1998-12-21 10:52:47 +00:00
|
|
|
/* crypto/evp/evp.h */
|
1998-12-21 10:56:39 +00:00
|
|
|
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
|
1998-12-21 10:52:47 +00:00
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* This package is an SSL implementation written
|
|
|
|
* by Eric Young (eay@cryptsoft.com).
|
|
|
|
* The implementation was written so as to conform with Netscapes SSL.
|
2015-01-22 03:29:12 +00:00
|
|
|
*
|
1998-12-21 10:52:47 +00:00
|
|
|
* This library is free for commercial and non-commercial use as long as
|
|
|
|
* the following conditions are aheared to. The following conditions
|
|
|
|
* apply to all code found in this distribution, be it the RC4, RSA,
|
|
|
|
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
|
|
|
* included with this distribution is covered by the same copyright terms
|
|
|
|
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
2015-01-22 03:29:12 +00:00
|
|
|
*
|
1998-12-21 10:52:47 +00:00
|
|
|
* Copyright remains Eric Young's, and as such any Copyright notices in
|
|
|
|
* the code are not to be removed.
|
|
|
|
* If this package is used in a product, Eric Young should be given attribution
|
|
|
|
* as the author of the parts of the library used.
|
|
|
|
* This can be in the form of a textual message at program startup or
|
|
|
|
* in documentation (online or textual) provided with the package.
|
2015-01-22 03:29:12 +00:00
|
|
|
*
|
1998-12-21 10:52:47 +00:00
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
* 3. All advertising materials mentioning features or use of this software
|
|
|
|
* must display the following acknowledgement:
|
|
|
|
* "This product includes cryptographic software written by
|
|
|
|
* Eric Young (eay@cryptsoft.com)"
|
|
|
|
* The word 'cryptographic' can be left out if the rouines from the library
|
|
|
|
* being used are not cryptographic related :-).
|
2015-01-22 03:29:12 +00:00
|
|
|
* 4. If you include any Windows specific code (or a derivative thereof) from
|
1998-12-21 10:52:47 +00:00
|
|
|
* the apps directory (application code) you must include an acknowledgement:
|
|
|
|
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
|
2015-01-22 03:29:12 +00:00
|
|
|
*
|
1998-12-21 10:52:47 +00:00
|
|
|
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
2015-01-22 03:29:12 +00:00
|
|
|
*
|
1998-12-21 10:52:47 +00:00
|
|
|
* The licence and distribution terms for any publically available version or
|
|
|
|
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
|
|
|
* copied and put under another distribution licence
|
|
|
|
* [including the GNU Public Licence.]
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef HEADER_ENVELOPE_H
|
2015-01-22 03:29:12 +00:00
|
|
|
# define HEADER_ENVELOPE_H
|
|
|
|
|
|
|
|
# ifdef OPENSSL_ALGORITHM_DEFINES
|
|
|
|
# include <openssl/opensslconf.h>
|
|
|
|
# else
|
|
|
|
# define OPENSSL_ALGORITHM_DEFINES
|
|
|
|
# include <openssl/opensslconf.h>
|
|
|
|
# undef OPENSSL_ALGORITHM_DEFINES
|
|
|
|
# endif
|
2000-05-15 19:24:23 +00:00
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
# include <openssl/ossl_typ.h>
|
2001-08-05 18:02:16 +00:00
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
# include <openssl/symhacks.h>
|
2002-02-28 13:17:40 +00:00
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
# ifndef OPENSSL_NO_BIO
|
|
|
|
# include <openssl/bio.h>
|
|
|
|
# endif
|
1998-12-21 10:52:47 +00:00
|
|
|
|
2014-12-28 02:48:40 +00:00
|
|
|
/*-
|
2015-01-22 03:29:12 +00:00
|
|
|
#define EVP_RC2_KEY_SIZE 16
|
|
|
|
#define EVP_RC4_KEY_SIZE 16
|
|
|
|
#define EVP_BLOWFISH_KEY_SIZE 16
|
|
|
|
#define EVP_CAST5_KEY_SIZE 16
|
|
|
|
#define EVP_RC5_32_12_16_KEY_SIZE 16
|
2001-07-30 23:57:25 +00:00
|
|
|
*/
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_MAX_MD_SIZE 64/* longest known is SHA512 */
|
|
|
|
# define EVP_MAX_KEY_LENGTH 64
|
|
|
|
# define EVP_MAX_IV_LENGTH 16
|
|
|
|
# define EVP_MAX_BLOCK_LENGTH 32
|
1998-12-21 10:52:47 +00:00
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
# define PKCS5_SALT_LEN 8
|
1999-06-10 17:32:52 +00:00
|
|
|
/* Default PKCS#5 iteration count */
|
2015-01-22 03:29:12 +00:00
|
|
|
# define PKCS5_DEFAULT_ITER 2048
|
|
|
|
|
|
|
|
# include <openssl/objects.h>
|
|
|
|
|
|
|
|
# define EVP_PK_RSA 0x0001
|
|
|
|
# define EVP_PK_DSA 0x0002
|
|
|
|
# define EVP_PK_DH 0x0004
|
|
|
|
# define EVP_PK_EC 0x0008
|
|
|
|
# define EVP_PKT_SIGN 0x0010
|
|
|
|
# define EVP_PKT_ENC 0x0020
|
|
|
|
# define EVP_PKT_EXCH 0x0040
|
|
|
|
# define EVP_PKS_RSA 0x0100
|
|
|
|
# define EVP_PKS_DSA 0x0200
|
|
|
|
# define EVP_PKS_EC 0x0400
|
|
|
|
|
|
|
|
# define EVP_PKEY_NONE NID_undef
|
|
|
|
# define EVP_PKEY_RSA NID_rsaEncryption
|
|
|
|
# define EVP_PKEY_RSA2 NID_rsa
|
|
|
|
# define EVP_PKEY_DSA NID_dsa
|
|
|
|
# define EVP_PKEY_DSA1 NID_dsa_2
|
|
|
|
# define EVP_PKEY_DSA2 NID_dsaWithSHA
|
|
|
|
# define EVP_PKEY_DSA3 NID_dsaWithSHA1
|
|
|
|
# define EVP_PKEY_DSA4 NID_dsaWithSHA1_2
|
|
|
|
# define EVP_PKEY_DH NID_dhKeyAgreement
|
|
|
|
# define EVP_PKEY_DHX NID_dhpublicnumber
|
|
|
|
# define EVP_PKEY_EC NID_X9_62_id_ecPublicKey
|
|
|
|
# define EVP_PKEY_HMAC NID_hmac
|
|
|
|
# define EVP_PKEY_CMAC NID_cmac
|
|
|
|
|
|
|
|
#ifdef __cplusplus
|
2000-05-02 12:16:01 +00:00
|
|
|
extern "C" {
|
|
|
|
#endif
|
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
/*
|
|
|
|
* Type needs to be a bit field Sub-type needs to be for variations on the
|
|
|
|
* method, as in, can it do arbitrary encryption....
|
|
|
|
*/
|
|
|
|
struct evp_pkey_st {
|
|
|
|
int type;
|
|
|
|
int save_type;
|
|
|
|
int references;
|
|
|
|
const EVP_PKEY_ASN1_METHOD *ameth;
|
|
|
|
ENGINE *engine;
|
|
|
|
union {
|
|
|
|
char *ptr;
|
|
|
|
# ifndef OPENSSL_NO_RSA
|
|
|
|
struct rsa_st *rsa; /* RSA */
|
|
|
|
# endif
|
|
|
|
# ifndef OPENSSL_NO_DSA
|
|
|
|
struct dsa_st *dsa; /* DSA */
|
|
|
|
# endif
|
|
|
|
# ifndef OPENSSL_NO_DH
|
|
|
|
struct dh_st *dh; /* DH */
|
|
|
|
# endif
|
|
|
|
# ifndef OPENSSL_NO_EC
|
|
|
|
struct ec_key_st *ec; /* ECC */
|
|
|
|
# endif
|
|
|
|
} pkey;
|
|
|
|
int save_parameters;
|
|
|
|
STACK_OF(X509_ATTRIBUTE) *attributes; /* [ 0 ] */
|
|
|
|
} /* EVP_PKEY */ ;
|
|
|
|
|
|
|
|
# define EVP_PKEY_MO_SIGN 0x0001
|
|
|
|
# define EVP_PKEY_MO_VERIFY 0x0002
|
|
|
|
# define EVP_PKEY_MO_ENCRYPT 0x0004
|
|
|
|
# define EVP_PKEY_MO_DECRYPT 0x0008
|
|
|
|
|
|
|
|
# ifndef EVP_MD
|
|
|
|
struct env_md_st {
|
|
|
|
int type;
|
|
|
|
int pkey_type;
|
|
|
|
int md_size;
|
|
|
|
unsigned long flags;
|
|
|
|
int (*init) (EVP_MD_CTX *ctx);
|
|
|
|
int (*update) (EVP_MD_CTX *ctx, const void *data, size_t count);
|
|
|
|
int (*final) (EVP_MD_CTX *ctx, unsigned char *md);
|
|
|
|
int (*copy) (EVP_MD_CTX *to, const EVP_MD_CTX *from);
|
|
|
|
int (*cleanup) (EVP_MD_CTX *ctx);
|
|
|
|
/* FIXME: prototype these some day */
|
|
|
|
int (*sign) (int type, const unsigned char *m, unsigned int m_length,
|
|
|
|
unsigned char *sigret, unsigned int *siglen, void *key);
|
|
|
|
int (*verify) (int type, const unsigned char *m, unsigned int m_length,
|
|
|
|
const unsigned char *sigbuf, unsigned int siglen,
|
|
|
|
void *key);
|
|
|
|
int required_pkey_type[5]; /* EVP_PKEY_xxx */
|
|
|
|
int block_size;
|
|
|
|
int ctx_size; /* how big does the ctx->md_data need to be */
|
|
|
|
/* control function */
|
|
|
|
int (*md_ctrl) (EVP_MD_CTX *ctx, int cmd, int p1, void *p2);
|
|
|
|
} /* EVP_MD */ ;
|
|
|
|
|
|
|
|
typedef int evp_sign_method(int type, const unsigned char *m,
|
|
|
|
unsigned int m_length, unsigned char *sigret,
|
|
|
|
unsigned int *siglen, void *key);
|
|
|
|
typedef int evp_verify_method(int type, const unsigned char *m,
|
|
|
|
unsigned int m_length,
|
|
|
|
const unsigned char *sigbuf,
|
|
|
|
unsigned int siglen, void *key);
|
2005-03-31 09:26:39 +00:00
|
|
|
|
2015-01-21 11:09:58 +00:00
|
|
|
/* digest can only handle a single block */
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_MD_FLAG_ONESHOT 0x0001
|
2015-01-21 11:09:58 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* digest is a "clone" digest used
|
|
|
|
* which is a copy of an existing
|
|
|
|
* one for a specific public key type.
|
|
|
|
* EVP_dss1() etc
|
|
|
|
*/
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_MD_FLAG_PKEY_DIGEST 0x0002
|
2006-04-19 17:05:59 +00:00
|
|
|
|
|
|
|
/* Digest uses EVP_PKEY_METHOD for signing instead of MD specific signing */
|
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_MD_FLAG_PKEY_METHOD_SIGNATURE 0x0004
|
2006-04-19 17:05:59 +00:00
|
|
|
|
2006-05-22 13:01:01 +00:00
|
|
|
/* DigestAlgorithmIdentifier flags... */
|
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_MD_FLAG_DIGALGID_MASK 0x0018
|
2006-05-22 13:01:01 +00:00
|
|
|
|
|
|
|
/* NULL or absent parameter accepted. Use NULL */
|
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_MD_FLAG_DIGALGID_NULL 0x0000
|
2006-05-22 13:01:01 +00:00
|
|
|
|
|
|
|
/* NULL or absent parameter accepted. Use NULL for PKCS#1 otherwise absent */
|
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_MD_FLAG_DIGALGID_ABSENT 0x0008
|
2006-05-22 13:01:01 +00:00
|
|
|
|
|
|
|
/* Custom handling via ctrl */
|
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_MD_FLAG_DIGALGID_CUSTOM 0x0018
|
2006-05-22 13:01:01 +00:00
|
|
|
|
2015-01-21 11:09:58 +00:00
|
|
|
/* Note if suitable for use in FIPS mode */
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_MD_FLAG_FIPS 0x0400
|
2011-05-28 23:01:26 +00:00
|
|
|
|
2006-05-22 13:01:01 +00:00
|
|
|
/* Digest ctrls */
|
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_MD_CTRL_DIGALGID 0x1
|
|
|
|
# define EVP_MD_CTRL_MICALG 0x2
|
2006-05-22 13:01:01 +00:00
|
|
|
|
|
|
|
/* Minimum Algorithm specific ctrl value */
|
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_MD_CTRL_ALG_CTRL 0x1000
|
2006-05-22 13:01:01 +00:00
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_PKEY_NULL_method NULL,NULL,{0,0,0,0}
|
1998-12-21 10:52:47 +00:00
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
# ifndef OPENSSL_NO_DSA
|
|
|
|
# define EVP_PKEY_DSA_method (evp_sign_method *)DSA_sign, \
|
|
|
|
(evp_verify_method *)DSA_verify, \
|
|
|
|
{EVP_PKEY_DSA,EVP_PKEY_DSA2,EVP_PKEY_DSA3, \
|
|
|
|
EVP_PKEY_DSA4,0}
|
|
|
|
# else
|
|
|
|
# define EVP_PKEY_DSA_method EVP_PKEY_NULL_method
|
|
|
|
# endif
|
1998-12-21 10:52:47 +00:00
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
# ifndef OPENSSL_NO_ECDSA
|
|
|
|
# define EVP_PKEY_ECDSA_method (evp_sign_method *)ECDSA_sign, \
|
|
|
|
(evp_verify_method *)ECDSA_verify, \
|
2002-08-12 08:47:41 +00:00
|
|
|
{EVP_PKEY_EC,0,0,0}
|
2015-01-22 03:29:12 +00:00
|
|
|
# else
|
|
|
|
# define EVP_PKEY_ECDSA_method EVP_PKEY_NULL_method
|
|
|
|
# endif
|
|
|
|
|
|
|
|
# ifndef OPENSSL_NO_RSA
|
|
|
|
# define EVP_PKEY_RSA_method (evp_sign_method *)RSA_sign, \
|
|
|
|
(evp_verify_method *)RSA_verify, \
|
|
|
|
{EVP_PKEY_RSA,EVP_PKEY_RSA2,0,0}
|
|
|
|
# define EVP_PKEY_RSA_ASN1_OCTET_STRING_method \
|
|
|
|
(evp_sign_method *)RSA_sign_ASN1_OCTET_STRING, \
|
|
|
|
(evp_verify_method *)RSA_verify_ASN1_OCTET_STRING, \
|
|
|
|
{EVP_PKEY_RSA,EVP_PKEY_RSA2,0,0}
|
|
|
|
# else
|
|
|
|
# define EVP_PKEY_RSA_method EVP_PKEY_NULL_method
|
|
|
|
# define EVP_PKEY_RSA_ASN1_OCTET_STRING_method EVP_PKEY_NULL_method
|
|
|
|
# endif
|
|
|
|
|
|
|
|
# endif /* !EVP_MD */
|
|
|
|
|
|
|
|
struct env_md_ctx_st {
|
|
|
|
const EVP_MD *digest;
|
|
|
|
ENGINE *engine; /* functional reference if 'digest' is
|
|
|
|
* ENGINE-provided */
|
|
|
|
unsigned long flags;
|
|
|
|
void *md_data;
|
|
|
|
/* Public key context for sign/verify */
|
|
|
|
EVP_PKEY_CTX *pctx;
|
|
|
|
/* Update function: usually copied from EVP_MD */
|
|
|
|
int (*update) (EVP_MD_CTX *ctx, const void *data, size_t count);
|
|
|
|
} /* EVP_MD_CTX */ ;
|
2001-09-02 20:05:27 +00:00
|
|
|
|
|
|
|
/* values for EVP_MD_CTX flags */
|
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_MD_CTX_FLAG_ONESHOT 0x0001/* digest update will be
|
|
|
|
* called once only */
|
|
|
|
# define EVP_MD_CTX_FLAG_CLEANED 0x0002/* context has already been
|
|
|
|
* cleaned */
|
|
|
|
# define EVP_MD_CTX_FLAG_REUSE 0x0004/* Don't free up ctx->md_data
|
|
|
|
* in EVP_MD_CTX_cleanup */
|
|
|
|
/*
|
|
|
|
* FIPS and pad options are ignored in 1.0.0, definitions are here so we
|
|
|
|
* don't accidentally reuse the values for other purposes.
|
2009-05-29 18:58:59 +00:00
|
|
|
*/
|
1998-12-21 10:52:47 +00:00
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_MD_CTX_FLAG_NON_FIPS_ALLOW 0x0008/* Allow use of non FIPS
|
|
|
|
* digest in FIPS mode */
|
2006-05-22 13:01:01 +00:00
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
/*
|
|
|
|
* The following PAD options are also currently ignored in 1.0.0, digest
|
2009-05-29 18:58:59 +00:00
|
|
|
* parameters are handled through EVP_DigestSign*() and EVP_DigestVerify*()
|
|
|
|
* instead.
|
|
|
|
*/
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_MD_CTX_FLAG_PAD_MASK 0xF0/* RSA mode to use */
|
|
|
|
# define EVP_MD_CTX_FLAG_PAD_PKCS1 0x00/* PKCS#1 v1.5 mode */
|
|
|
|
# define EVP_MD_CTX_FLAG_PAD_X931 0x10/* X9.31 mode */
|
|
|
|
# define EVP_MD_CTX_FLAG_PAD_PSS 0x20/* PSS mode */
|
|
|
|
|
|
|
|
# define EVP_MD_CTX_FLAG_NO_INIT 0x0100/* Don't initialize md_data */
|
|
|
|
|
|
|
|
struct evp_cipher_st {
|
|
|
|
int nid;
|
|
|
|
int block_size;
|
|
|
|
/* Default value for variable length ciphers */
|
|
|
|
int key_len;
|
|
|
|
int iv_len;
|
|
|
|
/* Various flags */
|
|
|
|
unsigned long flags;
|
|
|
|
/* init key */
|
|
|
|
int (*init) (EVP_CIPHER_CTX *ctx, const unsigned char *key,
|
|
|
|
const unsigned char *iv, int enc);
|
|
|
|
/* encrypt/decrypt data */
|
|
|
|
int (*do_cipher) (EVP_CIPHER_CTX *ctx, unsigned char *out,
|
|
|
|
const unsigned char *in, size_t inl);
|
|
|
|
/* cleanup ctx */
|
|
|
|
int (*cleanup) (EVP_CIPHER_CTX *);
|
|
|
|
/* how big ctx->cipher_data needs to be */
|
|
|
|
int ctx_size;
|
|
|
|
/* Populate a ASN1_TYPE with parameters */
|
|
|
|
int (*set_asn1_parameters) (EVP_CIPHER_CTX *, ASN1_TYPE *);
|
|
|
|
/* Get parameters from a ASN1_TYPE */
|
|
|
|
int (*get_asn1_parameters) (EVP_CIPHER_CTX *, ASN1_TYPE *);
|
|
|
|
/* Miscellaneous operations */
|
|
|
|
int (*ctrl) (EVP_CIPHER_CTX *, int type, int arg, void *ptr);
|
|
|
|
/* Application data */
|
|
|
|
void *app_data;
|
|
|
|
} /* EVP_CIPHER */ ;
|
2000-05-26 23:51:35 +00:00
|
|
|
|
|
|
|
/* Values for cipher flags */
|
|
|
|
|
2000-05-28 12:44:46 +00:00
|
|
|
/* Modes for ciphers */
|
2000-05-26 23:51:35 +00:00
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_CIPH_STREAM_CIPHER 0x0
|
|
|
|
# define EVP_CIPH_ECB_MODE 0x1
|
|
|
|
# define EVP_CIPH_CBC_MODE 0x2
|
|
|
|
# define EVP_CIPH_CFB_MODE 0x3
|
|
|
|
# define EVP_CIPH_OFB_MODE 0x4
|
|
|
|
# define EVP_CIPH_CTR_MODE 0x5
|
|
|
|
# define EVP_CIPH_GCM_MODE 0x6
|
|
|
|
# define EVP_CIPH_CCM_MODE 0x7
|
|
|
|
# define EVP_CIPH_XTS_MODE 0x10001
|
|
|
|
# define EVP_CIPH_WRAP_MODE 0x10002
|
|
|
|
# define EVP_CIPH_MODE 0xF0007
|
2000-05-26 23:51:35 +00:00
|
|
|
/* Set if variable length cipher */
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_CIPH_VARIABLE_LENGTH 0x8
|
2000-05-28 12:44:46 +00:00
|
|
|
/* Set if the iv handling should be done by the cipher itself */
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_CIPH_CUSTOM_IV 0x10
|
2000-05-28 12:44:46 +00:00
|
|
|
/* Set if the cipher's init() function should be called if key is NULL */
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_CIPH_ALWAYS_CALL_INIT 0x20
|
2000-05-30 02:10:57 +00:00
|
|
|
/* Call ctrl() to init cipher parameters */
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_CIPH_CTRL_INIT 0x40
|
2000-05-30 02:10:57 +00:00
|
|
|
/* Don't use standard key length function */
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_CIPH_CUSTOM_KEY_LENGTH 0x80
|
2001-02-14 02:11:52 +00:00
|
|
|
/* Don't use standard block padding */
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_CIPH_NO_PADDING 0x100
|
2004-03-28 17:38:00 +00:00
|
|
|
/* cipher handles random key generation */
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_CIPH_RAND_KEY 0x200
|
2010-02-07 13:41:23 +00:00
|
|
|
/* cipher has its own additional copying logic */
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_CIPH_CUSTOM_COPY 0x400
|
2010-02-15 19:17:55 +00:00
|
|
|
/* Allow use default ASN1 get/set iv */
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_CIPH_FLAG_DEFAULT_ASN1 0x1000
|
2010-02-15 19:17:55 +00:00
|
|
|
/* Buffer length in bits not bytes: CFB1 mode only */
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_CIPH_FLAG_LENGTH_BITS 0x2000
|
2011-05-28 23:01:26 +00:00
|
|
|
/* Note if suitable for use in FIPS mode */
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_CIPH_FLAG_FIPS 0x4000
|
2011-05-28 23:01:26 +00:00
|
|
|
/* Allow non FIPS cipher in FIPS mode */
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_CIPH_FLAG_NON_FIPS_ALLOW 0x8000
|
|
|
|
/*
|
|
|
|
* Cipher handles any and all padding logic as well as finalisation.
|
2011-05-28 23:01:26 +00:00
|
|
|
*/
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_CIPH_FLAG_CUSTOM_CIPHER 0x100000
|
|
|
|
# define EVP_CIPH_FLAG_AEAD_CIPHER 0x200000
|
|
|
|
# define EVP_CIPH_FLAG_TLS1_1_MULTIBLOCK 0x400000
|
2000-05-26 23:51:35 +00:00
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
/*
|
|
|
|
* Cipher context flag to indicate we can handle wrap mode: if allowed in
|
|
|
|
* older applications it could overflow buffers.
|
2013-07-17 13:05:19 +00:00
|
|
|
*/
|
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_CIPHER_CTX_FLAG_WRAP_ALLOW 0x1
|
2013-07-17 13:05:19 +00:00
|
|
|
|
2000-05-30 02:10:57 +00:00
|
|
|
/* ctrl() values */
|
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_CTRL_INIT 0x0
|
|
|
|
# define EVP_CTRL_SET_KEY_LENGTH 0x1
|
|
|
|
# define EVP_CTRL_GET_RC2_KEY_BITS 0x2
|
|
|
|
# define EVP_CTRL_SET_RC2_KEY_BITS 0x3
|
|
|
|
# define EVP_CTRL_GET_RC5_ROUNDS 0x4
|
|
|
|
# define EVP_CTRL_SET_RC5_ROUNDS 0x5
|
|
|
|
# define EVP_CTRL_RAND_KEY 0x6
|
|
|
|
# define EVP_CTRL_PBE_PRF_NID 0x7
|
|
|
|
# define EVP_CTRL_COPY 0x8
|
|
|
|
# define EVP_CTRL_GCM_SET_IVLEN 0x9
|
|
|
|
# define EVP_CTRL_GCM_GET_TAG 0x10
|
|
|
|
# define EVP_CTRL_GCM_SET_TAG 0x11
|
|
|
|
# define EVP_CTRL_GCM_SET_IV_FIXED 0x12
|
|
|
|
# define EVP_CTRL_GCM_IV_GEN 0x13
|
|
|
|
# define EVP_CTRL_CCM_SET_IVLEN EVP_CTRL_GCM_SET_IVLEN
|
|
|
|
# define EVP_CTRL_CCM_GET_TAG EVP_CTRL_GCM_GET_TAG
|
|
|
|
# define EVP_CTRL_CCM_SET_TAG EVP_CTRL_GCM_SET_TAG
|
|
|
|
# define EVP_CTRL_CCM_SET_L 0x14
|
|
|
|
# define EVP_CTRL_CCM_SET_MSGLEN 0x15
|
|
|
|
/*
|
|
|
|
* AEAD cipher deduces payload length and returns number of bytes required to
|
|
|
|
* store MAC and eventual padding. Subsequent call to EVP_Cipher even
|
|
|
|
* appends/verifies MAC.
|
2011-07-21 19:22:57 +00:00
|
|
|
*/
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_CTRL_AEAD_TLS1_AAD 0x16
|
2011-07-21 19:22:57 +00:00
|
|
|
/* Used by composite AEAD ciphers, no-op in GCM, CCM... */
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_CTRL_AEAD_SET_MAC_KEY 0x17
|
2011-08-04 11:12:38 +00:00
|
|
|
/* Set the GCM invocation field, decrypt only */
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_CTRL_GCM_SET_IV_INV 0x18
|
2011-08-04 11:12:38 +00:00
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_CTRL_TLS1_1_MULTIBLOCK_AAD 0x19
|
|
|
|
# define EVP_CTRL_TLS1_1_MULTIBLOCK_ENCRYPT 0x1a
|
|
|
|
# define EVP_CTRL_TLS1_1_MULTIBLOCK_DECRYPT 0x1b
|
|
|
|
# define EVP_CTRL_TLS1_1_MULTIBLOCK_MAX_BUFSIZE 0x1c
|
2014-02-05 18:52:38 +00:00
|
|
|
|
2015-04-27 10:07:06 +00:00
|
|
|
/* RFC 5246 defines additional data to be 13 bytes in length */
|
|
|
|
# define EVP_AEAD_TLS1_AAD_LEN 13
|
|
|
|
|
2014-02-05 18:52:38 +00:00
|
|
|
typedef struct {
|
2015-01-22 03:29:12 +00:00
|
|
|
unsigned char *out;
|
|
|
|
const unsigned char *inp;
|
|
|
|
size_t len;
|
|
|
|
unsigned int interleave;
|
2014-02-05 18:52:38 +00:00
|
|
|
} EVP_CTRL_TLS1_1_MULTIBLOCK_PARAM;
|
|
|
|
|
2011-08-04 11:12:38 +00:00
|
|
|
/* GCM TLS constants */
|
|
|
|
/* Length of fixed part of IV derived from PRF */
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_GCM_TLS_FIXED_IV_LEN 4
|
2011-08-04 11:12:38 +00:00
|
|
|
/* Length of explicit part of IV part of TLS records */
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_GCM_TLS_EXPLICIT_IV_LEN 8
|
2011-08-04 11:12:38 +00:00
|
|
|
/* Length of tag for TLS */
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_GCM_TLS_TAG_LEN 16
|
|
|
|
|
|
|
|
typedef struct evp_cipher_info_st {
|
|
|
|
const EVP_CIPHER *cipher;
|
|
|
|
unsigned char iv[EVP_MAX_IV_LENGTH];
|
|
|
|
} EVP_CIPHER_INFO;
|
|
|
|
|
|
|
|
struct evp_cipher_ctx_st {
|
|
|
|
const EVP_CIPHER *cipher;
|
|
|
|
ENGINE *engine; /* functional reference if 'cipher' is
|
|
|
|
* ENGINE-provided */
|
|
|
|
int encrypt; /* encrypt or decrypt */
|
|
|
|
int buf_len; /* number we have left */
|
|
|
|
unsigned char oiv[EVP_MAX_IV_LENGTH]; /* original iv */
|
|
|
|
unsigned char iv[EVP_MAX_IV_LENGTH]; /* working iv */
|
|
|
|
unsigned char buf[EVP_MAX_BLOCK_LENGTH]; /* saved partial block */
|
|
|
|
int num; /* used by cfb/ofb/ctr mode */
|
|
|
|
void *app_data; /* application stuff */
|
|
|
|
int key_len; /* May change for variable length cipher */
|
|
|
|
unsigned long flags; /* Various flags */
|
|
|
|
void *cipher_data; /* per EVP data */
|
|
|
|
int final_used;
|
|
|
|
int block_mask;
|
|
|
|
unsigned char final[EVP_MAX_BLOCK_LENGTH]; /* possible final block */
|
|
|
|
} /* EVP_CIPHER_CTX */ ;
|
|
|
|
|
|
|
|
typedef struct evp_Encode_Ctx_st {
|
|
|
|
/* number saved in a partial encode/decode */
|
|
|
|
int num;
|
|
|
|
/*
|
|
|
|
* The length is either the output line length (in input bytes) or the
|
|
|
|
* shortest input line length that is ok. Once decoding begins, the
|
|
|
|
* length is adjusted up each time a longer line is decoded
|
|
|
|
*/
|
|
|
|
int length;
|
|
|
|
/* data to encode */
|
|
|
|
unsigned char enc_data[80];
|
|
|
|
/* number read on current line */
|
|
|
|
int line_num;
|
|
|
|
int expect_nl;
|
|
|
|
} EVP_ENCODE_CTX;
|
1998-12-21 10:52:47 +00:00
|
|
|
|
1999-03-28 17:46:10 +00:00
|
|
|
/* Password based encryption function */
|
2015-01-22 03:29:12 +00:00
|
|
|
typedef int (EVP_PBE_KEYGEN) (EVP_CIPHER_CTX *ctx, const char *pass,
|
|
|
|
int passlen, ASN1_TYPE *param,
|
|
|
|
const EVP_CIPHER *cipher, const EVP_MD *md,
|
|
|
|
int en_de);
|
|
|
|
|
|
|
|
# ifndef OPENSSL_NO_RSA
|
|
|
|
# define EVP_PKEY_assign_RSA(pkey,rsa) EVP_PKEY_assign((pkey),EVP_PKEY_RSA,\
|
|
|
|
(char *)(rsa))
|
|
|
|
# endif
|
2000-09-25 08:49:13 +00:00
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
# ifndef OPENSSL_NO_DSA
|
|
|
|
# define EVP_PKEY_assign_DSA(pkey,dsa) EVP_PKEY_assign((pkey),EVP_PKEY_DSA,\
|
|
|
|
(char *)(dsa))
|
|
|
|
# endif
|
2000-09-25 08:49:13 +00:00
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
# ifndef OPENSSL_NO_DH
|
|
|
|
# define EVP_PKEY_assign_DH(pkey,dh) EVP_PKEY_assign((pkey),EVP_PKEY_DH,\
|
|
|
|
(char *)(dh))
|
|
|
|
# endif
|
1998-12-21 10:52:47 +00:00
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
# ifndef OPENSSL_NO_EC
|
|
|
|
# define EVP_PKEY_assign_EC_KEY(pkey,eckey) EVP_PKEY_assign((pkey),EVP_PKEY_EC,\
|
2002-08-07 10:49:54 +00:00
|
|
|
(char *)(eckey))
|
2015-01-22 03:29:12 +00:00
|
|
|
# endif
|
2002-02-13 18:21:51 +00:00
|
|
|
|
1998-12-21 10:52:47 +00:00
|
|
|
/* Add some extra combinations */
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_get_digestbynid(a) EVP_get_digestbyname(OBJ_nid2sn(a))
|
|
|
|
# define EVP_get_digestbyobj(a) EVP_get_digestbynid(OBJ_obj2nid(a))
|
|
|
|
# define EVP_get_cipherbynid(a) EVP_get_cipherbyname(OBJ_nid2sn(a))
|
|
|
|
# define EVP_get_cipherbyobj(a) EVP_get_cipherbynid(OBJ_obj2nid(a))
|
1998-12-21 10:52:47 +00:00
|
|
|
|
2006-11-29 20:54:57 +00:00
|
|
|
int EVP_MD_type(const EVP_MD *md);
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_MD_nid(e) EVP_MD_type(e)
|
|
|
|
# define EVP_MD_name(e) OBJ_nid2sn(EVP_MD_nid(e))
|
|
|
|
int EVP_MD_pkey_type(const EVP_MD *md);
|
2008-11-12 03:58:08 +00:00
|
|
|
int EVP_MD_size(const EVP_MD *md);
|
|
|
|
int EVP_MD_block_size(const EVP_MD *md);
|
2009-04-10 10:30:27 +00:00
|
|
|
unsigned long EVP_MD_flags(const EVP_MD *md);
|
1998-12-21 10:56:39 +00:00
|
|
|
|
2006-11-29 20:54:57 +00:00
|
|
|
const EVP_MD *EVP_MD_CTX_md(const EVP_MD_CTX *ctx);
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_MD_CTX_size(e) EVP_MD_size(EVP_MD_CTX_md(e))
|
|
|
|
# define EVP_MD_CTX_block_size(e) EVP_MD_block_size(EVP_MD_CTX_md(e))
|
|
|
|
# define EVP_MD_CTX_type(e) EVP_MD_type(EVP_MD_CTX_md(e))
|
1998-12-21 10:52:47 +00:00
|
|
|
|
2006-11-29 20:54:57 +00:00
|
|
|
int EVP_CIPHER_nid(const EVP_CIPHER *cipher);
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_CIPHER_name(e) OBJ_nid2sn(EVP_CIPHER_nid(e))
|
2008-11-12 03:58:08 +00:00
|
|
|
int EVP_CIPHER_block_size(const EVP_CIPHER *cipher);
|
|
|
|
int EVP_CIPHER_key_length(const EVP_CIPHER *cipher);
|
|
|
|
int EVP_CIPHER_iv_length(const EVP_CIPHER *cipher);
|
2006-11-29 20:54:57 +00:00
|
|
|
unsigned long EVP_CIPHER_flags(const EVP_CIPHER *cipher);
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_CIPHER_mode(e) (EVP_CIPHER_flags(e) & EVP_CIPH_MODE)
|
2006-11-29 20:54:57 +00:00
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
const EVP_CIPHER *EVP_CIPHER_CTX_cipher(const EVP_CIPHER_CTX *ctx);
|
2006-11-29 20:54:57 +00:00
|
|
|
int EVP_CIPHER_CTX_nid(const EVP_CIPHER_CTX *ctx);
|
2008-11-12 03:58:08 +00:00
|
|
|
int EVP_CIPHER_CTX_block_size(const EVP_CIPHER_CTX *ctx);
|
|
|
|
int EVP_CIPHER_CTX_key_length(const EVP_CIPHER_CTX *ctx);
|
|
|
|
int EVP_CIPHER_CTX_iv_length(const EVP_CIPHER_CTX *ctx);
|
2010-02-07 13:41:23 +00:00
|
|
|
int EVP_CIPHER_CTX_copy(EVP_CIPHER_CTX *out, const EVP_CIPHER_CTX *in);
|
2015-01-22 03:29:12 +00:00
|
|
|
void *EVP_CIPHER_CTX_get_app_data(const EVP_CIPHER_CTX *ctx);
|
2006-11-29 20:54:57 +00:00
|
|
|
void EVP_CIPHER_CTX_set_app_data(EVP_CIPHER_CTX *ctx, void *data);
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_CIPHER_CTX_type(c) EVP_CIPHER_type(EVP_CIPHER_CTX_cipher(c))
|
2006-11-29 20:54:57 +00:00
|
|
|
unsigned long EVP_CIPHER_CTX_flags(const EVP_CIPHER_CTX *ctx);
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_CIPHER_CTX_mode(e) (EVP_CIPHER_CTX_flags(e) & EVP_CIPH_MODE)
|
|
|
|
|
|
|
|
# define EVP_ENCODE_LENGTH(l) (((l+2)/3*4)+(l/48+1)*2+80)
|
|
|
|
# define EVP_DECODE_LENGTH(l) ((l+3)/4*3+80)
|
|
|
|
|
|
|
|
# define EVP_SignInit_ex(a,b,c) EVP_DigestInit_ex(a,b,c)
|
|
|
|
# define EVP_SignInit(a,b) EVP_DigestInit(a,b)
|
|
|
|
# define EVP_SignUpdate(a,b,c) EVP_DigestUpdate(a,b,c)
|
|
|
|
# define EVP_VerifyInit_ex(a,b,c) EVP_DigestInit_ex(a,b,c)
|
|
|
|
# define EVP_VerifyInit(a,b) EVP_DigestInit(a,b)
|
|
|
|
# define EVP_VerifyUpdate(a,b,c) EVP_DigestUpdate(a,b,c)
|
|
|
|
# define EVP_OpenUpdate(a,b,c,d,e) EVP_DecryptUpdate(a,b,c,d,e)
|
|
|
|
# define EVP_SealUpdate(a,b,c,d,e) EVP_EncryptUpdate(a,b,c,d,e)
|
|
|
|
# define EVP_DigestSignUpdate(a,b,c) EVP_DigestUpdate(a,b,c)
|
|
|
|
# define EVP_DigestVerifyUpdate(a,b,c) EVP_DigestUpdate(a,b,c)
|
|
|
|
|
|
|
|
# ifdef CONST_STRICT
|
|
|
|
void BIO_set_md(BIO *, const EVP_MD *md);
|
|
|
|
# else
|
|
|
|
# define BIO_set_md(b,md) BIO_ctrl(b,BIO_C_SET_MD,0,(char *)md)
|
|
|
|
# endif
|
|
|
|
# define BIO_get_md(b,mdp) BIO_ctrl(b,BIO_C_GET_MD,0,(char *)mdp)
|
|
|
|
# define BIO_get_md_ctx(b,mdcp) BIO_ctrl(b,BIO_C_GET_MD_CTX,0,(char *)mdcp)
|
|
|
|
# define BIO_set_md_ctx(b,mdcp) BIO_ctrl(b,BIO_C_SET_MD_CTX,0,(char *)mdcp)
|
|
|
|
# define BIO_get_cipher_status(b) BIO_ctrl(b,BIO_C_GET_CIPHER_STATUS,0,NULL)
|
|
|
|
# define BIO_get_cipher_ctx(b,c_pp) BIO_ctrl(b,BIO_C_GET_CIPHER_CTX,0,(char *)c_pp)
|
1998-12-21 10:52:47 +00:00
|
|
|
|
2008-11-12 03:58:08 +00:00
|
|
|
int EVP_Cipher(EVP_CIPHER_CTX *c,
|
2015-01-22 03:29:12 +00:00
|
|
|
unsigned char *out, const unsigned char *in, unsigned int inl);
|
|
|
|
|
|
|
|
# define EVP_add_cipher_alias(n,alias) \
|
|
|
|
OBJ_NAME_add((alias),OBJ_NAME_TYPE_CIPHER_METH|OBJ_NAME_ALIAS,(n))
|
|
|
|
# define EVP_add_digest_alias(n,alias) \
|
|
|
|
OBJ_NAME_add((alias),OBJ_NAME_TYPE_MD_METH|OBJ_NAME_ALIAS,(n))
|
|
|
|
# define EVP_delete_cipher_alias(alias) \
|
|
|
|
OBJ_NAME_remove(alias,OBJ_NAME_TYPE_CIPHER_METH|OBJ_NAME_ALIAS);
|
|
|
|
# define EVP_delete_digest_alias(alias) \
|
|
|
|
OBJ_NAME_remove(alias,OBJ_NAME_TYPE_MD_METH|OBJ_NAME_ALIAS);
|
|
|
|
|
|
|
|
void EVP_MD_CTX_init(EVP_MD_CTX *ctx);
|
|
|
|
int EVP_MD_CTX_cleanup(EVP_MD_CTX *ctx);
|
2001-07-30 23:57:25 +00:00
|
|
|
EVP_MD_CTX *EVP_MD_CTX_create(void);
|
2015-01-22 03:29:12 +00:00
|
|
|
void EVP_MD_CTX_destroy(EVP_MD_CTX *ctx);
|
|
|
|
int EVP_MD_CTX_copy_ex(EVP_MD_CTX *out, const EVP_MD_CTX *in);
|
|
|
|
void EVP_MD_CTX_set_flags(EVP_MD_CTX *ctx, int flags);
|
|
|
|
void EVP_MD_CTX_clear_flags(EVP_MD_CTX *ctx, int flags);
|
|
|
|
int EVP_MD_CTX_test_flags(const EVP_MD_CTX *ctx, int flags);
|
|
|
|
int EVP_DigestInit_ex(EVP_MD_CTX *ctx, const EVP_MD *type, ENGINE *impl);
|
|
|
|
int EVP_DigestUpdate(EVP_MD_CTX *ctx, const void *d, size_t cnt);
|
|
|
|
int EVP_DigestFinal_ex(EVP_MD_CTX *ctx, unsigned char *md, unsigned int *s);
|
|
|
|
int EVP_Digest(const void *data, size_t count,
|
|
|
|
unsigned char *md, unsigned int *size, const EVP_MD *type,
|
|
|
|
ENGINE *impl);
|
|
|
|
|
|
|
|
int EVP_MD_CTX_copy(EVP_MD_CTX *out, const EVP_MD_CTX *in);
|
|
|
|
int EVP_DigestInit(EVP_MD_CTX *ctx, const EVP_MD *type);
|
|
|
|
int EVP_DigestFinal(EVP_MD_CTX *ctx, unsigned char *md, unsigned int *s);
|
|
|
|
|
|
|
|
int EVP_read_pw_string(char *buf, int length, const char *prompt, int verify);
|
|
|
|
int EVP_read_pw_string_min(char *buf, int minlen, int maxlen,
|
|
|
|
const char *prompt, int verify);
|
|
|
|
void EVP_set_pw_prompt(const char *prompt);
|
|
|
|
char *EVP_get_pw_prompt(void);
|
|
|
|
|
|
|
|
int EVP_BytesToKey(const EVP_CIPHER *type, const EVP_MD *md,
|
|
|
|
const unsigned char *salt, const unsigned char *data,
|
|
|
|
int datal, int count, unsigned char *key,
|
|
|
|
unsigned char *iv);
|
|
|
|
|
|
|
|
void EVP_CIPHER_CTX_set_flags(EVP_CIPHER_CTX *ctx, int flags);
|
|
|
|
void EVP_CIPHER_CTX_clear_flags(EVP_CIPHER_CTX *ctx, int flags);
|
|
|
|
int EVP_CIPHER_CTX_test_flags(const EVP_CIPHER_CTX *ctx, int flags);
|
|
|
|
|
|
|
|
int EVP_EncryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher,
|
|
|
|
const unsigned char *key, const unsigned char *iv);
|
|
|
|
int EVP_EncryptInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher,
|
|
|
|
ENGINE *impl, const unsigned char *key,
|
|
|
|
const unsigned char *iv);
|
|
|
|
int EVP_EncryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl,
|
|
|
|
const unsigned char *in, int inl);
|
|
|
|
int EVP_EncryptFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl);
|
|
|
|
int EVP_EncryptFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl);
|
|
|
|
|
|
|
|
int EVP_DecryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher,
|
|
|
|
const unsigned char *key, const unsigned char *iv);
|
|
|
|
int EVP_DecryptInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher,
|
|
|
|
ENGINE *impl, const unsigned char *key,
|
|
|
|
const unsigned char *iv);
|
|
|
|
int EVP_DecryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl,
|
|
|
|
const unsigned char *in, int inl);
|
|
|
|
int EVP_DecryptFinal(EVP_CIPHER_CTX *ctx, unsigned char *outm, int *outl);
|
|
|
|
int EVP_DecryptFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *outm, int *outl);
|
|
|
|
|
|
|
|
int EVP_CipherInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher,
|
|
|
|
const unsigned char *key, const unsigned char *iv,
|
|
|
|
int enc);
|
|
|
|
int EVP_CipherInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher,
|
|
|
|
ENGINE *impl, const unsigned char *key,
|
|
|
|
const unsigned char *iv, int enc);
|
|
|
|
int EVP_CipherUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl,
|
|
|
|
const unsigned char *in, int inl);
|
|
|
|
int EVP_CipherFinal(EVP_CIPHER_CTX *ctx, unsigned char *outm, int *outl);
|
|
|
|
int EVP_CipherFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *outm, int *outl);
|
|
|
|
|
|
|
|
int EVP_SignFinal(EVP_MD_CTX *ctx, unsigned char *md, unsigned int *s,
|
|
|
|
EVP_PKEY *pkey);
|
|
|
|
|
|
|
|
int EVP_VerifyFinal(EVP_MD_CTX *ctx, const unsigned char *sigbuf,
|
|
|
|
unsigned int siglen, EVP_PKEY *pkey);
|
|
|
|
|
|
|
|
int EVP_DigestSignInit(EVP_MD_CTX *ctx, EVP_PKEY_CTX **pctx,
|
|
|
|
const EVP_MD *type, ENGINE *e, EVP_PKEY *pkey);
|
|
|
|
int EVP_DigestSignFinal(EVP_MD_CTX *ctx,
|
|
|
|
unsigned char *sigret, size_t *siglen);
|
|
|
|
|
|
|
|
int EVP_DigestVerifyInit(EVP_MD_CTX *ctx, EVP_PKEY_CTX **pctx,
|
|
|
|
const EVP_MD *type, ENGINE *e, EVP_PKEY *pkey);
|
|
|
|
int EVP_DigestVerifyFinal(EVP_MD_CTX *ctx,
|
|
|
|
const unsigned char *sig, size_t siglen);
|
|
|
|
|
|
|
|
int EVP_OpenInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *type,
|
|
|
|
const unsigned char *ek, int ekl, const unsigned char *iv,
|
|
|
|
EVP_PKEY *priv);
|
|
|
|
int EVP_OpenFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl);
|
|
|
|
|
|
|
|
int EVP_SealInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *type,
|
|
|
|
unsigned char **ek, int *ekl, unsigned char *iv,
|
|
|
|
EVP_PKEY **pubk, int npubk);
|
|
|
|
int EVP_SealFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl);
|
|
|
|
|
|
|
|
void EVP_EncodeInit(EVP_ENCODE_CTX *ctx);
|
|
|
|
void EVP_EncodeUpdate(EVP_ENCODE_CTX *ctx, unsigned char *out, int *outl,
|
|
|
|
const unsigned char *in, int inl);
|
|
|
|
void EVP_EncodeFinal(EVP_ENCODE_CTX *ctx, unsigned char *out, int *outl);
|
|
|
|
int EVP_EncodeBlock(unsigned char *t, const unsigned char *f, int n);
|
|
|
|
|
|
|
|
void EVP_DecodeInit(EVP_ENCODE_CTX *ctx);
|
|
|
|
int EVP_DecodeUpdate(EVP_ENCODE_CTX *ctx, unsigned char *out, int *outl,
|
|
|
|
const unsigned char *in, int inl);
|
|
|
|
int EVP_DecodeFinal(EVP_ENCODE_CTX *ctx, unsigned
|
|
|
|
char *out, int *outl);
|
|
|
|
int EVP_DecodeBlock(unsigned char *t, const unsigned char *f, int n);
|
1998-12-21 10:52:47 +00:00
|
|
|
|
1998-12-21 10:56:39 +00:00
|
|
|
void EVP_CIPHER_CTX_init(EVP_CIPHER_CTX *a);
|
2000-05-27 12:38:43 +00:00
|
|
|
int EVP_CIPHER_CTX_cleanup(EVP_CIPHER_CTX *a);
|
2005-12-02 13:46:39 +00:00
|
|
|
EVP_CIPHER_CTX *EVP_CIPHER_CTX_new(void);
|
|
|
|
void EVP_CIPHER_CTX_free(EVP_CIPHER_CTX *a);
|
2008-11-12 03:58:08 +00:00
|
|
|
int EVP_CIPHER_CTX_set_key_length(EVP_CIPHER_CTX *x, int keylen);
|
2001-02-14 02:11:52 +00:00
|
|
|
int EVP_CIPHER_CTX_set_padding(EVP_CIPHER_CTX *c, int pad);
|
2000-05-30 18:26:22 +00:00
|
|
|
int EVP_CIPHER_CTX_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr);
|
2004-03-28 17:38:00 +00:00
|
|
|
int EVP_CIPHER_CTX_rand_key(EVP_CIPHER_CTX *ctx, unsigned char *key);
|
1998-12-21 10:52:47 +00:00
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
# ifndef OPENSSL_NO_BIO
|
1998-12-21 10:52:47 +00:00
|
|
|
BIO_METHOD *BIO_f_md(void);
|
|
|
|
BIO_METHOD *BIO_f_base64(void);
|
|
|
|
BIO_METHOD *BIO_f_cipher(void);
|
1999-02-23 21:44:34 +00:00
|
|
|
BIO_METHOD *BIO_f_reliable(void);
|
2015-01-22 03:29:12 +00:00
|
|
|
void BIO_set_cipher(BIO *b, const EVP_CIPHER *c, const unsigned char *k,
|
|
|
|
const unsigned char *i, int enc);
|
|
|
|
# endif
|
1998-12-21 10:52:47 +00:00
|
|
|
|
2001-03-09 02:51:02 +00:00
|
|
|
const EVP_MD *EVP_md_null(void);
|
2015-01-22 03:29:12 +00:00
|
|
|
# ifndef OPENSSL_NO_MD2
|
2001-03-09 02:51:02 +00:00
|
|
|
const EVP_MD *EVP_md2(void);
|
2015-01-22 03:29:12 +00:00
|
|
|
# endif
|
|
|
|
# ifndef OPENSSL_NO_MD4
|
2001-03-09 02:51:02 +00:00
|
|
|
const EVP_MD *EVP_md4(void);
|
2015-01-22 03:29:12 +00:00
|
|
|
# endif
|
|
|
|
# ifndef OPENSSL_NO_MD5
|
2001-03-09 02:51:02 +00:00
|
|
|
const EVP_MD *EVP_md5(void);
|
2015-01-22 03:29:12 +00:00
|
|
|
# endif
|
|
|
|
# ifndef OPENSSL_NO_SHA
|
2001-03-09 02:51:02 +00:00
|
|
|
const EVP_MD *EVP_sha(void);
|
|
|
|
const EVP_MD *EVP_sha1(void);
|
|
|
|
const EVP_MD *EVP_dss(void);
|
|
|
|
const EVP_MD *EVP_dss1(void);
|
2002-02-13 18:21:51 +00:00
|
|
|
const EVP_MD *EVP_ecdsa(void);
|
2015-01-22 03:29:12 +00:00
|
|
|
# endif
|
|
|
|
# ifndef OPENSSL_NO_SHA256
|
2004-05-31 13:14:08 +00:00
|
|
|
const EVP_MD *EVP_sha224(void);
|
|
|
|
const EVP_MD *EVP_sha256(void);
|
2015-01-22 03:29:12 +00:00
|
|
|
# endif
|
|
|
|
# ifndef OPENSSL_NO_SHA512
|
2004-05-31 13:14:08 +00:00
|
|
|
const EVP_MD *EVP_sha384(void);
|
|
|
|
const EVP_MD *EVP_sha512(void);
|
2015-01-22 03:29:12 +00:00
|
|
|
# endif
|
|
|
|
# ifndef OPENSSL_NO_MDC2
|
2001-03-09 02:51:02 +00:00
|
|
|
const EVP_MD *EVP_mdc2(void);
|
2015-01-22 03:29:12 +00:00
|
|
|
# endif
|
|
|
|
# ifndef OPENSSL_NO_RIPEMD
|
2001-03-09 02:51:02 +00:00
|
|
|
const EVP_MD *EVP_ripemd160(void);
|
2015-01-22 03:29:12 +00:00
|
|
|
# endif
|
|
|
|
# ifndef OPENSSL_NO_WHIRLPOOL
|
2005-12-02 13:25:52 +00:00
|
|
|
const EVP_MD *EVP_whirlpool(void);
|
2015-01-22 03:29:12 +00:00
|
|
|
# endif
|
|
|
|
const EVP_CIPHER *EVP_enc_null(void); /* does nothing :-) */
|
|
|
|
# ifndef OPENSSL_NO_DES
|
2001-03-09 02:51:02 +00:00
|
|
|
const EVP_CIPHER *EVP_des_ecb(void);
|
|
|
|
const EVP_CIPHER *EVP_des_ede(void);
|
|
|
|
const EVP_CIPHER *EVP_des_ede3(void);
|
2002-06-14 19:01:52 +00:00
|
|
|
const EVP_CIPHER *EVP_des_ede_ecb(void);
|
|
|
|
const EVP_CIPHER *EVP_des_ede3_ecb(void);
|
2004-01-28 19:05:35 +00:00
|
|
|
const EVP_CIPHER *EVP_des_cfb64(void);
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_des_cfb EVP_des_cfb64
|
2004-01-28 19:05:35 +00:00
|
|
|
const EVP_CIPHER *EVP_des_cfb1(void);
|
|
|
|
const EVP_CIPHER *EVP_des_cfb8(void);
|
|
|
|
const EVP_CIPHER *EVP_des_ede_cfb64(void);
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_des_ede_cfb EVP_des_ede_cfb64
|
|
|
|
# if 0
|
2004-01-28 19:05:35 +00:00
|
|
|
const EVP_CIPHER *EVP_des_ede_cfb1(void);
|
|
|
|
const EVP_CIPHER *EVP_des_ede_cfb8(void);
|
2015-01-22 03:29:12 +00:00
|
|
|
# endif
|
2004-01-28 19:05:35 +00:00
|
|
|
const EVP_CIPHER *EVP_des_ede3_cfb64(void);
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_des_ede3_cfb EVP_des_ede3_cfb64
|
2004-01-28 19:05:35 +00:00
|
|
|
const EVP_CIPHER *EVP_des_ede3_cfb1(void);
|
|
|
|
const EVP_CIPHER *EVP_des_ede3_cfb8(void);
|
2001-03-09 02:51:02 +00:00
|
|
|
const EVP_CIPHER *EVP_des_ofb(void);
|
|
|
|
const EVP_CIPHER *EVP_des_ede_ofb(void);
|
|
|
|
const EVP_CIPHER *EVP_des_ede3_ofb(void);
|
|
|
|
const EVP_CIPHER *EVP_des_cbc(void);
|
|
|
|
const EVP_CIPHER *EVP_des_ede_cbc(void);
|
|
|
|
const EVP_CIPHER *EVP_des_ede3_cbc(void);
|
|
|
|
const EVP_CIPHER *EVP_desx_cbc(void);
|
2013-07-17 13:05:19 +00:00
|
|
|
const EVP_CIPHER *EVP_des_ede3_wrap(void);
|
2015-01-22 03:29:12 +00:00
|
|
|
/*
|
|
|
|
* This should now be supported through the dev_crypto ENGINE. But also, why
|
|
|
|
* are rc4 and md5 declarations made here inside a "NO_DES" precompiler
|
|
|
|
* branch?
|
|
|
|
*/
|
|
|
|
# if 0
|
|
|
|
# ifdef OPENSSL_OPENBSD_DEV_CRYPTO
|
2001-07-21 10:24:07 +00:00
|
|
|
const EVP_CIPHER *EVP_dev_crypto_des_ede3_cbc(void);
|
2001-08-18 16:04:36 +00:00
|
|
|
const EVP_CIPHER *EVP_dev_crypto_rc4(void);
|
2001-08-26 17:09:31 +00:00
|
|
|
const EVP_MD *EVP_dev_crypto_md5(void);
|
2015-01-22 03:29:12 +00:00
|
|
|
# endif
|
|
|
|
# endif
|
2001-07-21 10:24:07 +00:00
|
|
|
# endif
|
2015-01-22 03:29:12 +00:00
|
|
|
# ifndef OPENSSL_NO_RC4
|
2001-03-09 02:51:02 +00:00
|
|
|
const EVP_CIPHER *EVP_rc4(void);
|
|
|
|
const EVP_CIPHER *EVP_rc4_40(void);
|
2015-01-22 03:29:12 +00:00
|
|
|
# ifndef OPENSSL_NO_MD5
|
2011-08-23 20:53:34 +00:00
|
|
|
const EVP_CIPHER *EVP_rc4_hmac_md5(void);
|
2015-01-22 03:29:12 +00:00
|
|
|
# endif
|
|
|
|
# endif
|
|
|
|
# ifndef OPENSSL_NO_IDEA
|
2001-03-09 02:51:02 +00:00
|
|
|
const EVP_CIPHER *EVP_idea_ecb(void);
|
2004-01-28 19:05:35 +00:00
|
|
|
const EVP_CIPHER *EVP_idea_cfb64(void);
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_idea_cfb EVP_idea_cfb64
|
2001-03-09 02:51:02 +00:00
|
|
|
const EVP_CIPHER *EVP_idea_ofb(void);
|
|
|
|
const EVP_CIPHER *EVP_idea_cbc(void);
|
2015-01-22 03:29:12 +00:00
|
|
|
# endif
|
|
|
|
# ifndef OPENSSL_NO_RC2
|
2001-03-09 02:51:02 +00:00
|
|
|
const EVP_CIPHER *EVP_rc2_ecb(void);
|
|
|
|
const EVP_CIPHER *EVP_rc2_cbc(void);
|
|
|
|
const EVP_CIPHER *EVP_rc2_40_cbc(void);
|
|
|
|
const EVP_CIPHER *EVP_rc2_64_cbc(void);
|
2004-01-28 19:05:35 +00:00
|
|
|
const EVP_CIPHER *EVP_rc2_cfb64(void);
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_rc2_cfb EVP_rc2_cfb64
|
2001-03-09 02:51:02 +00:00
|
|
|
const EVP_CIPHER *EVP_rc2_ofb(void);
|
2015-01-22 03:29:12 +00:00
|
|
|
# endif
|
|
|
|
# ifndef OPENSSL_NO_BF
|
2001-03-09 02:51:02 +00:00
|
|
|
const EVP_CIPHER *EVP_bf_ecb(void);
|
|
|
|
const EVP_CIPHER *EVP_bf_cbc(void);
|
2004-01-28 19:05:35 +00:00
|
|
|
const EVP_CIPHER *EVP_bf_cfb64(void);
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_bf_cfb EVP_bf_cfb64
|
2001-03-09 02:51:02 +00:00
|
|
|
const EVP_CIPHER *EVP_bf_ofb(void);
|
2015-01-22 03:29:12 +00:00
|
|
|
# endif
|
|
|
|
# ifndef OPENSSL_NO_CAST
|
2001-03-09 02:51:02 +00:00
|
|
|
const EVP_CIPHER *EVP_cast5_ecb(void);
|
|
|
|
const EVP_CIPHER *EVP_cast5_cbc(void);
|
2004-01-28 19:05:35 +00:00
|
|
|
const EVP_CIPHER *EVP_cast5_cfb64(void);
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_cast5_cfb EVP_cast5_cfb64
|
2001-03-09 02:51:02 +00:00
|
|
|
const EVP_CIPHER *EVP_cast5_ofb(void);
|
2015-01-22 03:29:12 +00:00
|
|
|
# endif
|
|
|
|
# ifndef OPENSSL_NO_RC5
|
2001-03-09 02:51:02 +00:00
|
|
|
const EVP_CIPHER *EVP_rc5_32_12_16_cbc(void);
|
|
|
|
const EVP_CIPHER *EVP_rc5_32_12_16_ecb(void);
|
2004-01-28 19:05:35 +00:00
|
|
|
const EVP_CIPHER *EVP_rc5_32_12_16_cfb64(void);
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_rc5_32_12_16_cfb EVP_rc5_32_12_16_cfb64
|
2001-03-09 02:51:02 +00:00
|
|
|
const EVP_CIPHER *EVP_rc5_32_12_16_ofb(void);
|
2015-01-22 03:29:12 +00:00
|
|
|
# endif
|
|
|
|
# ifndef OPENSSL_NO_AES
|
2001-03-09 02:51:02 +00:00
|
|
|
const EVP_CIPHER *EVP_aes_128_ecb(void);
|
|
|
|
const EVP_CIPHER *EVP_aes_128_cbc(void);
|
2004-01-28 19:05:35 +00:00
|
|
|
const EVP_CIPHER *EVP_aes_128_cfb1(void);
|
|
|
|
const EVP_CIPHER *EVP_aes_128_cfb8(void);
|
|
|
|
const EVP_CIPHER *EVP_aes_128_cfb128(void);
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_aes_128_cfb EVP_aes_128_cfb128
|
2002-05-31 13:08:53 +00:00
|
|
|
const EVP_CIPHER *EVP_aes_128_ofb(void);
|
|
|
|
const EVP_CIPHER *EVP_aes_128_ctr(void);
|
2011-05-28 23:01:26 +00:00
|
|
|
const EVP_CIPHER *EVP_aes_128_ccm(void);
|
2012-06-03 22:03:37 +00:00
|
|
|
const EVP_CIPHER *EVP_aes_128_gcm(void);
|
2011-05-28 23:01:26 +00:00
|
|
|
const EVP_CIPHER *EVP_aes_128_xts(void);
|
2013-07-17 13:05:19 +00:00
|
|
|
const EVP_CIPHER *EVP_aes_128_wrap(void);
|
2001-03-09 02:51:02 +00:00
|
|
|
const EVP_CIPHER *EVP_aes_192_ecb(void);
|
|
|
|
const EVP_CIPHER *EVP_aes_192_cbc(void);
|
2004-01-28 19:05:35 +00:00
|
|
|
const EVP_CIPHER *EVP_aes_192_cfb1(void);
|
|
|
|
const EVP_CIPHER *EVP_aes_192_cfb8(void);
|
|
|
|
const EVP_CIPHER *EVP_aes_192_cfb128(void);
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_aes_192_cfb EVP_aes_192_cfb128
|
2002-05-31 13:08:53 +00:00
|
|
|
const EVP_CIPHER *EVP_aes_192_ofb(void);
|
|
|
|
const EVP_CIPHER *EVP_aes_192_ctr(void);
|
2011-05-28 23:01:26 +00:00
|
|
|
const EVP_CIPHER *EVP_aes_192_ccm(void);
|
2012-06-03 22:03:37 +00:00
|
|
|
const EVP_CIPHER *EVP_aes_192_gcm(void);
|
2013-07-17 13:05:19 +00:00
|
|
|
const EVP_CIPHER *EVP_aes_192_wrap(void);
|
2001-03-09 02:51:02 +00:00
|
|
|
const EVP_CIPHER *EVP_aes_256_ecb(void);
|
|
|
|
const EVP_CIPHER *EVP_aes_256_cbc(void);
|
2004-01-28 19:05:35 +00:00
|
|
|
const EVP_CIPHER *EVP_aes_256_cfb1(void);
|
|
|
|
const EVP_CIPHER *EVP_aes_256_cfb8(void);
|
|
|
|
const EVP_CIPHER *EVP_aes_256_cfb128(void);
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_aes_256_cfb EVP_aes_256_cfb128
|
2002-05-31 13:08:53 +00:00
|
|
|
const EVP_CIPHER *EVP_aes_256_ofb(void);
|
|
|
|
const EVP_CIPHER *EVP_aes_256_ctr(void);
|
2011-05-28 23:01:26 +00:00
|
|
|
const EVP_CIPHER *EVP_aes_256_ccm(void);
|
2012-06-03 22:03:37 +00:00
|
|
|
const EVP_CIPHER *EVP_aes_256_gcm(void);
|
2011-05-28 23:01:26 +00:00
|
|
|
const EVP_CIPHER *EVP_aes_256_xts(void);
|
2013-07-17 13:05:19 +00:00
|
|
|
const EVP_CIPHER *EVP_aes_256_wrap(void);
|
2015-01-22 03:29:12 +00:00
|
|
|
# if !defined(OPENSSL_NO_SHA) && !defined(OPENSSL_NO_SHA1)
|
2011-08-23 20:53:34 +00:00
|
|
|
const EVP_CIPHER *EVP_aes_128_cbc_hmac_sha1(void);
|
|
|
|
const EVP_CIPHER *EVP_aes_256_cbc_hmac_sha1(void);
|
2015-01-22 03:29:12 +00:00
|
|
|
# endif
|
|
|
|
# ifndef OPENSSL_NO_SHA256
|
2013-06-04 14:14:18 +00:00
|
|
|
const EVP_CIPHER *EVP_aes_128_cbc_hmac_sha256(void);
|
|
|
|
const EVP_CIPHER *EVP_aes_256_cbc_hmac_sha256(void);
|
2015-01-22 03:29:12 +00:00
|
|
|
# endif
|
2013-06-04 14:14:18 +00:00
|
|
|
# endif
|
2015-01-22 03:29:12 +00:00
|
|
|
# ifndef OPENSSL_NO_CAMELLIA
|
2006-06-09 15:44:59 +00:00
|
|
|
const EVP_CIPHER *EVP_camellia_128_ecb(void);
|
|
|
|
const EVP_CIPHER *EVP_camellia_128_cbc(void);
|
|
|
|
const EVP_CIPHER *EVP_camellia_128_cfb1(void);
|
|
|
|
const EVP_CIPHER *EVP_camellia_128_cfb8(void);
|
|
|
|
const EVP_CIPHER *EVP_camellia_128_cfb128(void);
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_camellia_128_cfb EVP_camellia_128_cfb128
|
2006-06-09 15:44:59 +00:00
|
|
|
const EVP_CIPHER *EVP_camellia_128_ofb(void);
|
|
|
|
const EVP_CIPHER *EVP_camellia_192_ecb(void);
|
|
|
|
const EVP_CIPHER *EVP_camellia_192_cbc(void);
|
|
|
|
const EVP_CIPHER *EVP_camellia_192_cfb1(void);
|
|
|
|
const EVP_CIPHER *EVP_camellia_192_cfb8(void);
|
|
|
|
const EVP_CIPHER *EVP_camellia_192_cfb128(void);
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_camellia_192_cfb EVP_camellia_192_cfb128
|
2006-06-09 15:44:59 +00:00
|
|
|
const EVP_CIPHER *EVP_camellia_192_ofb(void);
|
|
|
|
const EVP_CIPHER *EVP_camellia_256_ecb(void);
|
|
|
|
const EVP_CIPHER *EVP_camellia_256_cbc(void);
|
|
|
|
const EVP_CIPHER *EVP_camellia_256_cfb1(void);
|
|
|
|
const EVP_CIPHER *EVP_camellia_256_cfb8(void);
|
|
|
|
const EVP_CIPHER *EVP_camellia_256_cfb128(void);
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_camellia_256_cfb EVP_camellia_256_cfb128
|
2006-06-09 15:44:59 +00:00
|
|
|
const EVP_CIPHER *EVP_camellia_256_ofb(void);
|
2015-01-22 03:29:12 +00:00
|
|
|
# endif
|
2000-10-14 20:09:54 +00:00
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
# ifndef OPENSSL_NO_SEED
|
2007-04-23 23:48:59 +00:00
|
|
|
const EVP_CIPHER *EVP_seed_ecb(void);
|
|
|
|
const EVP_CIPHER *EVP_seed_cbc(void);
|
|
|
|
const EVP_CIPHER *EVP_seed_cfb128(void);
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_seed_cfb EVP_seed_cfb128
|
2007-04-23 23:48:59 +00:00
|
|
|
const EVP_CIPHER *EVP_seed_ofb(void);
|
2015-01-22 03:29:12 +00:00
|
|
|
# endif
|
2007-04-23 23:48:59 +00:00
|
|
|
|
2002-02-23 01:00:44 +00:00
|
|
|
void OPENSSL_add_all_algorithms_noconf(void);
|
|
|
|
void OPENSSL_add_all_algorithms_conf(void);
|
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
# ifdef OPENSSL_LOAD_CONF
|
|
|
|
# define OpenSSL_add_all_algorithms() \
|
|
|
|
OPENSSL_add_all_algorithms_conf()
|
|
|
|
# else
|
|
|
|
# define OpenSSL_add_all_algorithms() \
|
|
|
|
OPENSSL_add_all_algorithms_noconf()
|
|
|
|
# endif
|
2002-02-23 01:00:44 +00:00
|
|
|
|
2000-02-04 14:01:38 +00:00
|
|
|
void OpenSSL_add_all_ciphers(void);
|
|
|
|
void OpenSSL_add_all_digests(void);
|
2015-01-22 03:29:12 +00:00
|
|
|
# define SSLeay_add_all_algorithms() OpenSSL_add_all_algorithms()
|
|
|
|
# define SSLeay_add_all_ciphers() OpenSSL_add_all_ciphers()
|
|
|
|
# define SSLeay_add_all_digests() OpenSSL_add_all_digests()
|
1998-12-21 10:52:47 +00:00
|
|
|
|
2001-03-09 02:51:02 +00:00
|
|
|
int EVP_add_cipher(const EVP_CIPHER *cipher);
|
|
|
|
int EVP_add_digest(const EVP_MD *digest);
|
1998-12-21 10:52:47 +00:00
|
|
|
|
1999-04-17 21:25:43 +00:00
|
|
|
const EVP_CIPHER *EVP_get_cipherbyname(const char *name);
|
|
|
|
const EVP_MD *EVP_get_digestbyname(const char *name);
|
1998-12-21 10:52:47 +00:00
|
|
|
void EVP_cleanup(void);
|
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
void EVP_CIPHER_do_all(void (*fn) (const EVP_CIPHER *ciph,
|
|
|
|
const char *from, const char *to, void *x),
|
|
|
|
void *arg);
|
|
|
|
void EVP_CIPHER_do_all_sorted(void (*fn)
|
|
|
|
(const EVP_CIPHER *ciph, const char *from,
|
|
|
|
const char *to, void *x), void *arg);
|
|
|
|
|
|
|
|
void EVP_MD_do_all(void (*fn) (const EVP_MD *ciph,
|
|
|
|
const char *from, const char *to, void *x),
|
|
|
|
void *arg);
|
|
|
|
void EVP_MD_do_all_sorted(void (*fn)
|
|
|
|
(const EVP_MD *ciph, const char *from,
|
|
|
|
const char *to, void *x), void *arg);
|
|
|
|
|
|
|
|
int EVP_PKEY_decrypt_old(unsigned char *dec_key,
|
|
|
|
const unsigned char *enc_key, int enc_key_len,
|
|
|
|
EVP_PKEY *private_key);
|
|
|
|
int EVP_PKEY_encrypt_old(unsigned char *enc_key,
|
|
|
|
const unsigned char *key, int key_len,
|
|
|
|
EVP_PKEY *pub_key);
|
|
|
|
int EVP_PKEY_type(int type);
|
|
|
|
int EVP_PKEY_id(const EVP_PKEY *pkey);
|
|
|
|
int EVP_PKEY_base_id(const EVP_PKEY *pkey);
|
|
|
|
int EVP_PKEY_bits(EVP_PKEY *pkey);
|
|
|
|
int EVP_PKEY_size(EVP_PKEY *pkey);
|
|
|
|
int EVP_PKEY_set_type(EVP_PKEY *pkey, int type);
|
|
|
|
int EVP_PKEY_set_type_str(EVP_PKEY *pkey, const char *str, int len);
|
|
|
|
int EVP_PKEY_assign(EVP_PKEY *pkey, int type, void *key);
|
|
|
|
void *EVP_PKEY_get0(EVP_PKEY *pkey);
|
|
|
|
|
|
|
|
# ifndef OPENSSL_NO_RSA
|
2001-08-03 18:48:35 +00:00
|
|
|
struct rsa_st;
|
2015-01-22 03:29:12 +00:00
|
|
|
int EVP_PKEY_set1_RSA(EVP_PKEY *pkey, struct rsa_st *key);
|
2001-08-03 18:48:35 +00:00
|
|
|
struct rsa_st *EVP_PKEY_get1_RSA(EVP_PKEY *pkey);
|
2015-01-22 03:29:12 +00:00
|
|
|
# endif
|
|
|
|
# ifndef OPENSSL_NO_DSA
|
2001-08-03 18:48:35 +00:00
|
|
|
struct dsa_st;
|
2015-01-22 03:29:12 +00:00
|
|
|
int EVP_PKEY_set1_DSA(EVP_PKEY *pkey, struct dsa_st *key);
|
2001-08-03 18:48:35 +00:00
|
|
|
struct dsa_st *EVP_PKEY_get1_DSA(EVP_PKEY *pkey);
|
2015-01-22 03:29:12 +00:00
|
|
|
# endif
|
|
|
|
# ifndef OPENSSL_NO_DH
|
2001-08-03 18:48:35 +00:00
|
|
|
struct dh_st;
|
2015-01-22 03:29:12 +00:00
|
|
|
int EVP_PKEY_set1_DH(EVP_PKEY *pkey, struct dh_st *key);
|
2001-08-03 18:48:35 +00:00
|
|
|
struct dh_st *EVP_PKEY_get1_DH(EVP_PKEY *pkey);
|
2015-01-22 03:29:12 +00:00
|
|
|
# endif
|
|
|
|
# ifndef OPENSSL_NO_EC
|
2002-08-07 10:49:54 +00:00
|
|
|
struct ec_key_st;
|
2015-01-22 03:29:12 +00:00
|
|
|
int EVP_PKEY_set1_EC_KEY(EVP_PKEY *pkey, struct ec_key_st *key);
|
2002-08-07 10:49:54 +00:00
|
|
|
struct ec_key_st *EVP_PKEY_get1_EC_KEY(EVP_PKEY *pkey);
|
2015-01-22 03:29:12 +00:00
|
|
|
# endif
|
2001-08-03 18:48:35 +00:00
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
EVP_PKEY *EVP_PKEY_new(void);
|
|
|
|
void EVP_PKEY_free(EVP_PKEY *pkey);
|
2005-05-15 00:54:45 +00:00
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
EVP_PKEY *d2i_PublicKey(int type, EVP_PKEY **a, const unsigned char **pp,
|
|
|
|
long length);
|
|
|
|
int i2d_PublicKey(EVP_PKEY *a, unsigned char **pp);
|
1998-12-21 10:52:47 +00:00
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
EVP_PKEY *d2i_PrivateKey(int type, EVP_PKEY **a, const unsigned char **pp,
|
|
|
|
long length);
|
|
|
|
EVP_PKEY *d2i_AutoPrivateKey(EVP_PKEY **a, const unsigned char **pp,
|
|
|
|
long length);
|
|
|
|
int i2d_PrivateKey(EVP_PKEY *a, unsigned char **pp);
|
1998-12-21 10:52:47 +00:00
|
|
|
|
2003-04-06 15:31:18 +00:00
|
|
|
int EVP_PKEY_copy_parameters(EVP_PKEY *to, const EVP_PKEY *from);
|
|
|
|
int EVP_PKEY_missing_parameters(const EVP_PKEY *pkey);
|
2015-01-22 03:29:12 +00:00
|
|
|
int EVP_PKEY_save_parameters(EVP_PKEY *pkey, int mode);
|
2003-04-06 15:31:18 +00:00
|
|
|
int EVP_PKEY_cmp_parameters(const EVP_PKEY *a, const EVP_PKEY *b);
|
1998-12-21 10:56:39 +00:00
|
|
|
|
2003-04-06 15:31:18 +00:00
|
|
|
int EVP_PKEY_cmp(const EVP_PKEY *a, const EVP_PKEY *b);
|
2003-04-03 22:27:24 +00:00
|
|
|
|
2006-03-22 13:09:35 +00:00
|
|
|
int EVP_PKEY_print_public(BIO *out, const EVP_PKEY *pkey,
|
2015-01-22 03:29:12 +00:00
|
|
|
int indent, ASN1_PCTX *pctx);
|
2006-03-22 13:09:35 +00:00
|
|
|
int EVP_PKEY_print_private(BIO *out, const EVP_PKEY *pkey,
|
2015-01-22 03:29:12 +00:00
|
|
|
int indent, ASN1_PCTX *pctx);
|
2006-03-22 13:09:35 +00:00
|
|
|
int EVP_PKEY_print_params(BIO *out, const EVP_PKEY *pkey,
|
2015-01-22 03:29:12 +00:00
|
|
|
int indent, ASN1_PCTX *pctx);
|
2006-03-22 13:09:35 +00:00
|
|
|
|
2006-05-07 17:09:39 +00:00
|
|
|
int EVP_PKEY_get_default_digest_nid(EVP_PKEY *pkey, int *pnid);
|
|
|
|
|
1999-05-16 00:25:36 +00:00
|
|
|
int EVP_CIPHER_type(const EVP_CIPHER *ctx);
|
1999-05-10 00:47:42 +00:00
|
|
|
|
1998-12-21 10:56:39 +00:00
|
|
|
/* calls methods */
|
|
|
|
int EVP_CIPHER_param_to_asn1(EVP_CIPHER_CTX *c, ASN1_TYPE *type);
|
|
|
|
int EVP_CIPHER_asn1_to_param(EVP_CIPHER_CTX *c, ASN1_TYPE *type);
|
|
|
|
|
|
|
|
/* These are used by EVP_CIPHER methods */
|
2015-01-22 03:29:12 +00:00
|
|
|
int EVP_CIPHER_set_asn1_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type);
|
|
|
|
int EVP_CIPHER_get_asn1_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type);
|
1998-12-21 10:52:47 +00:00
|
|
|
|
1999-06-04 23:33:48 +00:00
|
|
|
/* PKCS5 password based encryption */
|
1999-06-06 18:41:52 +00:00
|
|
|
int PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen,
|
2015-01-22 03:29:12 +00:00
|
|
|
ASN1_TYPE *param, const EVP_CIPHER *cipher,
|
|
|
|
const EVP_MD *md, int en_de);
|
1999-06-07 21:00:19 +00:00
|
|
|
int PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen,
|
2015-01-22 03:29:12 +00:00
|
|
|
const unsigned char *salt, int saltlen, int iter,
|
|
|
|
int keylen, unsigned char *out);
|
2006-08-28 17:01:04 +00:00
|
|
|
int PKCS5_PBKDF2_HMAC(const char *pass, int passlen,
|
2015-01-22 03:29:12 +00:00
|
|
|
const unsigned char *salt, int saltlen, int iter,
|
|
|
|
const EVP_MD *digest, int keylen, unsigned char *out);
|
1999-06-07 21:00:19 +00:00
|
|
|
int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen,
|
2015-01-22 03:29:12 +00:00
|
|
|
ASN1_TYPE *param, const EVP_CIPHER *cipher,
|
|
|
|
const EVP_MD *md, int en_de);
|
1999-06-04 23:33:48 +00:00
|
|
|
|
1999-06-05 00:32:16 +00:00
|
|
|
void PKCS5_PBE_add(void);
|
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
int EVP_PBE_CipherInit(ASN1_OBJECT *pbe_obj, const char *pass, int passlen,
|
|
|
|
ASN1_TYPE *param, EVP_CIPHER_CTX *ctx, int en_de);
|
2006-05-14 18:40:53 +00:00
|
|
|
|
|
|
|
/* PBE type */
|
|
|
|
|
|
|
|
/* Can appear as the outermost AlgorithmIdentifier */
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_PBE_TYPE_OUTER 0x0
|
2006-05-14 18:40:53 +00:00
|
|
|
/* Is an PRF type OID */
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_PBE_TYPE_PRF 0x1
|
2006-05-14 18:40:53 +00:00
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
int EVP_PBE_alg_add_type(int pbe_type, int pbe_nid, int cipher_nid,
|
|
|
|
int md_nid, EVP_PBE_KEYGEN *keygen);
|
2001-03-09 02:51:02 +00:00
|
|
|
int EVP_PBE_alg_add(int nid, const EVP_CIPHER *cipher, const EVP_MD *md,
|
2015-01-22 03:29:12 +00:00
|
|
|
EVP_PBE_KEYGEN *keygen);
|
|
|
|
int EVP_PBE_find(int type, int pbe_nid, int *pcnid, int *pmnid,
|
|
|
|
EVP_PBE_KEYGEN **pkeygen);
|
1999-06-06 13:07:13 +00:00
|
|
|
void EVP_PBE_cleanup(void);
|
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
# define ASN1_PKEY_ALIAS 0x1
|
|
|
|
# define ASN1_PKEY_DYNAMIC 0x2
|
|
|
|
# define ASN1_PKEY_SIGPARAM_NULL 0x4
|
2006-04-04 18:16:03 +00:00
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
# define ASN1_PKEY_CTRL_PKCS7_SIGN 0x1
|
|
|
|
# define ASN1_PKEY_CTRL_PKCS7_ENCRYPT 0x2
|
|
|
|
# define ASN1_PKEY_CTRL_DEFAULT_MD_NID 0x3
|
|
|
|
# define ASN1_PKEY_CTRL_CMS_SIGN 0x5
|
|
|
|
# define ASN1_PKEY_CTRL_CMS_ENVELOPE 0x7
|
|
|
|
# define ASN1_PKEY_CTRL_CMS_RI_TYPE 0x8
|
2006-04-17 17:12:23 +00:00
|
|
|
|
2006-03-23 18:02:23 +00:00
|
|
|
int EVP_PKEY_asn1_get_count(void);
|
|
|
|
const EVP_PKEY_ASN1_METHOD *EVP_PKEY_asn1_get0(int idx);
|
2006-06-05 11:52:46 +00:00
|
|
|
const EVP_PKEY_ASN1_METHOD *EVP_PKEY_asn1_find(ENGINE **pe, int type);
|
|
|
|
const EVP_PKEY_ASN1_METHOD *EVP_PKEY_asn1_find_str(ENGINE **pe,
|
2015-01-22 03:29:12 +00:00
|
|
|
const char *str, int len);
|
2006-04-05 13:24:19 +00:00
|
|
|
int EVP_PKEY_asn1_add0(const EVP_PKEY_ASN1_METHOD *ameth);
|
|
|
|
int EVP_PKEY_asn1_add_alias(int to, int from);
|
2015-01-22 03:29:12 +00:00
|
|
|
int EVP_PKEY_asn1_get0_info(int *ppkey_id, int *pkey_base_id,
|
|
|
|
int *ppkey_flags, const char **pinfo,
|
|
|
|
const char **ppem_str,
|
|
|
|
const EVP_PKEY_ASN1_METHOD *ameth);
|
|
|
|
|
|
|
|
const EVP_PKEY_ASN1_METHOD *EVP_PKEY_get0_asn1(EVP_PKEY *pkey);
|
|
|
|
EVP_PKEY_ASN1_METHOD *EVP_PKEY_asn1_new(int id, int flags,
|
|
|
|
const char *pem_str,
|
|
|
|
const char *info);
|
|
|
|
void EVP_PKEY_asn1_copy(EVP_PKEY_ASN1_METHOD *dst,
|
|
|
|
const EVP_PKEY_ASN1_METHOD *src);
|
2006-03-23 11:54:51 +00:00
|
|
|
void EVP_PKEY_asn1_free(EVP_PKEY_ASN1_METHOD *ameth);
|
2006-03-29 12:18:26 +00:00
|
|
|
void EVP_PKEY_asn1_set_public(EVP_PKEY_ASN1_METHOD *ameth,
|
2015-01-22 03:29:12 +00:00
|
|
|
int (*pub_decode) (EVP_PKEY *pk,
|
|
|
|
X509_PUBKEY *pub),
|
|
|
|
int (*pub_encode) (X509_PUBKEY *pub,
|
|
|
|
const EVP_PKEY *pk),
|
|
|
|
int (*pub_cmp) (const EVP_PKEY *a,
|
|
|
|
const EVP_PKEY *b),
|
|
|
|
int (*pub_print) (BIO *out,
|
|
|
|
const EVP_PKEY *pkey,
|
|
|
|
int indent, ASN1_PCTX *pctx),
|
|
|
|
int (*pkey_size) (const EVP_PKEY *pk),
|
|
|
|
int (*pkey_bits) (const EVP_PKEY *pk));
|
2006-03-23 11:54:51 +00:00
|
|
|
void EVP_PKEY_asn1_set_private(EVP_PKEY_ASN1_METHOD *ameth,
|
2015-01-22 03:29:12 +00:00
|
|
|
int (*priv_decode) (EVP_PKEY *pk,
|
|
|
|
PKCS8_PRIV_KEY_INFO
|
|
|
|
*p8inf),
|
|
|
|
int (*priv_encode) (PKCS8_PRIV_KEY_INFO *p8,
|
|
|
|
const EVP_PKEY *pk),
|
|
|
|
int (*priv_print) (BIO *out,
|
|
|
|
const EVP_PKEY *pkey,
|
|
|
|
int indent,
|
|
|
|
ASN1_PCTX *pctx));
|
2006-03-23 11:54:51 +00:00
|
|
|
void EVP_PKEY_asn1_set_param(EVP_PKEY_ASN1_METHOD *ameth,
|
2015-01-22 03:29:12 +00:00
|
|
|
int (*param_decode) (EVP_PKEY *pkey,
|
|
|
|
const unsigned char **pder,
|
|
|
|
int derlen),
|
|
|
|
int (*param_encode) (const EVP_PKEY *pkey,
|
|
|
|
unsigned char **pder),
|
|
|
|
int (*param_missing) (const EVP_PKEY *pk),
|
|
|
|
int (*param_copy) (EVP_PKEY *to,
|
|
|
|
const EVP_PKEY *from),
|
|
|
|
int (*param_cmp) (const EVP_PKEY *a,
|
|
|
|
const EVP_PKEY *b),
|
|
|
|
int (*param_print) (BIO *out,
|
|
|
|
const EVP_PKEY *pkey,
|
|
|
|
int indent,
|
|
|
|
ASN1_PCTX *pctx));
|
2006-03-24 13:46:58 +00:00
|
|
|
|
2006-03-23 11:54:51 +00:00
|
|
|
void EVP_PKEY_asn1_set_free(EVP_PKEY_ASN1_METHOD *ameth,
|
2015-01-22 03:29:12 +00:00
|
|
|
void (*pkey_free) (EVP_PKEY *pkey));
|
2006-03-23 11:54:51 +00:00
|
|
|
void EVP_PKEY_asn1_set_ctrl(EVP_PKEY_ASN1_METHOD *ameth,
|
2015-01-22 03:29:12 +00:00
|
|
|
int (*pkey_ctrl) (EVP_PKEY *pkey, int op,
|
|
|
|
long arg1, void *arg2));
|
2015-06-01 11:48:27 +00:00
|
|
|
void EVP_PKEY_asn1_set_item(EVP_PKEY_ASN1_METHOD *ameth,
|
|
|
|
int (*item_verify) (EVP_MD_CTX *ctx,
|
|
|
|
const ASN1_ITEM *it,
|
|
|
|
void *asn,
|
|
|
|
X509_ALGOR *a,
|
|
|
|
ASN1_BIT_STRING *sig,
|
|
|
|
EVP_PKEY *pkey),
|
|
|
|
int (*item_sign) (EVP_MD_CTX *ctx,
|
|
|
|
const ASN1_ITEM *it,
|
|
|
|
void *asn,
|
|
|
|
X509_ALGOR *alg1,
|
|
|
|
X509_ALGOR *alg2,
|
|
|
|
ASN1_BIT_STRING *sig));
|
2006-04-06 17:32:43 +00:00
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_PKEY_OP_UNDEFINED 0
|
|
|
|
# define EVP_PKEY_OP_PARAMGEN (1<<1)
|
|
|
|
# define EVP_PKEY_OP_KEYGEN (1<<2)
|
|
|
|
# define EVP_PKEY_OP_SIGN (1<<3)
|
|
|
|
# define EVP_PKEY_OP_VERIFY (1<<4)
|
|
|
|
# define EVP_PKEY_OP_VERIFYRECOVER (1<<5)
|
|
|
|
# define EVP_PKEY_OP_SIGNCTX (1<<6)
|
|
|
|
# define EVP_PKEY_OP_VERIFYCTX (1<<7)
|
|
|
|
# define EVP_PKEY_OP_ENCRYPT (1<<8)
|
|
|
|
# define EVP_PKEY_OP_DECRYPT (1<<9)
|
|
|
|
# define EVP_PKEY_OP_DERIVE (1<<10)
|
2006-04-10 11:16:11 +00:00
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_PKEY_OP_TYPE_SIG \
|
|
|
|
(EVP_PKEY_OP_SIGN | EVP_PKEY_OP_VERIFY | EVP_PKEY_OP_VERIFYRECOVER \
|
|
|
|
| EVP_PKEY_OP_SIGNCTX | EVP_PKEY_OP_VERIFYCTX)
|
2006-04-10 11:16:11 +00:00
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_PKEY_OP_TYPE_CRYPT \
|
|
|
|
(EVP_PKEY_OP_ENCRYPT | EVP_PKEY_OP_DECRYPT)
|
2006-04-10 11:16:11 +00:00
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_PKEY_OP_TYPE_NOGEN \
|
|
|
|
(EVP_PKEY_OP_SIG | EVP_PKEY_OP_CRYPT | EVP_PKEY_OP_DERIVE)
|
2006-04-10 11:48:35 +00:00
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_PKEY_OP_TYPE_GEN \
|
|
|
|
(EVP_PKEY_OP_PARAMGEN | EVP_PKEY_OP_KEYGEN)
|
2006-04-10 11:16:11 +00:00
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_PKEY_CTX_set_signature_md(ctx, md) \
|
|
|
|
EVP_PKEY_CTX_ctrl(ctx, -1, EVP_PKEY_OP_TYPE_SIG, \
|
|
|
|
EVP_PKEY_CTRL_MD, 0, (void *)md)
|
2006-04-06 17:32:43 +00:00
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_PKEY_CTX_get_signature_md(ctx, pmd) \
|
|
|
|
EVP_PKEY_CTX_ctrl(ctx, -1, EVP_PKEY_OP_TYPE_SIG, \
|
|
|
|
EVP_PKEY_CTRL_GET_MD, 0, (void *)pmd)
|
2013-06-19 17:20:03 +00:00
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_PKEY_CTRL_MD 1
|
|
|
|
# define EVP_PKEY_CTRL_PEER_KEY 2
|
2006-07-10 18:36:55 +00:00
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_PKEY_CTRL_PKCS7_ENCRYPT 3
|
|
|
|
# define EVP_PKEY_CTRL_PKCS7_DECRYPT 4
|
2006-05-08 12:44:25 +00:00
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_PKEY_CTRL_PKCS7_SIGN 5
|
2006-04-09 19:17:25 +00:00
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_PKEY_CTRL_SET_MAC_KEY 6
|
2007-04-11 12:33:06 +00:00
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_PKEY_CTRL_DIGESTINIT 7
|
2007-04-11 12:33:06 +00:00
|
|
|
|
1. Changes for s_client.c to make it return non-zero exit code in case
of handshake failure
2. Changes to x509_certificate_type function (crypto/x509/x509type.c) to
make it recognize GOST certificates as EVP_PKT_SIGN|EVP_PKT_EXCH
(required for s3_srvr to accept GOST client certificates).
3. Changes to EVP
- adding of function EVP_PKEY_CTX_get0_peerkey
- Make function EVP_PKEY_derive_set_peerkey work for context with
ENCRYPT operation, because we use peerkey field in the context to
pass non-ephemeral secret key to GOST encrypt operation.
- added EVP_PKEY_CTRL_SET_IV control command. It is really
GOST-specific, but it is used in SSL code, so it has to go
in some header file, available during libssl compilation
4. Fix to HMAC to avoid call of OPENSSL_cleanse on undefined data
5. Include des.h if KSSL_DEBUG is defined into some libssl files, to
make debugging output which depends on constants defined there, work
and other KSSL_DEBUG output fixes
6. Declaration of real GOST ciphersuites, two authentication methods
SSL_aGOST94 and SSL_aGOST2001 and one key exchange method SSL_kGOST
7. Implementation of these methods.
8. Support for sending unsolicited serverhello extension if GOST
ciphersuite is selected. It is require for interoperability with
CryptoPro CSP 3.0 and 3.6 and controlled by
SSL_OP_CRYPTOPRO_TLSEXT_BUG constant.
This constant is added to SSL_OP_ALL, because it does nothing, if
non-GOST ciphersuite is selected, and all implementation of GOST
include compatibility with CryptoPro.
9. Support for CertificateVerify message without length field. It is
another CryptoPro bug, but support is made unconditional, because it
does no harm for draft-conforming implementation.
10. In tls1_mac extra copy of stream mac context is no more done.
When I've written currently commited code I haven't read
EVP_DigestSignFinal manual carefully enough and haven't noticed that
it does an internal digest ctx copying.
This implementation was tested against
1. CryptoPro CSP 3.6 client and server
2. Cryptopro CSP 3.0 server
2007-10-26 12:06:36 +00:00
|
|
|
/* Used by GOST key encryption in TLS */
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_PKEY_CTRL_SET_IV 8
|
1. Changes for s_client.c to make it return non-zero exit code in case
of handshake failure
2. Changes to x509_certificate_type function (crypto/x509/x509type.c) to
make it recognize GOST certificates as EVP_PKT_SIGN|EVP_PKT_EXCH
(required for s3_srvr to accept GOST client certificates).
3. Changes to EVP
- adding of function EVP_PKEY_CTX_get0_peerkey
- Make function EVP_PKEY_derive_set_peerkey work for context with
ENCRYPT operation, because we use peerkey field in the context to
pass non-ephemeral secret key to GOST encrypt operation.
- added EVP_PKEY_CTRL_SET_IV control command. It is really
GOST-specific, but it is used in SSL code, so it has to go
in some header file, available during libssl compilation
4. Fix to HMAC to avoid call of OPENSSL_cleanse on undefined data
5. Include des.h if KSSL_DEBUG is defined into some libssl files, to
make debugging output which depends on constants defined there, work
and other KSSL_DEBUG output fixes
6. Declaration of real GOST ciphersuites, two authentication methods
SSL_aGOST94 and SSL_aGOST2001 and one key exchange method SSL_kGOST
7. Implementation of these methods.
8. Support for sending unsolicited serverhello extension if GOST
ciphersuite is selected. It is require for interoperability with
CryptoPro CSP 3.0 and 3.6 and controlled by
SSL_OP_CRYPTOPRO_TLSEXT_BUG constant.
This constant is added to SSL_OP_ALL, because it does nothing, if
non-GOST ciphersuite is selected, and all implementation of GOST
include compatibility with CryptoPro.
9. Support for CertificateVerify message without length field. It is
another CryptoPro bug, but support is made unconditional, because it
does no harm for draft-conforming implementation.
10. In tls1_mac extra copy of stream mac context is no more done.
When I've written currently commited code I haven't read
EVP_DigestSignFinal manual carefully enough and haven't noticed that
it does an internal digest ctx copying.
This implementation was tested against
1. CryptoPro CSP 3.6 client and server
2. Cryptopro CSP 3.0 server
2007-10-26 12:06:36 +00:00
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_PKEY_CTRL_CMS_ENCRYPT 9
|
|
|
|
# define EVP_PKEY_CTRL_CMS_DECRYPT 10
|
|
|
|
# define EVP_PKEY_CTRL_CMS_SIGN 11
|
2008-03-12 21:14:28 +00:00
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_PKEY_CTRL_CIPHER 12
|
2011-05-28 23:01:26 +00:00
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_PKEY_CTRL_GET_MD 13
|
2013-06-19 17:20:03 +00:00
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_PKEY_ALG_CTRL 0x1000
|
2006-04-09 19:17:25 +00:00
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_PKEY_FLAG_AUTOARGLEN 2
|
|
|
|
/*
|
|
|
|
* Method handles all operations: don't assume any digest related defaults.
|
2011-05-28 23:01:26 +00:00
|
|
|
*/
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_PKEY_FLAG_SIGCTX_CUSTOM 4
|
2006-04-15 18:50:56 +00:00
|
|
|
|
2006-06-02 12:33:39 +00:00
|
|
|
const EVP_PKEY_METHOD *EVP_PKEY_meth_find(int type);
|
2015-01-22 03:29:12 +00:00
|
|
|
EVP_PKEY_METHOD *EVP_PKEY_meth_new(int id, int flags);
|
2010-11-24 16:07:45 +00:00
|
|
|
void EVP_PKEY_meth_get0_info(int *ppkey_id, int *pflags,
|
2015-01-22 03:29:12 +00:00
|
|
|
const EVP_PKEY_METHOD *meth);
|
2010-11-24 16:07:45 +00:00
|
|
|
void EVP_PKEY_meth_copy(EVP_PKEY_METHOD *dst, const EVP_PKEY_METHOD *src);
|
2006-05-25 11:44:05 +00:00
|
|
|
void EVP_PKEY_meth_free(EVP_PKEY_METHOD *pmeth);
|
2006-04-26 11:52:36 +00:00
|
|
|
int EVP_PKEY_meth_add0(const EVP_PKEY_METHOD *pmeth);
|
|
|
|
|
2006-04-11 13:28:52 +00:00
|
|
|
EVP_PKEY_CTX *EVP_PKEY_CTX_new(EVP_PKEY *pkey, ENGINE *e);
|
|
|
|
EVP_PKEY_CTX *EVP_PKEY_CTX_new_id(int id, ENGINE *e);
|
2006-05-25 00:55:00 +00:00
|
|
|
EVP_PKEY_CTX *EVP_PKEY_CTX_dup(EVP_PKEY_CTX *ctx);
|
2006-04-06 17:32:43 +00:00
|
|
|
void EVP_PKEY_CTX_free(EVP_PKEY_CTX *ctx);
|
2006-04-09 12:42:09 +00:00
|
|
|
|
2006-04-06 17:32:43 +00:00
|
|
|
int EVP_PKEY_CTX_ctrl(EVP_PKEY_CTX *ctx, int keytype, int optype,
|
2015-01-22 03:29:12 +00:00
|
|
|
int cmd, int p1, void *p2);
|
2006-04-09 12:42:09 +00:00
|
|
|
int EVP_PKEY_CTX_ctrl_str(EVP_PKEY_CTX *ctx, const char *type,
|
2015-01-22 03:29:12 +00:00
|
|
|
const char *value);
|
2006-04-06 17:32:43 +00:00
|
|
|
|
2006-05-31 17:34:14 +00:00
|
|
|
int EVP_PKEY_CTX_get_operation(EVP_PKEY_CTX *ctx);
|
|
|
|
void EVP_PKEY_CTX_set0_keygen_info(EVP_PKEY_CTX *ctx, int *dat, int datlen);
|
|
|
|
|
2007-04-11 17:20:40 +00:00
|
|
|
EVP_PKEY *EVP_PKEY_new_mac_key(int type, ENGINE *e,
|
2015-01-22 03:29:12 +00:00
|
|
|
const unsigned char *key, int keylen);
|
2007-04-11 17:20:40 +00:00
|
|
|
|
2006-04-11 13:28:52 +00:00
|
|
|
void EVP_PKEY_CTX_set_data(EVP_PKEY_CTX *ctx, void *data);
|
|
|
|
void *EVP_PKEY_CTX_get_data(EVP_PKEY_CTX *ctx);
|
2006-04-26 11:52:36 +00:00
|
|
|
EVP_PKEY *EVP_PKEY_CTX_get0_pkey(EVP_PKEY_CTX *ctx);
|
|
|
|
|
1. Changes for s_client.c to make it return non-zero exit code in case
of handshake failure
2. Changes to x509_certificate_type function (crypto/x509/x509type.c) to
make it recognize GOST certificates as EVP_PKT_SIGN|EVP_PKT_EXCH
(required for s3_srvr to accept GOST client certificates).
3. Changes to EVP
- adding of function EVP_PKEY_CTX_get0_peerkey
- Make function EVP_PKEY_derive_set_peerkey work for context with
ENCRYPT operation, because we use peerkey field in the context to
pass non-ephemeral secret key to GOST encrypt operation.
- added EVP_PKEY_CTRL_SET_IV control command. It is really
GOST-specific, but it is used in SSL code, so it has to go
in some header file, available during libssl compilation
4. Fix to HMAC to avoid call of OPENSSL_cleanse on undefined data
5. Include des.h if KSSL_DEBUG is defined into some libssl files, to
make debugging output which depends on constants defined there, work
and other KSSL_DEBUG output fixes
6. Declaration of real GOST ciphersuites, two authentication methods
SSL_aGOST94 and SSL_aGOST2001 and one key exchange method SSL_kGOST
7. Implementation of these methods.
8. Support for sending unsolicited serverhello extension if GOST
ciphersuite is selected. It is require for interoperability with
CryptoPro CSP 3.0 and 3.6 and controlled by
SSL_OP_CRYPTOPRO_TLSEXT_BUG constant.
This constant is added to SSL_OP_ALL, because it does nothing, if
non-GOST ciphersuite is selected, and all implementation of GOST
include compatibility with CryptoPro.
9. Support for CertificateVerify message without length field. It is
another CryptoPro bug, but support is made unconditional, because it
does no harm for draft-conforming implementation.
10. In tls1_mac extra copy of stream mac context is no more done.
When I've written currently commited code I haven't read
EVP_DigestSignFinal manual carefully enough and haven't noticed that
it does an internal digest ctx copying.
This implementation was tested against
1. CryptoPro CSP 3.6 client and server
2. Cryptopro CSP 3.0 server
2007-10-26 12:06:36 +00:00
|
|
|
EVP_PKEY *EVP_PKEY_CTX_get0_peerkey(EVP_PKEY_CTX *ctx);
|
|
|
|
|
2006-04-11 13:28:52 +00:00
|
|
|
void EVP_PKEY_CTX_set_app_data(EVP_PKEY_CTX *ctx, void *data);
|
|
|
|
void *EVP_PKEY_CTX_get_app_data(EVP_PKEY_CTX *ctx);
|
2006-04-06 17:32:43 +00:00
|
|
|
|
2006-04-07 19:33:28 +00:00
|
|
|
int EVP_PKEY_sign_init(EVP_PKEY_CTX *ctx);
|
|
|
|
int EVP_PKEY_sign(EVP_PKEY_CTX *ctx,
|
2015-01-22 03:29:12 +00:00
|
|
|
unsigned char *sig, size_t *siglen,
|
|
|
|
const unsigned char *tbs, size_t tbslen);
|
2006-04-07 19:33:28 +00:00
|
|
|
int EVP_PKEY_verify_init(EVP_PKEY_CTX *ctx);
|
|
|
|
int EVP_PKEY_verify(EVP_PKEY_CTX *ctx,
|
2015-01-22 03:29:12 +00:00
|
|
|
const unsigned char *sig, size_t siglen,
|
|
|
|
const unsigned char *tbs, size_t tbslen);
|
2006-04-07 19:33:28 +00:00
|
|
|
int EVP_PKEY_verify_recover_init(EVP_PKEY_CTX *ctx);
|
|
|
|
int EVP_PKEY_verify_recover(EVP_PKEY_CTX *ctx,
|
2015-01-22 03:29:12 +00:00
|
|
|
unsigned char *rout, size_t *routlen,
|
|
|
|
const unsigned char *sig, size_t siglen);
|
2006-04-07 19:33:28 +00:00
|
|
|
int EVP_PKEY_encrypt_init(EVP_PKEY_CTX *ctx);
|
|
|
|
int EVP_PKEY_encrypt(EVP_PKEY_CTX *ctx,
|
2015-01-22 03:29:12 +00:00
|
|
|
unsigned char *out, size_t *outlen,
|
|
|
|
const unsigned char *in, size_t inlen);
|
2006-04-07 19:33:28 +00:00
|
|
|
int EVP_PKEY_decrypt_init(EVP_PKEY_CTX *ctx);
|
|
|
|
int EVP_PKEY_decrypt(EVP_PKEY_CTX *ctx,
|
2015-01-22 03:29:12 +00:00
|
|
|
unsigned char *out, size_t *outlen,
|
|
|
|
const unsigned char *in, size_t inlen);
|
2006-04-07 19:33:28 +00:00
|
|
|
|
2006-04-13 20:16:56 +00:00
|
|
|
int EVP_PKEY_derive_init(EVP_PKEY_CTX *ctx);
|
|
|
|
int EVP_PKEY_derive_set_peer(EVP_PKEY_CTX *ctx, EVP_PKEY *peer);
|
2006-05-24 12:33:46 +00:00
|
|
|
int EVP_PKEY_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *keylen);
|
2006-04-13 20:16:56 +00:00
|
|
|
|
2015-01-22 03:29:12 +00:00
|
|
|
typedef int EVP_PKEY_gen_cb (EVP_PKEY_CTX *ctx);
|
2006-04-11 13:28:52 +00:00
|
|
|
|
|
|
|
int EVP_PKEY_paramgen_init(EVP_PKEY_CTX *ctx);
|
|
|
|
int EVP_PKEY_paramgen(EVP_PKEY_CTX *ctx, EVP_PKEY **ppkey);
|
|
|
|
int EVP_PKEY_keygen_init(EVP_PKEY_CTX *ctx);
|
|
|
|
int EVP_PKEY_keygen(EVP_PKEY_CTX *ctx, EVP_PKEY **ppkey);
|
|
|
|
|
|
|
|
void EVP_PKEY_CTX_set_cb(EVP_PKEY_CTX *ctx, EVP_PKEY_gen_cb *cb);
|
2006-05-31 17:34:14 +00:00
|
|
|
EVP_PKEY_gen_cb *EVP_PKEY_CTX_get_cb(EVP_PKEY_CTX *ctx);
|
|
|
|
|
2006-04-11 13:28:52 +00:00
|
|
|
int EVP_PKEY_CTX_get_keygen_info(EVP_PKEY_CTX *ctx, int idx);
|
|
|
|
|
2006-04-14 12:41:35 +00:00
|
|
|
void EVP_PKEY_meth_set_init(EVP_PKEY_METHOD *pmeth,
|
2015-01-22 03:29:12 +00:00
|
|
|
int (*init) (EVP_PKEY_CTX *ctx));
|
2006-04-14 12:41:35 +00:00
|
|
|
|
2006-05-25 11:44:05 +00:00
|
|
|
void EVP_PKEY_meth_set_copy(EVP_PKEY_METHOD *pmeth,
|
2015-01-22 03:29:12 +00:00
|
|
|
int (*copy) (EVP_PKEY_CTX *dst,
|
|
|
|
EVP_PKEY_CTX *src));
|
2006-05-25 11:44:05 +00:00
|
|
|
|
2006-04-14 12:41:35 +00:00
|
|
|
void EVP_PKEY_meth_set_cleanup(EVP_PKEY_METHOD *pmeth,
|
2015-01-22 03:29:12 +00:00
|
|
|
void (*cleanup) (EVP_PKEY_CTX *ctx));
|
2006-04-14 12:41:35 +00:00
|
|
|
|
|
|
|
void EVP_PKEY_meth_set_paramgen(EVP_PKEY_METHOD *pmeth,
|
2015-01-22 03:29:12 +00:00
|
|
|
int (*paramgen_init) (EVP_PKEY_CTX *ctx),
|
|
|
|
int (*paramgen) (EVP_PKEY_CTX *ctx,
|
|
|
|
EVP_PKEY *pkey));
|
2006-04-14 12:41:35 +00:00
|
|
|
|
|
|
|
void EVP_PKEY_meth_set_keygen(EVP_PKEY_METHOD *pmeth,
|
2015-01-22 03:29:12 +00:00
|
|
|
int (*keygen_init) (EVP_PKEY_CTX *ctx),
|
|
|
|
int (*keygen) (EVP_PKEY_CTX *ctx,
|
|
|
|
EVP_PKEY *pkey));
|
2006-04-14 12:41:35 +00:00
|
|
|
|
|
|
|
void EVP_PKEY_meth_set_sign(EVP_PKEY_METHOD *pmeth,
|
2015-01-22 03:29:12 +00:00
|
|
|
int (*sign_init) (EVP_PKEY_CTX *ctx),
|
|
|
|
int (*sign) (EVP_PKEY_CTX *ctx,
|
|
|
|
unsigned char *sig, size_t *siglen,
|
|
|
|
const unsigned char *tbs,
|
|
|
|
size_t tbslen));
|
2006-04-14 12:41:35 +00:00
|
|
|
|
|
|
|
void EVP_PKEY_meth_set_verify(EVP_PKEY_METHOD *pmeth,
|
2015-01-22 03:29:12 +00:00
|
|
|
int (*verify_init) (EVP_PKEY_CTX *ctx),
|
|
|
|
int (*verify) (EVP_PKEY_CTX *ctx,
|
|
|
|
const unsigned char *sig,
|
|
|
|
size_t siglen,
|
|
|
|
const unsigned char *tbs,
|
|
|
|
size_t tbslen));
|
2006-04-14 12:41:35 +00:00
|
|
|
|
|
|
|
void EVP_PKEY_meth_set_verify_recover(EVP_PKEY_METHOD *pmeth,
|
2015-01-22 03:29:12 +00:00
|
|
|
int (*verify_recover_init) (EVP_PKEY_CTX
|
|
|
|
*ctx),
|
|
|
|
int (*verify_recover) (EVP_PKEY_CTX
|
|
|
|
*ctx,
|
|
|
|
unsigned char
|
|
|
|
*sig,
|
|
|
|
size_t *siglen,
|
|
|
|
const unsigned
|
|
|
|
char *tbs,
|
|
|
|
size_t tbslen));
|
2006-04-14 12:41:35 +00:00
|
|
|
|
|
|
|
void EVP_PKEY_meth_set_signctx(EVP_PKEY_METHOD *pmeth,
|
2015-01-22 03:29:12 +00:00
|
|
|
int (*signctx_init) (EVP_PKEY_CTX *ctx,
|
|
|
|
EVP_MD_CTX *mctx),
|
|
|
|
int (*signctx) (EVP_PKEY_CTX *ctx,
|
|
|
|
unsigned char *sig,
|
|
|
|
size_t *siglen,
|
|
|
|
EVP_MD_CTX *mctx));
|
2006-04-14 12:41:35 +00:00
|
|
|
|
|
|
|
void EVP_PKEY_meth_set_verifyctx(EVP_PKEY_METHOD *pmeth,
|
2015-01-22 03:29:12 +00:00
|
|
|
int (*verifyctx_init) (EVP_PKEY_CTX *ctx,
|
|
|
|
EVP_MD_CTX *mctx),
|
|
|
|
int (*verifyctx) (EVP_PKEY_CTX *ctx,
|
|
|
|
const unsigned char *sig,
|
|
|
|
int siglen,
|
|
|
|
EVP_MD_CTX *mctx));
|
2006-04-14 12:41:35 +00:00
|
|
|
|
|
|
|
void EVP_PKEY_meth_set_encrypt(EVP_PKEY_METHOD *pmeth,
|
2015-01-22 03:29:12 +00:00
|
|
|
int (*encrypt_init) (EVP_PKEY_CTX *ctx),
|
|
|
|
int (*encryptfn) (EVP_PKEY_CTX *ctx,
|
|
|
|
unsigned char *out,
|
|
|
|
size_t *outlen,
|
|
|
|
const unsigned char *in,
|
|
|
|
size_t inlen));
|
2006-04-14 12:41:35 +00:00
|
|
|
|
|
|
|
void EVP_PKEY_meth_set_decrypt(EVP_PKEY_METHOD *pmeth,
|
2015-01-22 03:29:12 +00:00
|
|
|
int (*decrypt_init) (EVP_PKEY_CTX *ctx),
|
|
|
|
int (*decrypt) (EVP_PKEY_CTX *ctx,
|
|
|
|
unsigned char *out,
|
|
|
|
size_t *outlen,
|
|
|
|
const unsigned char *in,
|
|
|
|
size_t inlen));
|
2006-04-14 12:41:35 +00:00
|
|
|
|
|
|
|
void EVP_PKEY_meth_set_derive(EVP_PKEY_METHOD *pmeth,
|
2015-01-22 03:29:12 +00:00
|
|
|
int (*derive_init) (EVP_PKEY_CTX *ctx),
|
|
|
|
int (*derive) (EVP_PKEY_CTX *ctx,
|
|
|
|
unsigned char *key,
|
|
|
|
size_t *keylen));
|
2006-04-14 12:41:35 +00:00
|
|
|
|
|
|
|
void EVP_PKEY_meth_set_ctrl(EVP_PKEY_METHOD *pmeth,
|
2015-01-22 03:29:12 +00:00
|
|
|
int (*ctrl) (EVP_PKEY_CTX *ctx, int type, int p1,
|
|
|
|
void *p2),
|
|
|
|
int (*ctrl_str) (EVP_PKEY_CTX *ctx,
|
|
|
|
const char *type,
|
|
|
|
const char *value));
|
2006-04-14 12:41:35 +00:00
|
|
|
|
2012-07-03 20:20:11 +00:00
|
|
|
void EVP_add_alg_module(void);
|
|
|
|
|
1998-12-21 10:52:47 +00:00
|
|
|
/* BEGIN ERROR CODES */
|
2015-01-22 03:29:12 +00:00
|
|
|
/*
|
|
|
|
* The following lines are auto generated by the script mkerr.pl. Any changes
|
1999-04-24 00:15:18 +00:00
|
|
|
* made after this point may be overwritten when the script is next run.
|
|
|
|
*/
|
2001-09-25 21:37:02 +00:00
|
|
|
void ERR_load_EVP_strings(void);
|
1999-04-24 00:15:18 +00:00
|
|
|
|
1998-12-21 10:52:47 +00:00
|
|
|
/* Error codes for the EVP functions. */
|
|
|
|
|
|
|
|
/* Function codes. */
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_F_AESNI_INIT_KEY 165
|
|
|
|
# define EVP_F_AESNI_XTS_CIPHER 176
|
|
|
|
# define EVP_F_AES_INIT_KEY 133
|
|
|
|
# define EVP_F_AES_T4_INIT_KEY 178
|
|
|
|
# define EVP_F_AES_XTS 172
|
|
|
|
# define EVP_F_AES_XTS_CIPHER 175
|
|
|
|
# define EVP_F_ALG_MODULE_INIT 177
|
|
|
|
# define EVP_F_CAMELLIA_INIT_KEY 159
|
|
|
|
# define EVP_F_CMAC_INIT 173
|
|
|
|
# define EVP_F_CMLL_T4_INIT_KEY 179
|
|
|
|
# define EVP_F_D2I_PKEY 100
|
|
|
|
# define EVP_F_DO_SIGVER_INIT 161
|
|
|
|
# define EVP_F_DSAPKEY2PKCS8 134
|
|
|
|
# define EVP_F_DSA_PKEY2PKCS8 135
|
|
|
|
# define EVP_F_ECDSA_PKEY2PKCS8 129
|
|
|
|
# define EVP_F_ECKEY_PKEY2PKCS8 132
|
|
|
|
# define EVP_F_EVP_CIPHERINIT_EX 123
|
|
|
|
# define EVP_F_EVP_CIPHER_CTX_COPY 163
|
|
|
|
# define EVP_F_EVP_CIPHER_CTX_CTRL 124
|
|
|
|
# define EVP_F_EVP_CIPHER_CTX_SET_KEY_LENGTH 122
|
|
|
|
# define EVP_F_EVP_DECRYPTFINAL_EX 101
|
|
|
|
# define EVP_F_EVP_DIGESTINIT_EX 128
|
|
|
|
# define EVP_F_EVP_ENCRYPTFINAL_EX 127
|
|
|
|
# define EVP_F_EVP_MD_CTX_COPY_EX 110
|
|
|
|
# define EVP_F_EVP_MD_SIZE 162
|
|
|
|
# define EVP_F_EVP_OPENINIT 102
|
|
|
|
# define EVP_F_EVP_PBE_ALG_ADD 115
|
|
|
|
# define EVP_F_EVP_PBE_ALG_ADD_TYPE 160
|
|
|
|
# define EVP_F_EVP_PBE_CIPHERINIT 116
|
|
|
|
# define EVP_F_EVP_PKCS82PKEY 111
|
|
|
|
# define EVP_F_EVP_PKCS82PKEY_BROKEN 136
|
|
|
|
# define EVP_F_EVP_PKEY2PKCS8_BROKEN 113
|
|
|
|
# define EVP_F_EVP_PKEY_COPY_PARAMETERS 103
|
|
|
|
# define EVP_F_EVP_PKEY_CTX_CTRL 137
|
|
|
|
# define EVP_F_EVP_PKEY_CTX_CTRL_STR 150
|
|
|
|
# define EVP_F_EVP_PKEY_CTX_DUP 156
|
|
|
|
# define EVP_F_EVP_PKEY_DECRYPT 104
|
|
|
|
# define EVP_F_EVP_PKEY_DECRYPT_INIT 138
|
|
|
|
# define EVP_F_EVP_PKEY_DECRYPT_OLD 151
|
|
|
|
# define EVP_F_EVP_PKEY_DERIVE 153
|
|
|
|
# define EVP_F_EVP_PKEY_DERIVE_INIT 154
|
|
|
|
# define EVP_F_EVP_PKEY_DERIVE_SET_PEER 155
|
|
|
|
# define EVP_F_EVP_PKEY_ENCRYPT 105
|
|
|
|
# define EVP_F_EVP_PKEY_ENCRYPT_INIT 139
|
|
|
|
# define EVP_F_EVP_PKEY_ENCRYPT_OLD 152
|
|
|
|
# define EVP_F_EVP_PKEY_GET1_DH 119
|
|
|
|
# define EVP_F_EVP_PKEY_GET1_DSA 120
|
|
|
|
# define EVP_F_EVP_PKEY_GET1_ECDSA 130
|
|
|
|
# define EVP_F_EVP_PKEY_GET1_EC_KEY 131
|
|
|
|
# define EVP_F_EVP_PKEY_GET1_RSA 121
|
|
|
|
# define EVP_F_EVP_PKEY_KEYGEN 146
|
|
|
|
# define EVP_F_EVP_PKEY_KEYGEN_INIT 147
|
|
|
|
# define EVP_F_EVP_PKEY_NEW 106
|
|
|
|
# define EVP_F_EVP_PKEY_PARAMGEN 148
|
|
|
|
# define EVP_F_EVP_PKEY_PARAMGEN_INIT 149
|
|
|
|
# define EVP_F_EVP_PKEY_SIGN 140
|
|
|
|
# define EVP_F_EVP_PKEY_SIGN_INIT 141
|
|
|
|
# define EVP_F_EVP_PKEY_VERIFY 142
|
|
|
|
# define EVP_F_EVP_PKEY_VERIFY_INIT 143
|
|
|
|
# define EVP_F_EVP_PKEY_VERIFY_RECOVER 144
|
|
|
|
# define EVP_F_EVP_PKEY_VERIFY_RECOVER_INIT 145
|
|
|
|
# define EVP_F_EVP_RIJNDAEL 126
|
|
|
|
# define EVP_F_EVP_SIGNFINAL 107
|
|
|
|
# define EVP_F_EVP_VERIFYFINAL 108
|
|
|
|
# define EVP_F_FIPS_CIPHERINIT 166
|
|
|
|
# define EVP_F_FIPS_CIPHER_CTX_COPY 170
|
|
|
|
# define EVP_F_FIPS_CIPHER_CTX_CTRL 167
|
|
|
|
# define EVP_F_FIPS_CIPHER_CTX_SET_KEY_LENGTH 171
|
|
|
|
# define EVP_F_FIPS_DIGESTINIT 168
|
|
|
|
# define EVP_F_FIPS_MD_CTX_COPY 169
|
|
|
|
# define EVP_F_HMAC_INIT_EX 174
|
|
|
|
# define EVP_F_INT_CTX_NEW 157
|
|
|
|
# define EVP_F_PKCS5_PBE_KEYIVGEN 117
|
|
|
|
# define EVP_F_PKCS5_V2_PBE_KEYIVGEN 118
|
|
|
|
# define EVP_F_PKCS5_V2_PBKDF2_KEYIVGEN 164
|
|
|
|
# define EVP_F_PKCS8_SET_BROKEN 112
|
|
|
|
# define EVP_F_PKEY_SET_TYPE 158
|
|
|
|
# define EVP_F_RC2_MAGIC_TO_METH 109
|
|
|
|
# define EVP_F_RC5_CTRL 125
|
1998-12-21 10:52:47 +00:00
|
|
|
|
|
|
|
/* Reason codes. */
|
2015-01-22 03:29:12 +00:00
|
|
|
# define EVP_R_AES_IV_SETUP_FAILED 162
|
|
|
|
# define EVP_R_AES_KEY_SETUP_FAILED 143
|
|
|
|
# define EVP_R_ASN1_LIB 140
|
|
|
|
# define EVP_R_BAD_BLOCK_LENGTH 136
|
|
|
|
# define EVP_R_BAD_DECRYPT 100
|
|
|
|
# define EVP_R_BAD_KEY_LENGTH 137
|
|
|
|
# define EVP_R_BN_DECODE_ERROR 112
|
|
|
|
# define EVP_R_BN_PUBKEY_ERROR 113
|
|
|
|
# define EVP_R_BUFFER_TOO_SMALL 155
|
|
|
|
# define EVP_R_CAMELLIA_KEY_SETUP_FAILED 157
|
|
|
|
# define EVP_R_CIPHER_PARAMETER_ERROR 122
|
|
|
|
# define EVP_R_COMMAND_NOT_SUPPORTED 147
|
|
|
|
# define EVP_R_CTRL_NOT_IMPLEMENTED 132
|
|
|
|
# define EVP_R_CTRL_OPERATION_NOT_IMPLEMENTED 133
|
|
|
|
# define EVP_R_DATA_NOT_MULTIPLE_OF_BLOCK_LENGTH 138
|
|
|
|
# define EVP_R_DECODE_ERROR 114
|
|
|
|
# define EVP_R_DIFFERENT_KEY_TYPES 101
|
|
|
|
# define EVP_R_DIFFERENT_PARAMETERS 153
|
|
|
|
# define EVP_R_DISABLED_FOR_FIPS 163
|
|
|
|
# define EVP_R_ENCODE_ERROR 115
|
|
|
|
# define EVP_R_ERROR_LOADING_SECTION 165
|
|
|
|
# define EVP_R_ERROR_SETTING_FIPS_MODE 166
|
|
|
|
# define EVP_R_EVP_PBE_CIPHERINIT_ERROR 119
|
|
|
|
# define EVP_R_EXPECTING_AN_RSA_KEY 127
|
|
|
|
# define EVP_R_EXPECTING_A_DH_KEY 128
|
|
|
|
# define EVP_R_EXPECTING_A_DSA_KEY 129
|
|
|
|
# define EVP_R_EXPECTING_A_ECDSA_KEY 141
|
|
|
|
# define EVP_R_EXPECTING_A_EC_KEY 142
|
|
|
|
# define EVP_R_FIPS_MODE_NOT_SUPPORTED 167
|
|
|
|
# define EVP_R_INITIALIZATION_ERROR 134
|
|
|
|
# define EVP_R_INPUT_NOT_INITIALIZED 111
|
|
|
|
# define EVP_R_INVALID_DIGEST 152
|
|
|
|
# define EVP_R_INVALID_FIPS_MODE 168
|
|
|
|
# define EVP_R_INVALID_KEY_LENGTH 130
|
|
|
|
# define EVP_R_INVALID_OPERATION 148
|
|
|
|
# define EVP_R_IV_TOO_LARGE 102
|
|
|
|
# define EVP_R_KEYGEN_FAILURE 120
|
|
|
|
# define EVP_R_MESSAGE_DIGEST_IS_NULL 159
|
|
|
|
# define EVP_R_METHOD_NOT_SUPPORTED 144
|
|
|
|
# define EVP_R_MISSING_PARAMETERS 103
|
|
|
|
# define EVP_R_NO_CIPHER_SET 131
|
|
|
|
# define EVP_R_NO_DEFAULT_DIGEST 158
|
|
|
|
# define EVP_R_NO_DIGEST_SET 139
|
|
|
|
# define EVP_R_NO_DSA_PARAMETERS 116
|
|
|
|
# define EVP_R_NO_KEY_SET 154
|
|
|
|
# define EVP_R_NO_OPERATION_SET 149
|
|
|
|
# define EVP_R_NO_SIGN_FUNCTION_CONFIGURED 104
|
|
|
|
# define EVP_R_NO_VERIFY_FUNCTION_CONFIGURED 105
|
|
|
|
# define EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE 150
|
|
|
|
# define EVP_R_OPERATON_NOT_INITIALIZED 151
|
|
|
|
# define EVP_R_PKCS8_UNKNOWN_BROKEN_TYPE 117
|
|
|
|
# define EVP_R_PRIVATE_KEY_DECODE_ERROR 145
|
|
|
|
# define EVP_R_PRIVATE_KEY_ENCODE_ERROR 146
|
|
|
|
# define EVP_R_PUBLIC_KEY_NOT_RSA 106
|
|
|
|
# define EVP_R_TOO_LARGE 164
|
|
|
|
# define EVP_R_UNKNOWN_CIPHER 160
|
|
|
|
# define EVP_R_UNKNOWN_DIGEST 161
|
|
|
|
# define EVP_R_UNKNOWN_OPTION 169
|
|
|
|
# define EVP_R_UNKNOWN_PBE_ALGORITHM 121
|
|
|
|
# define EVP_R_UNSUPORTED_NUMBER_OF_ROUNDS 135
|
|
|
|
# define EVP_R_UNSUPPORTED_ALGORITHM 156
|
|
|
|
# define EVP_R_UNSUPPORTED_CIPHER 107
|
|
|
|
# define EVP_R_UNSUPPORTED_KEYLENGTH 123
|
|
|
|
# define EVP_R_UNSUPPORTED_KEY_DERIVATION_FUNCTION 124
|
|
|
|
# define EVP_R_UNSUPPORTED_KEY_SIZE 108
|
|
|
|
# define EVP_R_UNSUPPORTED_PRF 125
|
|
|
|
# define EVP_R_UNSUPPORTED_PRIVATE_KEY_ALGORITHM 118
|
|
|
|
# define EVP_R_UNSUPPORTED_SALT_TYPE 126
|
|
|
|
# define EVP_R_WRAP_MODE_NOT_ALLOWED 170
|
|
|
|
# define EVP_R_WRONG_FINAL_BLOCK_LENGTH 109
|
|
|
|
# define EVP_R_WRONG_PUBLIC_KEY_TYPE 110
|
1999-04-24 00:15:18 +00:00
|
|
|
|
1998-12-21 10:52:47 +00:00
|
|
|
#ifdef __cplusplus
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
#endif
|