b); | ||
647 | |||
648 | int EVP_CIPHER_type(const EVP_CIPHER *ctx); | ||
649 | |||
650 | /* calls methods */ | ||
651 | int EVP_CIPHER_param_to_asn1(EVP_CIPHER_CTX *c, ASN1_TYPE *type); | ||
652 | int EVP_CIPHER_asn1_to_param(EVP_CIPHER_CTX *c, ASN1_TYPE *type); | ||
653 | |||
654 | /* These are used by EVP_CIPHER methods */ | ||
655 | int EVP_CIPHER_set_asn1_iv(EVP_CIPHER_CTX *c,ASN1_TYPE *type); | ||
656 | int EVP_CIPHER_get_asn1_iv(EVP_CIPHER_CTX *c,ASN1_TYPE *type); | ||
657 | |||
658 | /* PKCS5 password based encryption */ | ||
659 | int PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, | ||
660 | ASN1_TYPE *param, EVP_CIPHER *cipher, EVP_MD *md, | ||
661 | int en_de); | ||
662 | int PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, | ||
663 | unsigned char *salt, int saltlen, int iter, | ||
664 | int keylen, unsigned char *out); | ||
665 | int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, | ||
666 | ASN1_TYPE *param, EVP_CIPHER *cipher, EVP_MD *md, | ||
667 | int en_de); | ||
668 | |||
669 | void PKCS5_PBE_add(void); | ||
670 | |||
671 | int EVP_PBE_CipherInit (ASN1_OBJECT *pbe_obj, const char *pass, int passlen, | ||
672 | ASN1_TYPE *param, EVP_CIPHER_CTX *ctx, int en_de); | ||
673 | int EVP_PBE_alg_add(int nid, EVP_CIPHER *cipher, EVP_MD *md, | ||
674 | EVP_PBE_KEYGEN *keygen); | ||
675 | void EVP_PBE_cleanup(void); | ||
676 | |||
677 | /* BEGIN ERROR CODES */ | ||
678 | /* The following lines are auto generated by the script mkerr.pl. Any changes | ||
679 | * made after this point may be overwritten when the script is next run. | ||
680 | */ | ||
681 | |||
682 | /* Error codes for the EVP functions. */ | ||
683 | |||
684 | /* Function codes. */ | ||
685 | #define EVP_F_D2I_PKEY 100 | ||
686 | #define EVP_F_EVP_DECRYPTFINAL 101 | ||
687 | #define EVP_F_EVP_MD_CTX_COPY 110 | ||
688 | #define EVP_F_EVP_OPENINIT 102 | ||
689 | #define EVP_F_EVP_PBE_ALG_ADD 115 | ||
690 | #define EVP_F_EVP_PBE_CIPHERINIT 116 | ||
691 | #define EVP_F_EVP_PKCS82PKEY 111 | ||
692 | #define EVP_F_EVP_PKCS8_SET_BROKEN 112 | ||
693 | #define EVP_F_EVP_PKEY2PKCS8 113 | ||
694 | #define EVP_F_EVP_PKEY_COPY_PARAMETERS 103 | ||
695 | #define EVP_F_EVP_PKEY_DECRYPT 104 | ||
696 | #define EVP_F_EVP_PKEY_ENCRYPT 105 | ||
697 | #define EVP_F_EVP_PKEY_GET1_DH 119 | ||
698 | #define EVP_F_EVP_PKEY_GET1_DSA 120 | ||
699 | #define EVP_F_EVP_PKEY_GET1_RSA 121 | ||
700 | #define EVP_F_EVP_PKEY_NEW 106 | ||
701 | #define EVP_F_EVP_SIGNFINAL 107 | ||
702 | #define EVP_F_EVP_VERIFYFINAL 108 | ||
703 | #define EVP_F_PKCS5_PBE_KEYIVGEN 117 | ||
704 | #define EVP_F_PKCS5_V2_PBE_KEYIVGEN 118 | ||
705 | #define EVP_F_RC2_MAGIC_TO_METH 109 | ||
706 | |||
707 | /* Reason codes. */ | ||
708 | #define EVP_R_BAD_DECRYPT 100 | ||
709 | #define EVP_R_BN_DECODE_ERROR 112 | ||
710 | #define EVP_R_BN_PUBKEY_ERROR 113 | ||
711 | #define EVP_R_CIPHER_PARAMETER_ERROR 122 | ||
712 | #define EVP_R_DECODE_ERROR 114 | ||
713 | #define EVP_R_DIFFERENT_KEY_TYPES 101 | ||
714 | #define EVP_R_ENCODE_ERROR 115 | ||
715 | #define EVP_R_EVP_PBE_CIPHERINIT_ERROR 119 | ||
716 | #define EVP_R_EXPECTING_AN_RSA_KEY 127 | ||
717 | #define EVP_R_EXPECTING_A_DH_KEY 128 | ||
718 | #define EVP_R_EXPECTING_A_DSA_KEY 129 | ||
719 | #define EVP_R_INPUT_NOT_INITIALIZED 111 | ||
720 | #define EVP_R_IV_TOO_LARGE 102 | ||
721 | #define EVP_R_KEYGEN_FAILURE 120 | ||
722 | #define EVP_R_MISSING_PARAMETERS 103 | ||
723 | #define EVP_R_NO_DSA_PARAMETERS 116 | ||
724 | #define EVP_R_NO_SIGN_FUNCTION_CONFIGURED 104 | ||
725 | #define EVP_R_NO_VERIFY_FUNCTION_CONFIGURED 105 | ||
726 | #define EVP_R_PKCS8_UNKNOWN_BROKEN_TYPE 117 | ||
727 | #define EVP_R_PUBLIC_KEY_NOT_RSA 106 | ||
728 | #define EVP_R_UNKNOWN_PBE_ALGORITHM 121 | ||
729 | #define EVP_R_UNSUPPORTED_CIPHER 107 | ||
730 | #define EVP_R_UNSUPPORTED_KEYLENGTH 123 | ||
731 | #define EVP_R_UNSUPPORTED_KEY_DERIVATION_FUNCTION 124 | ||
732 | #define EVP_R_UNSUPPORTED_KEY_SIZE 108 | ||
733 | #define EVP_R_UNSUPPORTED_PRF 125 | ||
734 | #define EVP_R_UNSUPPORTED_PRIVATE_KEY_ALGORITHM 118 | ||
735 | #define EVP_R_UNSUPPORTED_SALT_TYPE 126 | ||
736 | #define EVP_R_WRONG_FINAL_BLOCK_LENGTH 109 | ||
737 | #define EVP_R_WRONG_PUBLIC_KEY_TYPE 110 | ||
738 | |||
739 | #ifdef __cplusplus | ||
740 | } | ||
741 | #endif | ||
742 | #endif | ||
743 | |||