]>
Commit | Line | Data |
---|---|---|
d02b48c6 | 1 | /* crypto/evp/evp.h */ |
58964a49 | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
d02b48c6 RE |
3 | * All rights reserved. |
4 | * | |
5 | * This package is an SSL implementation written | |
6 | * by Eric Young (eay@cryptsoft.com). | |
7 | * The implementation was written so as to conform with Netscapes SSL. | |
0f113f3e | 8 | * |
d02b48c6 RE |
9 | * This library is free for commercial and non-commercial use as long as |
10 | * the following conditions are aheared to. The following conditions | |
11 | * apply to all code found in this distribution, be it the RC4, RSA, | |
12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | |
13 | * included with this distribution is covered by the same copyright terms | |
14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | |
0f113f3e | 15 | * |
d02b48c6 RE |
16 | * Copyright remains Eric Young's, and as such any Copyright notices in |
17 | * the code are not to be removed. | |
18 | * If this package is used in a product, Eric Young should be given attribution | |
19 | * as the author of the parts of the library used. | |
20 | * This can be in the form of a textual message at program startup or | |
21 | * in documentation (online or textual) provided with the package. | |
0f113f3e | 22 | * |
d02b48c6 RE |
23 | * Redistribution and use in source and binary forms, with or without |
24 | * modification, are permitted provided that the following conditions | |
25 | * are met: | |
26 | * 1. Redistributions of source code must retain the copyright | |
27 | * notice, this list of conditions and the following disclaimer. | |
28 | * 2. Redistributions in binary form must reproduce the above copyright | |
29 | * notice, this list of conditions and the following disclaimer in the | |
30 | * documentation and/or other materials provided with the distribution. | |
31 | * 3. All advertising materials mentioning features or use of this software | |
32 | * must display the following acknowledgement: | |
33 | * "This product includes cryptographic software written by | |
34 | * Eric Young (eay@cryptsoft.com)" | |
35 | * The word 'cryptographic' can be left out if the rouines from the library | |
36 | * being used are not cryptographic related :-). | |
0f113f3e | 37 | * 4. If you include any Windows specific code (or a derivative thereof) from |
d02b48c6 RE |
38 | * the apps directory (application code) you must include an acknowledgement: |
39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | |
0f113f3e | 40 | * |
d02b48c6 RE |
41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND |
42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | |
43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | |
44 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE | |
45 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | |
46 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | |
47 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | |
48 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | |
49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | |
50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | |
51 | * SUCH DAMAGE. | |
0f113f3e | 52 | * |
d02b48c6 RE |
53 | * The licence and distribution terms for any publically available version or |
54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | |
55 | * copied and put under another distribution licence | |
56 | * [including the GNU Public Licence.] | |
57 | */ | |
58 | ||
59 | #ifndef HEADER_ENVELOPE_H | |
0f113f3e MC |
60 | # define HEADER_ENVELOPE_H |
61 | ||
62 | # ifdef OPENSSL_ALGORITHM_DEFINES | |
63 | # include <openssl/opensslconf.h> | |
64 | # else | |
65 | # define OPENSSL_ALGORITHM_DEFINES | |
66 | # include <openssl/opensslconf.h> | |
67 | # undef OPENSSL_ALGORITHM_DEFINES | |
68 | # endif | |
911ea946 | 69 | |
0f113f3e | 70 | # include <openssl/ossl_typ.h> |
d66ace9d | 71 | |
0f113f3e | 72 | # include <openssl/symhacks.h> |
87ebdd8a | 73 | |
a00ae6c4 | 74 | # include <openssl/bio.h> |
d02b48c6 | 75 | |
0f113f3e MC |
76 | # define EVP_MAX_MD_SIZE 64/* longest known is SHA512 */ |
77 | # define EVP_MAX_KEY_LENGTH 64 | |
78 | # define EVP_MAX_IV_LENGTH 16 | |
79 | # define EVP_MAX_BLOCK_LENGTH 32 | |
d02b48c6 | 80 | |
0f113f3e | 81 | # define PKCS5_SALT_LEN 8 |
b7d135b3 | 82 | /* Default PKCS#5 iteration count */ |
0f113f3e MC |
83 | # define PKCS5_DEFAULT_ITER 2048 |
84 | ||
85 | # include <openssl/objects.h> | |
86 | ||
87 | # define EVP_PK_RSA 0x0001 | |
88 | # define EVP_PK_DSA 0x0002 | |
89 | # define EVP_PK_DH 0x0004 | |
90 | # define EVP_PK_EC 0x0008 | |
91 | # define EVP_PKT_SIGN 0x0010 | |
92 | # define EVP_PKT_ENC 0x0020 | |
93 | # define EVP_PKT_EXCH 0x0040 | |
94 | # define EVP_PKS_RSA 0x0100 | |
95 | # define EVP_PKS_DSA 0x0200 | |
96 | # define EVP_PKS_EC 0x0400 | |
0f113f3e MC |
97 | |
98 | # define EVP_PKEY_NONE NID_undef | |
99 | # define EVP_PKEY_RSA NID_rsaEncryption | |
100 | # define EVP_PKEY_RSA2 NID_rsa | |
101 | # define EVP_PKEY_DSA NID_dsa | |
102 | # define EVP_PKEY_DSA1 NID_dsa_2 | |
103 | # define EVP_PKEY_DSA2 NID_dsaWithSHA | |
104 | # define EVP_PKEY_DSA3 NID_dsaWithSHA1 | |
105 | # define EVP_PKEY_DSA4 NID_dsaWithSHA1_2 | |
106 | # define EVP_PKEY_DH NID_dhKeyAgreement | |
107 | # define EVP_PKEY_DHX NID_dhpublicnumber | |
108 | # define EVP_PKEY_EC NID_X9_62_id_ecPublicKey | |
109 | # define EVP_PKEY_HMAC NID_hmac | |
110 | # define EVP_PKEY_CMAC NID_cmac | |
111 | ||
112 | #ifdef __cplusplus | |
82271cee RL |
113 | extern "C" { |
114 | #endif | |
115 | ||
0f113f3e MC |
116 | /* |
117 | * Type needs to be a bit field Sub-type needs to be for variations on the | |
118 | * method, as in, can it do arbitrary encryption.... | |
119 | */ | |
120 | struct evp_pkey_st { | |
121 | int type; | |
122 | int save_type; | |
123 | int references; | |
124 | const EVP_PKEY_ASN1_METHOD *ameth; | |
125 | ENGINE *engine; | |
126 | union { | |
127 | char *ptr; | |
128 | # ifndef OPENSSL_NO_RSA | |
129 | struct rsa_st *rsa; /* RSA */ | |
130 | # endif | |
131 | # ifndef OPENSSL_NO_DSA | |
132 | struct dsa_st *dsa; /* DSA */ | |
133 | # endif | |
134 | # ifndef OPENSSL_NO_DH | |
135 | struct dh_st *dh; /* DH */ | |
136 | # endif | |
137 | # ifndef OPENSSL_NO_EC | |
138 | struct ec_key_st *ec; /* ECC */ | |
139 | # endif | |
140 | } pkey; | |
141 | int save_parameters; | |
142 | STACK_OF(X509_ATTRIBUTE) *attributes; /* [ 0 ] */ | |
143 | } /* EVP_PKEY */ ; | |
144 | ||
145 | # define EVP_PKEY_MO_SIGN 0x0001 | |
146 | # define EVP_PKEY_MO_VERIFY 0x0002 | |
147 | # define EVP_PKEY_MO_ENCRYPT 0x0004 | |
148 | # define EVP_PKEY_MO_DECRYPT 0x0008 | |
149 | ||
150 | # ifndef EVP_MD | |
151 | struct env_md_st { | |
152 | int type; | |
153 | int pkey_type; | |
154 | int md_size; | |
155 | unsigned long flags; | |
156 | int (*init) (EVP_MD_CTX *ctx); | |
157 | int (*update) (EVP_MD_CTX *ctx, const void *data, size_t count); | |
158 | int (*final) (EVP_MD_CTX *ctx, unsigned char *md); | |
159 | int (*copy) (EVP_MD_CTX *to, const EVP_MD_CTX *from); | |
160 | int (*cleanup) (EVP_MD_CTX *ctx); | |
161 | /* FIXME: prototype these some day */ | |
162 | int (*sign) (int type, const unsigned char *m, unsigned int m_length, | |
163 | unsigned char *sigret, unsigned int *siglen, void *key); | |
164 | int (*verify) (int type, const unsigned char *m, unsigned int m_length, | |
165 | const unsigned char *sigbuf, unsigned int siglen, | |
166 | void *key); | |
167 | int required_pkey_type[5]; /* EVP_PKEY_xxx */ | |
168 | int block_size; | |
169 | int ctx_size; /* how big does the ctx->md_data need to be */ | |
170 | /* control function */ | |
171 | int (*md_ctrl) (EVP_MD_CTX *ctx, int cmd, int p1, void *p2); | |
172 | } /* EVP_MD */ ; | |
173 | ||
174 | typedef int evp_sign_method(int type, const unsigned char *m, | |
175 | unsigned int m_length, unsigned char *sigret, | |
176 | unsigned int *siglen, void *key); | |
177 | typedef int evp_verify_method(int type, const unsigned char *m, | |
178 | unsigned int m_length, | |
179 | const unsigned char *sigbuf, | |
180 | unsigned int siglen, void *key); | |
41a15c4f | 181 | |
dbd87ffc | 182 | /* digest can only handle a single block */ |
0f113f3e | 183 | # define EVP_MD_FLAG_ONESHOT 0x0001 |
dbd87ffc MC |
184 | |
185 | /* | |
186 | * digest is a "clone" digest used | |
187 | * which is a copy of an existing | |
188 | * one for a specific public key type. | |
189 | * EVP_dss1() etc | |
190 | */ | |
0f113f3e | 191 | # define EVP_MD_FLAG_PKEY_DIGEST 0x0002 |
ee1d9ec0 DSH |
192 | |
193 | /* Digest uses EVP_PKEY_METHOD for signing instead of MD specific signing */ | |
194 | ||
0f113f3e | 195 | # define EVP_MD_FLAG_PKEY_METHOD_SIGNATURE 0x0004 |
ee1d9ec0 | 196 | |
09659916 DSH |
197 | /* DigestAlgorithmIdentifier flags... */ |
198 | ||
0f113f3e | 199 | # define EVP_MD_FLAG_DIGALGID_MASK 0x0018 |
09659916 DSH |
200 | |
201 | /* NULL or absent parameter accepted. Use NULL */ | |
202 | ||
0f113f3e | 203 | # define EVP_MD_FLAG_DIGALGID_NULL 0x0000 |
09659916 DSH |
204 | |
205 | /* NULL or absent parameter accepted. Use NULL for PKCS#1 otherwise absent */ | |
206 | ||
0f113f3e | 207 | # define EVP_MD_FLAG_DIGALGID_ABSENT 0x0008 |
09659916 DSH |
208 | |
209 | /* Custom handling via ctrl */ | |
210 | ||
0f113f3e | 211 | # define EVP_MD_FLAG_DIGALGID_CUSTOM 0x0018 |
09659916 | 212 | |
dbd87ffc | 213 | /* Note if suitable for use in FIPS mode */ |
0f113f3e | 214 | # define EVP_MD_FLAG_FIPS 0x0400 |
7a4bd34a | 215 | |
09659916 DSH |
216 | /* Digest ctrls */ |
217 | ||
0f113f3e MC |
218 | # define EVP_MD_CTRL_DIGALGID 0x1 |
219 | # define EVP_MD_CTRL_MICALG 0x2 | |
09659916 DSH |
220 | |
221 | /* Minimum Algorithm specific ctrl value */ | |
222 | ||
0f113f3e | 223 | # define EVP_MD_CTRL_ALG_CTRL 0x1000 |
09659916 | 224 | |
0f113f3e | 225 | # define EVP_PKEY_NULL_method NULL,NULL,{0,0,0,0} |
d02b48c6 | 226 | |
0f113f3e MC |
227 | # ifndef OPENSSL_NO_DSA |
228 | # define EVP_PKEY_DSA_method (evp_sign_method *)DSA_sign, \ | |
229 | (evp_verify_method *)DSA_verify, \ | |
230 | {EVP_PKEY_DSA,EVP_PKEY_DSA2,EVP_PKEY_DSA3, \ | |
231 | EVP_PKEY_DSA4,0} | |
232 | # else | |
233 | # define EVP_PKEY_DSA_method EVP_PKEY_NULL_method | |
234 | # endif | |
d02b48c6 | 235 | |
10bf4fc2 | 236 | # ifndef OPENSSL_NO_EC |
0f113f3e MC |
237 | # define EVP_PKEY_ECDSA_method (evp_sign_method *)ECDSA_sign, \ |
238 | (evp_verify_method *)ECDSA_verify, \ | |
5488bb61 | 239 | {EVP_PKEY_EC,0,0,0} |
0f113f3e MC |
240 | # else |
241 | # define EVP_PKEY_ECDSA_method EVP_PKEY_NULL_method | |
242 | # endif | |
243 | ||
244 | # ifndef OPENSSL_NO_RSA | |
245 | # define EVP_PKEY_RSA_method (evp_sign_method *)RSA_sign, \ | |
246 | (evp_verify_method *)RSA_verify, \ | |
247 | {EVP_PKEY_RSA,EVP_PKEY_RSA2,0,0} | |
248 | # define EVP_PKEY_RSA_ASN1_OCTET_STRING_method \ | |
249 | (evp_sign_method *)RSA_sign_ASN1_OCTET_STRING, \ | |
250 | (evp_verify_method *)RSA_verify_ASN1_OCTET_STRING, \ | |
251 | {EVP_PKEY_RSA,EVP_PKEY_RSA2,0,0} | |
252 | # else | |
253 | # define EVP_PKEY_RSA_method EVP_PKEY_NULL_method | |
254 | # define EVP_PKEY_RSA_ASN1_OCTET_STRING_method EVP_PKEY_NULL_method | |
255 | # endif | |
256 | ||
257 | # endif /* !EVP_MD */ | |
258 | ||
259 | struct env_md_ctx_st { | |
260 | const EVP_MD *digest; | |
261 | ENGINE *engine; /* functional reference if 'digest' is | |
262 | * ENGINE-provided */ | |
263 | unsigned long flags; | |
264 | void *md_data; | |
265 | /* Public key context for sign/verify */ | |
266 | EVP_PKEY_CTX *pctx; | |
267 | /* Update function: usually copied from EVP_MD */ | |
268 | int (*update) (EVP_MD_CTX *ctx, const void *data, size_t count); | |
269 | } /* EVP_MD_CTX */ ; | |
26188931 BL |
270 | |
271 | /* values for EVP_MD_CTX flags */ | |
272 | ||
0f113f3e MC |
273 | # define EVP_MD_CTX_FLAG_ONESHOT 0x0001/* digest update will be |
274 | * called once only */ | |
275 | # define EVP_MD_CTX_FLAG_CLEANED 0x0002/* context has already been | |
276 | * cleaned */ | |
277 | # define EVP_MD_CTX_FLAG_REUSE 0x0004/* Don't free up ctx->md_data | |
278 | * in EVP_MD_CTX_cleanup */ | |
279 | /* | |
280 | * FIPS and pad options are ignored in 1.0.0, definitions are here so we | |
281 | * don't accidentally reuse the values for other purposes. | |
43e12b6f | 282 | */ |
d02b48c6 | 283 | |
0f113f3e MC |
284 | # define EVP_MD_CTX_FLAG_NON_FIPS_ALLOW 0x0008/* Allow use of non FIPS |
285 | * digest in FIPS mode */ | |
09659916 | 286 | |
0f113f3e MC |
287 | /* |
288 | * The following PAD options are also currently ignored in 1.0.0, digest | |
43e12b6f DSH |
289 | * parameters are handled through EVP_DigestSign*() and EVP_DigestVerify*() |
290 | * instead. | |
291 | */ | |
0f113f3e MC |
292 | # define EVP_MD_CTX_FLAG_PAD_MASK 0xF0/* RSA mode to use */ |
293 | # define EVP_MD_CTX_FLAG_PAD_PKCS1 0x00/* PKCS#1 v1.5 mode */ | |
294 | # define EVP_MD_CTX_FLAG_PAD_X931 0x10/* X9.31 mode */ | |
295 | # define EVP_MD_CTX_FLAG_PAD_PSS 0x20/* PSS mode */ | |
09659916 | 296 | |
0f113f3e MC |
297 | # define EVP_MD_CTX_FLAG_NO_INIT 0x0100/* Don't initialize md_data */ |
298 | /* | |
299 | * Some functions such as EVP_DigestSign only finalise copies of internal | |
afa23c46 DSH |
300 | * contexts so additional data can be included after the finalisation call. |
301 | * This is inefficient if this functionality is not required: it is disabled | |
302 | * if the following flag is set. | |
303 | */ | |
0f113f3e MC |
304 | # define EVP_MD_CTX_FLAG_FINALISE 0x0200 |
305 | ||
306 | struct evp_cipher_st { | |
307 | int nid; | |
308 | int block_size; | |
309 | /* Default value for variable length ciphers */ | |
310 | int key_len; | |
311 | int iv_len; | |
312 | /* Various flags */ | |
313 | unsigned long flags; | |
314 | /* init key */ | |
315 | int (*init) (EVP_CIPHER_CTX *ctx, const unsigned char *key, | |
316 | const unsigned char *iv, int enc); | |
317 | /* encrypt/decrypt data */ | |
318 | int (*do_cipher) (EVP_CIPHER_CTX *ctx, unsigned char *out, | |
319 | const unsigned char *in, size_t inl); | |
320 | /* cleanup ctx */ | |
321 | int (*cleanup) (EVP_CIPHER_CTX *); | |
322 | /* how big ctx->cipher_data needs to be */ | |
323 | int ctx_size; | |
324 | /* Populate a ASN1_TYPE with parameters */ | |
325 | int (*set_asn1_parameters) (EVP_CIPHER_CTX *, ASN1_TYPE *); | |
326 | /* Get parameters from a ASN1_TYPE */ | |
327 | int (*get_asn1_parameters) (EVP_CIPHER_CTX *, ASN1_TYPE *); | |
328 | /* Miscellaneous operations */ | |
329 | int (*ctrl) (EVP_CIPHER_CTX *, int type, int arg, void *ptr); | |
330 | /* Application data */ | |
331 | void *app_data; | |
332 | } /* EVP_CIPHER */ ; | |
7f060601 DSH |
333 | |
334 | /* Values for cipher flags */ | |
335 | ||
360370d9 | 336 | /* Modes for ciphers */ |
7f060601 | 337 | |
0f113f3e MC |
338 | # define EVP_CIPH_STREAM_CIPHER 0x0 |
339 | # define EVP_CIPH_ECB_MODE 0x1 | |
340 | # define EVP_CIPH_CBC_MODE 0x2 | |
341 | # define EVP_CIPH_CFB_MODE 0x3 | |
342 | # define EVP_CIPH_OFB_MODE 0x4 | |
343 | # define EVP_CIPH_CTR_MODE 0x5 | |
344 | # define EVP_CIPH_GCM_MODE 0x6 | |
345 | # define EVP_CIPH_CCM_MODE 0x7 | |
346 | # define EVP_CIPH_XTS_MODE 0x10001 | |
347 | # define EVP_CIPH_WRAP_MODE 0x10002 | |
348 | # define EVP_CIPH_OCB_MODE 0x10003 | |
349 | # define EVP_CIPH_MODE 0xF0007 | |
7f060601 | 350 | /* Set if variable length cipher */ |
0f113f3e | 351 | # define EVP_CIPH_VARIABLE_LENGTH 0x8 |
360370d9 | 352 | /* Set if the iv handling should be done by the cipher itself */ |
0f113f3e | 353 | # define EVP_CIPH_CUSTOM_IV 0x10 |
360370d9 | 354 | /* Set if the cipher's init() function should be called if key is NULL */ |
0f113f3e | 355 | # define EVP_CIPH_ALWAYS_CALL_INIT 0x20 |
57ae2e24 | 356 | /* Call ctrl() to init cipher parameters */ |
0f113f3e | 357 | # define EVP_CIPH_CTRL_INIT 0x40 |
57ae2e24 | 358 | /* Don't use standard key length function */ |
0f113f3e | 359 | # define EVP_CIPH_CUSTOM_KEY_LENGTH 0x80 |
f2e5ca84 | 360 | /* Don't use standard block padding */ |
0f113f3e | 361 | # define EVP_CIPH_NO_PADDING 0x100 |
216659eb | 362 | /* cipher handles random key generation */ |
0f113f3e | 363 | # define EVP_CIPH_RAND_KEY 0x200 |
c2bf7208 | 364 | /* cipher has its own additional copying logic */ |
0f113f3e | 365 | # define EVP_CIPH_CUSTOM_COPY 0x400 |
79cfc3ac | 366 | /* Allow use default ASN1 get/set iv */ |
0f113f3e | 367 | # define EVP_CIPH_FLAG_DEFAULT_ASN1 0x1000 |
79cfc3ac | 368 | /* Buffer length in bits not bytes: CFB1 mode only */ |
0f113f3e | 369 | # define EVP_CIPH_FLAG_LENGTH_BITS 0x2000 |
7a4bd34a | 370 | /* Note if suitable for use in FIPS mode */ |
0f113f3e | 371 | # define EVP_CIPH_FLAG_FIPS 0x4000 |
7a4bd34a | 372 | /* Allow non FIPS cipher in FIPS mode */ |
0f113f3e MC |
373 | # define EVP_CIPH_FLAG_NON_FIPS_ALLOW 0x8000 |
374 | /* | |
375 | * Cipher handles any and all padding logic as well as finalisation. | |
3da0ca79 | 376 | */ |
0f113f3e MC |
377 | # define EVP_CIPH_FLAG_CUSTOM_CIPHER 0x100000 |
378 | # define EVP_CIPH_FLAG_AEAD_CIPHER 0x200000 | |
379 | # define EVP_CIPH_FLAG_TLS1_1_MULTIBLOCK 0x400000 | |
7f060601 | 380 | |
0f113f3e MC |
381 | /* |
382 | * Cipher context flag to indicate we can handle wrap mode: if allowed in | |
383 | * older applications it could overflow buffers. | |
97cf1f6c DSH |
384 | */ |
385 | ||
0f113f3e | 386 | # define EVP_CIPHER_CTX_FLAG_WRAP_ALLOW 0x1 |
97cf1f6c | 387 | |
57ae2e24 DSH |
388 | /* ctrl() values */ |
389 | ||
0f113f3e MC |
390 | # define EVP_CTRL_INIT 0x0 |
391 | # define EVP_CTRL_SET_KEY_LENGTH 0x1 | |
392 | # define EVP_CTRL_GET_RC2_KEY_BITS 0x2 | |
393 | # define EVP_CTRL_SET_RC2_KEY_BITS 0x3 | |
394 | # define EVP_CTRL_GET_RC5_ROUNDS 0x4 | |
395 | # define EVP_CTRL_SET_RC5_ROUNDS 0x5 | |
396 | # define EVP_CTRL_RAND_KEY 0x6 | |
397 | # define EVP_CTRL_PBE_PRF_NID 0x7 | |
398 | # define EVP_CTRL_COPY 0x8 | |
e640fa02 MC |
399 | # define EVP_CTRL_AEAD_SET_IVLEN 0x9 |
400 | # define EVP_CTRL_AEAD_GET_TAG 0x10 | |
401 | # define EVP_CTRL_AEAD_SET_TAG 0x11 | |
402 | # define EVP_CTRL_GCM_SET_IVLEN EVP_CTRL_AEAD_SET_IVLEN | |
403 | # define EVP_CTRL_GCM_GET_TAG EVP_CTRL_AEAD_GET_TAG | |
404 | # define EVP_CTRL_GCM_SET_TAG EVP_CTRL_AEAD_SET_TAG | |
0f113f3e MC |
405 | # define EVP_CTRL_GCM_SET_IV_FIXED 0x12 |
406 | # define EVP_CTRL_GCM_IV_GEN 0x13 | |
e640fa02 MC |
407 | # define EVP_CTRL_CCM_SET_IVLEN EVP_CTRL_AEAD_SET_IVLEN |
408 | # define EVP_CTRL_CCM_GET_TAG EVP_CTRL_AEAD_GET_TAG | |
409 | # define EVP_CTRL_CCM_SET_TAG EVP_CTRL_AEAD_SET_TAG | |
0f113f3e MC |
410 | # define EVP_CTRL_CCM_SET_L 0x14 |
411 | # define EVP_CTRL_CCM_SET_MSGLEN 0x15 | |
412 | /* | |
413 | * AEAD cipher deduces payload length and returns number of bytes required to | |
414 | * store MAC and eventual padding. Subsequent call to EVP_Cipher even | |
415 | * appends/verifies MAC. | |
a355cf9b | 416 | */ |
0f113f3e | 417 | # define EVP_CTRL_AEAD_TLS1_AAD 0x16 |
a355cf9b | 418 | /* Used by composite AEAD ciphers, no-op in GCM, CCM... */ |
0f113f3e | 419 | # define EVP_CTRL_AEAD_SET_MAC_KEY 0x17 |
28dd49fa | 420 | /* Set the GCM invocation field, decrypt only */ |
0f113f3e | 421 | # define EVP_CTRL_GCM_SET_IV_INV 0x18 |
28dd49fa | 422 | |
0f113f3e MC |
423 | # define EVP_CTRL_TLS1_1_MULTIBLOCK_AAD 0x19 |
424 | # define EVP_CTRL_TLS1_1_MULTIBLOCK_ENCRYPT 0x1a | |
425 | # define EVP_CTRL_TLS1_1_MULTIBLOCK_DECRYPT 0x1b | |
426 | # define EVP_CTRL_TLS1_1_MULTIBLOCK_MAX_BUFSIZE 0x1c | |
b1de640f | 427 | |
c8269881 MC |
428 | /* RFC 5246 defines additional data to be 13 bytes in length */ |
429 | # define EVP_AEAD_TLS1_AAD_LEN 13 | |
430 | ||
b1de640f | 431 | typedef struct { |
0f113f3e MC |
432 | unsigned char *out; |
433 | const unsigned char *inp; | |
434 | size_t len; | |
435 | unsigned int interleave; | |
b1de640f AP |
436 | } EVP_CTRL_TLS1_1_MULTIBLOCK_PARAM; |
437 | ||
28dd49fa DSH |
438 | /* GCM TLS constants */ |
439 | /* Length of fixed part of IV derived from PRF */ | |
0f113f3e | 440 | # define EVP_GCM_TLS_FIXED_IV_LEN 4 |
28dd49fa | 441 | /* Length of explicit part of IV part of TLS records */ |
0f113f3e | 442 | # define EVP_GCM_TLS_EXPLICIT_IV_LEN 8 |
28dd49fa | 443 | /* Length of tag for TLS */ |
0f113f3e MC |
444 | # define EVP_GCM_TLS_TAG_LEN 16 |
445 | ||
446 | typedef struct evp_cipher_info_st { | |
447 | const EVP_CIPHER *cipher; | |
448 | unsigned char iv[EVP_MAX_IV_LENGTH]; | |
449 | } EVP_CIPHER_INFO; | |
450 | ||
451 | struct evp_cipher_ctx_st { | |
452 | const EVP_CIPHER *cipher; | |
453 | ENGINE *engine; /* functional reference if 'cipher' is | |
454 | * ENGINE-provided */ | |
455 | int encrypt; /* encrypt or decrypt */ | |
456 | int buf_len; /* number we have left */ | |
457 | unsigned char oiv[EVP_MAX_IV_LENGTH]; /* original iv */ | |
458 | unsigned char iv[EVP_MAX_IV_LENGTH]; /* working iv */ | |
459 | unsigned char buf[EVP_MAX_BLOCK_LENGTH]; /* saved partial block */ | |
460 | int num; /* used by cfb/ofb/ctr mode */ | |
461 | void *app_data; /* application stuff */ | |
462 | int key_len; /* May change for variable length cipher */ | |
463 | unsigned long flags; /* Various flags */ | |
464 | void *cipher_data; /* per EVP data */ | |
465 | int final_used; | |
466 | int block_mask; | |
467 | unsigned char final[EVP_MAX_BLOCK_LENGTH]; /* possible final block */ | |
468 | } /* EVP_CIPHER_CTX */ ; | |
469 | ||
470 | typedef struct evp_Encode_Ctx_st { | |
471 | /* number saved in a partial encode/decode */ | |
472 | int num; | |
473 | /* | |
474 | * The length is either the output line length (in input bytes) or the | |
475 | * shortest input line length that is ok. Once decoding begins, the | |
476 | * length is adjusted up each time a longer line is decoded | |
477 | */ | |
478 | int length; | |
479 | /* data to encode */ | |
480 | unsigned char enc_data[80]; | |
481 | /* number read on current line */ | |
482 | int line_num; | |
483 | int expect_nl; | |
484 | } EVP_ENCODE_CTX; | |
d02b48c6 | 485 | |
cfcefcbe | 486 | /* Password based encryption function */ |
0f113f3e MC |
487 | typedef int (EVP_PBE_KEYGEN) (EVP_CIPHER_CTX *ctx, const char *pass, |
488 | int passlen, ASN1_TYPE *param, | |
489 | const EVP_CIPHER *cipher, const EVP_MD *md, | |
490 | int en_de); | |
491 | ||
492 | # ifndef OPENSSL_NO_RSA | |
493 | # define EVP_PKEY_assign_RSA(pkey,rsa) EVP_PKEY_assign((pkey),EVP_PKEY_RSA,\ | |
494 | (char *)(rsa)) | |
495 | # endif | |
9ef9e785 | 496 | |
0f113f3e MC |
497 | # ifndef OPENSSL_NO_DSA |
498 | # define EVP_PKEY_assign_DSA(pkey,dsa) EVP_PKEY_assign((pkey),EVP_PKEY_DSA,\ | |
499 | (char *)(dsa)) | |
500 | # endif | |
9ef9e785 | 501 | |
0f113f3e MC |
502 | # ifndef OPENSSL_NO_DH |
503 | # define EVP_PKEY_assign_DH(pkey,dh) EVP_PKEY_assign((pkey),EVP_PKEY_DH,\ | |
504 | (char *)(dh)) | |
505 | # endif | |
d02b48c6 | 506 | |
0f113f3e MC |
507 | # ifndef OPENSSL_NO_EC |
508 | # define EVP_PKEY_assign_EC_KEY(pkey,eckey) EVP_PKEY_assign((pkey),EVP_PKEY_EC,\ | |
14a7cfb3 | 509 | (char *)(eckey)) |
0f113f3e | 510 | # endif |
4d94ae00 | 511 | |
d02b48c6 | 512 | /* Add some extra combinations */ |
0f113f3e MC |
513 | # define EVP_get_digestbynid(a) EVP_get_digestbyname(OBJ_nid2sn(a)) |
514 | # define EVP_get_digestbyobj(a) EVP_get_digestbynid(OBJ_obj2nid(a)) | |
515 | # define EVP_get_cipherbynid(a) EVP_get_cipherbyname(OBJ_nid2sn(a)) | |
516 | # define EVP_get_cipherbyobj(a) EVP_get_cipherbynid(OBJ_obj2nid(a)) | |
d02b48c6 | 517 | |
7a4bd34a | 518 | /* Macros to reduce FIPS dependencies: do NOT use in applications */ |
0f113f3e MC |
519 | # define M_EVP_MD_size(e) ((e)->md_size) |
520 | # define M_EVP_MD_block_size(e) ((e)->block_size) | |
521 | # define M_EVP_MD_CTX_set_flags(ctx,flgs) ((ctx)->flags|=(flgs)) | |
522 | # define M_EVP_MD_CTX_clear_flags(ctx,flgs) ((ctx)->flags&=~(flgs)) | |
523 | # define M_EVP_MD_CTX_test_flags(ctx,flgs) ((ctx)->flags&(flgs)) | |
524 | # define M_EVP_MD_type(e) ((e)->type) | |
525 | # define M_EVP_MD_CTX_type(e) M_EVP_MD_type(M_EVP_MD_CTX_md(e)) | |
526 | # define M_EVP_MD_CTX_md(e) ((e)->digest) | |
527 | ||
528 | # define M_EVP_CIPHER_nid(e) ((e)->nid) | |
529 | # define M_EVP_CIPHER_CTX_iv_length(e) ((e)->cipher->iv_len) | |
530 | # define M_EVP_CIPHER_CTX_flags(e) ((e)->cipher->flags) | |
531 | # define M_EVP_CIPHER_CTX_block_size(e) ((e)->cipher->block_size) | |
532 | # define M_EVP_CIPHER_CTX_cipher(e) ((e)->cipher) | |
533 | # define M_EVP_CIPHER_CTX_mode(e) (M_EVP_CIPHER_CTX_flags(e) & EVP_CIPH_MODE) | |
534 | ||
535 | # define M_EVP_CIPHER_CTX_set_flags(ctx,flgs) ((ctx)->flags|=(flgs)) | |
536 | ||
537 | # define M_EVP_EncryptInit(ctx,ciph,key,iv) \ | |
538 | (EVP_CipherInit(ctx,ciph,key,iv,1)) | |
539 | # define M_EVP_EncryptInit_ex(ctx,ciph,impl,key,iv) \ | |
540 | (EVP_CipherInit_ex(ctx,ciph,impl,key,iv,1)) | |
541 | # define M_EVP_DecryptInit(ctx,ciph,key,iv) \ | |
542 | (EVP_CipherInit(ctx,ciph,key,iv,0)) | |
543 | # define M_EVP_DecryptInit_ex(ctx,ciph,impl,key,iv) \ | |
544 | (EVP_CipherInit_ex(ctx,ciph,impl,key,iv,0)) | |
399aa6b5 | 545 | |
7806f3dd | 546 | int EVP_MD_type(const EVP_MD *md); |
0f113f3e MC |
547 | # define EVP_MD_nid(e) EVP_MD_type(e) |
548 | # define EVP_MD_name(e) OBJ_nid2sn(EVP_MD_nid(e)) | |
549 | int EVP_MD_pkey_type(const EVP_MD *md); | |
6343829a GT |
550 | int EVP_MD_size(const EVP_MD *md); |
551 | int EVP_MD_block_size(const EVP_MD *md); | |
e5fa864f | 552 | unsigned long EVP_MD_flags(const EVP_MD *md); |
58964a49 | 553 | |
7806f3dd | 554 | const EVP_MD *EVP_MD_CTX_md(const EVP_MD_CTX *ctx); |
0f113f3e MC |
555 | # define EVP_MD_CTX_size(e) EVP_MD_size(EVP_MD_CTX_md(e)) |
556 | # define EVP_MD_CTX_block_size(e) EVP_MD_block_size(EVP_MD_CTX_md(e)) | |
557 | # define EVP_MD_CTX_type(e) EVP_MD_type(EVP_MD_CTX_md(e)) | |
d02b48c6 | 558 | |
7806f3dd | 559 | int EVP_CIPHER_nid(const EVP_CIPHER *cipher); |
0f113f3e | 560 | # define EVP_CIPHER_name(e) OBJ_nid2sn(EVP_CIPHER_nid(e)) |
6343829a GT |
561 | int EVP_CIPHER_block_size(const EVP_CIPHER *cipher); |
562 | int EVP_CIPHER_key_length(const EVP_CIPHER *cipher); | |
563 | int EVP_CIPHER_iv_length(const EVP_CIPHER *cipher); | |
7806f3dd | 564 | unsigned long EVP_CIPHER_flags(const EVP_CIPHER *cipher); |
0f113f3e | 565 | # define EVP_CIPHER_mode(e) (EVP_CIPHER_flags(e) & EVP_CIPH_MODE) |
7806f3dd | 566 | |
0f113f3e | 567 | const EVP_CIPHER *EVP_CIPHER_CTX_cipher(const EVP_CIPHER_CTX *ctx); |
7806f3dd | 568 | int EVP_CIPHER_CTX_nid(const EVP_CIPHER_CTX *ctx); |
6343829a GT |
569 | int EVP_CIPHER_CTX_block_size(const EVP_CIPHER_CTX *ctx); |
570 | int EVP_CIPHER_CTX_key_length(const EVP_CIPHER_CTX *ctx); | |
571 | int EVP_CIPHER_CTX_iv_length(const EVP_CIPHER_CTX *ctx); | |
c2bf7208 | 572 | int EVP_CIPHER_CTX_copy(EVP_CIPHER_CTX *out, const EVP_CIPHER_CTX *in); |
0f113f3e | 573 | void *EVP_CIPHER_CTX_get_app_data(const EVP_CIPHER_CTX *ctx); |
7806f3dd | 574 | void EVP_CIPHER_CTX_set_app_data(EVP_CIPHER_CTX *ctx, void *data); |
0f113f3e | 575 | # define EVP_CIPHER_CTX_type(c) EVP_CIPHER_type(EVP_CIPHER_CTX_cipher(c)) |
7806f3dd | 576 | unsigned long EVP_CIPHER_CTX_flags(const EVP_CIPHER_CTX *ctx); |
0f113f3e MC |
577 | # define EVP_CIPHER_CTX_mode(e) (EVP_CIPHER_CTX_flags(e) & EVP_CIPH_MODE) |
578 | ||
579 | # define EVP_ENCODE_LENGTH(l) (((l+2)/3*4)+(l/48+1)*2+80) | |
580 | # define EVP_DECODE_LENGTH(l) ((l+3)/4*3+80) | |
581 | ||
582 | # define EVP_SignInit_ex(a,b,c) EVP_DigestInit_ex(a,b,c) | |
583 | # define EVP_SignInit(a,b) EVP_DigestInit(a,b) | |
584 | # define EVP_SignUpdate(a,b,c) EVP_DigestUpdate(a,b,c) | |
585 | # define EVP_VerifyInit_ex(a,b,c) EVP_DigestInit_ex(a,b,c) | |
586 | # define EVP_VerifyInit(a,b) EVP_DigestInit(a,b) | |
587 | # define EVP_VerifyUpdate(a,b,c) EVP_DigestUpdate(a,b,c) | |
588 | # define EVP_OpenUpdate(a,b,c,d,e) EVP_DecryptUpdate(a,b,c,d,e) | |
589 | # define EVP_SealUpdate(a,b,c,d,e) EVP_EncryptUpdate(a,b,c,d,e) | |
590 | # define EVP_DigestSignUpdate(a,b,c) EVP_DigestUpdate(a,b,c) | |
591 | # define EVP_DigestVerifyUpdate(a,b,c) EVP_DigestUpdate(a,b,c) | |
592 | ||
593 | # ifdef CONST_STRICT | |
594 | void BIO_set_md(BIO *, const EVP_MD *md); | |
595 | # else | |
596 | # define BIO_set_md(b,md) BIO_ctrl(b,BIO_C_SET_MD,0,(char *)md) | |
597 | # endif | |
598 | # define BIO_get_md(b,mdp) BIO_ctrl(b,BIO_C_GET_MD,0,(char *)mdp) | |
599 | # define BIO_get_md_ctx(b,mdcp) BIO_ctrl(b,BIO_C_GET_MD_CTX,0,(char *)mdcp) | |
600 | # define BIO_set_md_ctx(b,mdcp) BIO_ctrl(b,BIO_C_SET_MD_CTX,0,(char *)mdcp) | |
601 | # define BIO_get_cipher_status(b) BIO_ctrl(b,BIO_C_GET_CIPHER_STATUS,0,NULL) | |
602 | # define BIO_get_cipher_ctx(b,c_pp) BIO_ctrl(b,BIO_C_GET_CIPHER_CTX,0,(char *)c_pp) | |
d02b48c6 | 603 | |
ae551760 | 604 | /*__owur*/ int EVP_Cipher(EVP_CIPHER_CTX *c, |
0f113f3e MC |
605 | unsigned char *out, |
606 | const unsigned char *in, unsigned int inl); | |
607 | ||
608 | # define EVP_add_cipher_alias(n,alias) \ | |
609 | OBJ_NAME_add((alias),OBJ_NAME_TYPE_CIPHER_METH|OBJ_NAME_ALIAS,(n)) | |
610 | # define EVP_add_digest_alias(n,alias) \ | |
611 | OBJ_NAME_add((alias),OBJ_NAME_TYPE_MD_METH|OBJ_NAME_ALIAS,(n)) | |
612 | # define EVP_delete_cipher_alias(alias) \ | |
613 | OBJ_NAME_remove(alias,OBJ_NAME_TYPE_CIPHER_METH|OBJ_NAME_ALIAS); | |
614 | # define EVP_delete_digest_alias(alias) \ | |
615 | OBJ_NAME_remove(alias,OBJ_NAME_TYPE_MD_METH|OBJ_NAME_ALIAS); | |
616 | ||
617 | void EVP_MD_CTX_init(EVP_MD_CTX *ctx); | |
618 | int EVP_MD_CTX_cleanup(EVP_MD_CTX *ctx); | |
dbad1690 | 619 | EVP_MD_CTX *EVP_MD_CTX_create(void); |
0f113f3e MC |
620 | void EVP_MD_CTX_destroy(EVP_MD_CTX *ctx); |
621 | /*__owur*/ int EVP_MD_CTX_copy_ex(EVP_MD_CTX *out, const EVP_MD_CTX *in); | |
622 | void EVP_MD_CTX_set_flags(EVP_MD_CTX *ctx, int flags); | |
623 | void EVP_MD_CTX_clear_flags(EVP_MD_CTX *ctx, int flags); | |
624 | int EVP_MD_CTX_test_flags(const EVP_MD_CTX *ctx, int flags); | |
625 | /*__owur*/ int EVP_DigestInit_ex(EVP_MD_CTX *ctx, const EVP_MD *type, | |
626 | ENGINE *impl); | |
627 | /*__owur*/ int EVP_DigestUpdate(EVP_MD_CTX *ctx, const void *d, | |
628 | size_t cnt); | |
629 | /*__owur*/ int EVP_DigestFinal_ex(EVP_MD_CTX *ctx, unsigned char *md, | |
630 | unsigned int *s); | |
631 | /*__owur*/ int EVP_Digest(const void *data, size_t count, | |
632 | unsigned char *md, unsigned int *size, | |
633 | const EVP_MD *type, ENGINE *impl); | |
634 | ||
635 | /*__owur*/ int EVP_MD_CTX_copy(EVP_MD_CTX *out, const EVP_MD_CTX *in); | |
636 | /*__owur*/ int EVP_DigestInit(EVP_MD_CTX *ctx, const EVP_MD *type); | |
637 | __owur int EVP_DigestFinal(EVP_MD_CTX *ctx, unsigned char *md, | |
638 | unsigned int *s); | |
639 | ||
640 | int EVP_read_pw_string(char *buf, int length, const char *prompt, int verify); | |
641 | int EVP_read_pw_string_min(char *buf, int minlen, int maxlen, | |
642 | const char *prompt, int verify); | |
643 | void EVP_set_pw_prompt(const char *prompt); | |
644 | char *EVP_get_pw_prompt(void); | |
645 | ||
646 | __owur int EVP_BytesToKey(const EVP_CIPHER *type, const EVP_MD *md, | |
647 | const unsigned char *salt, | |
648 | const unsigned char *data, int datal, int count, | |
649 | unsigned char *key, unsigned char *iv); | |
650 | ||
651 | void EVP_CIPHER_CTX_set_flags(EVP_CIPHER_CTX *ctx, int flags); | |
652 | void EVP_CIPHER_CTX_clear_flags(EVP_CIPHER_CTX *ctx, int flags); | |
653 | int EVP_CIPHER_CTX_test_flags(const EVP_CIPHER_CTX *ctx, int flags); | |
654 | ||
655 | __owur int EVP_EncryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, | |
656 | const unsigned char *key, const unsigned char *iv); | |
657 | /*__owur*/ int EVP_EncryptInit_ex(EVP_CIPHER_CTX *ctx, | |
658 | const EVP_CIPHER *cipher, ENGINE *impl, | |
659 | const unsigned char *key, | |
660 | const unsigned char *iv); | |
661 | /*__owur*/ int EVP_EncryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, | |
662 | int *outl, const unsigned char *in, int inl); | |
663 | /*__owur*/ int EVP_EncryptFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *out, | |
664 | int *outl); | |
665 | /*__owur*/ int EVP_EncryptFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, | |
666 | int *outl); | |
667 | ||
668 | __owur int EVP_DecryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, | |
669 | const unsigned char *key, const unsigned char *iv); | |
670 | /*__owur*/ int EVP_DecryptInit_ex(EVP_CIPHER_CTX *ctx, | |
671 | const EVP_CIPHER *cipher, ENGINE *impl, | |
672 | const unsigned char *key, | |
673 | const unsigned char *iv); | |
674 | /*__owur*/ int EVP_DecryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, | |
675 | int *outl, const unsigned char *in, int inl); | |
676 | __owur int EVP_DecryptFinal(EVP_CIPHER_CTX *ctx, unsigned char *outm, | |
677 | int *outl); | |
678 | /*__owur*/ int EVP_DecryptFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *outm, | |
679 | int *outl); | |
680 | ||
681 | __owur int EVP_CipherInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, | |
682 | const unsigned char *key, const unsigned char *iv, | |
683 | int enc); | |
684 | /*__owur*/ int EVP_CipherInit_ex(EVP_CIPHER_CTX *ctx, | |
685 | const EVP_CIPHER *cipher, ENGINE *impl, | |
686 | const unsigned char *key, | |
687 | const unsigned char *iv, int enc); | |
688 | __owur int EVP_CipherUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, | |
689 | int *outl, const unsigned char *in, int inl); | |
690 | __owur int EVP_CipherFinal(EVP_CIPHER_CTX *ctx, unsigned char *outm, | |
691 | int *outl); | |
692 | __owur int EVP_CipherFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *outm, | |
693 | int *outl); | |
694 | ||
695 | __owur int EVP_SignFinal(EVP_MD_CTX *ctx, unsigned char *md, unsigned int *s, | |
696 | EVP_PKEY *pkey); | |
697 | ||
698 | __owur int EVP_VerifyFinal(EVP_MD_CTX *ctx, const unsigned char *sigbuf, | |
699 | unsigned int siglen, EVP_PKEY *pkey); | |
700 | ||
701 | /*__owur*/ int EVP_DigestSignInit(EVP_MD_CTX *ctx, EVP_PKEY_CTX **pctx, | |
702 | const EVP_MD *type, ENGINE *e, | |
703 | EVP_PKEY *pkey); | |
704 | __owur int EVP_DigestSignFinal(EVP_MD_CTX *ctx, unsigned char *sigret, | |
705 | size_t *siglen); | |
706 | ||
707 | __owur int EVP_DigestVerifyInit(EVP_MD_CTX *ctx, EVP_PKEY_CTX **pctx, | |
708 | const EVP_MD *type, ENGINE *e, | |
709 | EVP_PKEY *pkey); | |
710 | __owur int EVP_DigestVerifyFinal(EVP_MD_CTX *ctx, const unsigned char *sig, | |
711 | size_t siglen); | |
712 | ||
713 | __owur int EVP_OpenInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *type, | |
714 | const unsigned char *ek, int ekl, | |
715 | const unsigned char *iv, EVP_PKEY *priv); | |
716 | __owur int EVP_OpenFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl); | |
717 | ||
718 | __owur int EVP_SealInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *type, | |
719 | unsigned char **ek, int *ekl, unsigned char *iv, | |
720 | EVP_PKEY **pubk, int npubk); | |
721 | __owur int EVP_SealFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl); | |
722 | ||
723 | void EVP_EncodeInit(EVP_ENCODE_CTX *ctx); | |
724 | void EVP_EncodeUpdate(EVP_ENCODE_CTX *ctx, unsigned char *out, int *outl, | |
725 | const unsigned char *in, int inl); | |
726 | void EVP_EncodeFinal(EVP_ENCODE_CTX *ctx, unsigned char *out, int *outl); | |
727 | int EVP_EncodeBlock(unsigned char *t, const unsigned char *f, int n); | |
728 | ||
729 | void EVP_DecodeInit(EVP_ENCODE_CTX *ctx); | |
730 | int EVP_DecodeUpdate(EVP_ENCODE_CTX *ctx, unsigned char *out, int *outl, | |
731 | const unsigned char *in, int inl); | |
732 | int EVP_DecodeFinal(EVP_ENCODE_CTX *ctx, unsigned | |
733 | char *out, int *outl); | |
734 | int EVP_DecodeBlock(unsigned char *t, const unsigned char *f, int n); | |
d02b48c6 | 735 | |
58964a49 | 736 | void EVP_CIPHER_CTX_init(EVP_CIPHER_CTX *a); |
be06a934 | 737 | int EVP_CIPHER_CTX_cleanup(EVP_CIPHER_CTX *a); |
b40228a6 DSH |
738 | EVP_CIPHER_CTX *EVP_CIPHER_CTX_new(void); |
739 | void EVP_CIPHER_CTX_free(EVP_CIPHER_CTX *a); | |
6343829a | 740 | int EVP_CIPHER_CTX_set_key_length(EVP_CIPHER_CTX *x, int keylen); |
f2e5ca84 | 741 | int EVP_CIPHER_CTX_set_padding(EVP_CIPHER_CTX *c, int pad); |
49528751 | 742 | int EVP_CIPHER_CTX_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr); |
216659eb | 743 | int EVP_CIPHER_CTX_rand_key(EVP_CIPHER_CTX *ctx, unsigned char *key); |
d02b48c6 | 744 | |
d02b48c6 RE |
745 | BIO_METHOD *BIO_f_md(void); |
746 | BIO_METHOD *BIO_f_base64(void); | |
747 | BIO_METHOD *BIO_f_cipher(void); | |
55ab3bf7 | 748 | BIO_METHOD *BIO_f_reliable(void); |
0f113f3e MC |
749 | __owur int BIO_set_cipher(BIO *b, const EVP_CIPHER *c, const unsigned char *k, |
750 | const unsigned char *i, int enc); | |
d02b48c6 | 751 | |
13588350 | 752 | const EVP_MD *EVP_md_null(void); |
0f113f3e | 753 | # ifndef OPENSSL_NO_MD2 |
13588350 | 754 | const EVP_MD *EVP_md2(void); |
0f113f3e MC |
755 | # endif |
756 | # ifndef OPENSSL_NO_MD4 | |
13588350 | 757 | const EVP_MD *EVP_md4(void); |
0f113f3e MC |
758 | # endif |
759 | # ifndef OPENSSL_NO_MD5 | |
13588350 | 760 | const EVP_MD *EVP_md5(void); |
0f113f3e | 761 | # endif |
13588350 | 762 | const EVP_MD *EVP_sha1(void); |
13588350 | 763 | const EVP_MD *EVP_dss1(void); |
4d94ae00 | 764 | const EVP_MD *EVP_ecdsa(void); |
31c2ac1c AP |
765 | const EVP_MD *EVP_sha224(void); |
766 | const EVP_MD *EVP_sha256(void); | |
31c2ac1c AP |
767 | const EVP_MD *EVP_sha384(void); |
768 | const EVP_MD *EVP_sha512(void); | |
0f113f3e | 769 | # ifndef OPENSSL_NO_MDC2 |
13588350 | 770 | const EVP_MD *EVP_mdc2(void); |
0f113f3e MC |
771 | # endif |
772 | # ifndef OPENSSL_NO_RMD160 | |
13588350 | 773 | const EVP_MD *EVP_ripemd160(void); |
0f113f3e MC |
774 | # endif |
775 | # ifndef OPENSSL_NO_WHIRLPOOL | |
200fc028 | 776 | const EVP_MD *EVP_whirlpool(void); |
0f113f3e MC |
777 | # endif |
778 | const EVP_CIPHER *EVP_enc_null(void); /* does nothing :-) */ | |
779 | # ifndef OPENSSL_NO_DES | |
13588350 DSH |
780 | const EVP_CIPHER *EVP_des_ecb(void); |
781 | const EVP_CIPHER *EVP_des_ede(void); | |
782 | const EVP_CIPHER *EVP_des_ede3(void); | |
65ee74fb LJ |
783 | const EVP_CIPHER *EVP_des_ede_ecb(void); |
784 | const EVP_CIPHER *EVP_des_ede3_ecb(void); | |
8d1ebe0b | 785 | const EVP_CIPHER *EVP_des_cfb64(void); |
0f113f3e | 786 | # define EVP_des_cfb EVP_des_cfb64 |
8d1ebe0b RL |
787 | const EVP_CIPHER *EVP_des_cfb1(void); |
788 | const EVP_CIPHER *EVP_des_cfb8(void); | |
789 | const EVP_CIPHER *EVP_des_ede_cfb64(void); | |
0f113f3e | 790 | # define EVP_des_ede_cfb EVP_des_ede_cfb64 |
8d1ebe0b | 791 | const EVP_CIPHER *EVP_des_ede3_cfb64(void); |
0f113f3e | 792 | # define EVP_des_ede3_cfb EVP_des_ede3_cfb64 |
8d1ebe0b RL |
793 | const EVP_CIPHER *EVP_des_ede3_cfb1(void); |
794 | const EVP_CIPHER *EVP_des_ede3_cfb8(void); | |
13588350 DSH |
795 | const EVP_CIPHER *EVP_des_ofb(void); |
796 | const EVP_CIPHER *EVP_des_ede_ofb(void); | |
797 | const EVP_CIPHER *EVP_des_ede3_ofb(void); | |
798 | const EVP_CIPHER *EVP_des_cbc(void); | |
799 | const EVP_CIPHER *EVP_des_ede_cbc(void); | |
800 | const EVP_CIPHER *EVP_des_ede3_cbc(void); | |
801 | const EVP_CIPHER *EVP_desx_cbc(void); | |
97cf1f6c | 802 | const EVP_CIPHER *EVP_des_ede3_wrap(void); |
0f113f3e MC |
803 | /* |
804 | * This should now be supported through the dev_crypto ENGINE. But also, why | |
805 | * are rc4 and md5 declarations made here inside a "NO_DES" precompiler | |
806 | * branch? | |
807 | */ | |
c518ade1 | 808 | # endif |
0f113f3e | 809 | # ifndef OPENSSL_NO_RC4 |
13588350 DSH |
810 | const EVP_CIPHER *EVP_rc4(void); |
811 | const EVP_CIPHER *EVP_rc4_40(void); | |
0f113f3e | 812 | # ifndef OPENSSL_NO_MD5 |
c608171d | 813 | const EVP_CIPHER *EVP_rc4_hmac_md5(void); |
0f113f3e MC |
814 | # endif |
815 | # endif | |
816 | # ifndef OPENSSL_NO_IDEA | |
13588350 | 817 | const EVP_CIPHER *EVP_idea_ecb(void); |
8d1ebe0b | 818 | const EVP_CIPHER *EVP_idea_cfb64(void); |
0f113f3e | 819 | # define EVP_idea_cfb EVP_idea_cfb64 |
13588350 DSH |
820 | const EVP_CIPHER *EVP_idea_ofb(void); |
821 | const EVP_CIPHER *EVP_idea_cbc(void); | |
0f113f3e MC |
822 | # endif |
823 | # ifndef OPENSSL_NO_RC2 | |
13588350 DSH |
824 | const EVP_CIPHER *EVP_rc2_ecb(void); |
825 | const EVP_CIPHER *EVP_rc2_cbc(void); | |
826 | const EVP_CIPHER *EVP_rc2_40_cbc(void); | |
827 | const EVP_CIPHER *EVP_rc2_64_cbc(void); | |
8d1ebe0b | 828 | const EVP_CIPHER *EVP_rc2_cfb64(void); |
0f113f3e | 829 | # define EVP_rc2_cfb EVP_rc2_cfb64 |
13588350 | 830 | const EVP_CIPHER *EVP_rc2_ofb(void); |
0f113f3e MC |
831 | # endif |
832 | # ifndef OPENSSL_NO_BF | |
13588350 DSH |
833 | const EVP_CIPHER *EVP_bf_ecb(void); |
834 | const EVP_CIPHER *EVP_bf_cbc(void); | |
8d1ebe0b | 835 | const EVP_CIPHER *EVP_bf_cfb64(void); |
0f113f3e | 836 | # define EVP_bf_cfb EVP_bf_cfb64 |
13588350 | 837 | const EVP_CIPHER *EVP_bf_ofb(void); |
0f113f3e MC |
838 | # endif |
839 | # ifndef OPENSSL_NO_CAST | |
13588350 DSH |
840 | const EVP_CIPHER *EVP_cast5_ecb(void); |
841 | const EVP_CIPHER *EVP_cast5_cbc(void); | |
8d1ebe0b | 842 | const EVP_CIPHER *EVP_cast5_cfb64(void); |
0f113f3e | 843 | # define EVP_cast5_cfb EVP_cast5_cfb64 |
13588350 | 844 | const EVP_CIPHER *EVP_cast5_ofb(void); |
0f113f3e MC |
845 | # endif |
846 | # ifndef OPENSSL_NO_RC5 | |
13588350 DSH |
847 | const EVP_CIPHER *EVP_rc5_32_12_16_cbc(void); |
848 | const EVP_CIPHER *EVP_rc5_32_12_16_ecb(void); | |
8d1ebe0b | 849 | const EVP_CIPHER *EVP_rc5_32_12_16_cfb64(void); |
0f113f3e | 850 | # define EVP_rc5_32_12_16_cfb EVP_rc5_32_12_16_cfb64 |
13588350 | 851 | const EVP_CIPHER *EVP_rc5_32_12_16_ofb(void); |
0f113f3e MC |
852 | # endif |
853 | # ifndef OPENSSL_NO_AES | |
13588350 DSH |
854 | const EVP_CIPHER *EVP_aes_128_ecb(void); |
855 | const EVP_CIPHER *EVP_aes_128_cbc(void); | |
8d1ebe0b RL |
856 | const EVP_CIPHER *EVP_aes_128_cfb1(void); |
857 | const EVP_CIPHER *EVP_aes_128_cfb8(void); | |
858 | const EVP_CIPHER *EVP_aes_128_cfb128(void); | |
0f113f3e | 859 | # define EVP_aes_128_cfb EVP_aes_128_cfb128 |
bd54d55c | 860 | const EVP_CIPHER *EVP_aes_128_ofb(void); |
bd54d55c | 861 | const EVP_CIPHER *EVP_aes_128_ctr(void); |
23916810 | 862 | const EVP_CIPHER *EVP_aes_128_ccm(void); |
bdaa5415 | 863 | const EVP_CIPHER *EVP_aes_128_gcm(void); |
32a2d8dd | 864 | const EVP_CIPHER *EVP_aes_128_xts(void); |
97cf1f6c | 865 | const EVP_CIPHER *EVP_aes_128_wrap(void); |
d31fed73 | 866 | const EVP_CIPHER *EVP_aes_128_wrap_pad(void); |
0f113f3e | 867 | # ifndef OPENSSL_NO_OCB |
e6b336ef | 868 | const EVP_CIPHER *EVP_aes_128_ocb(void); |
0f113f3e | 869 | # endif |
13588350 DSH |
870 | const EVP_CIPHER *EVP_aes_192_ecb(void); |
871 | const EVP_CIPHER *EVP_aes_192_cbc(void); | |
8d1ebe0b RL |
872 | const EVP_CIPHER *EVP_aes_192_cfb1(void); |
873 | const EVP_CIPHER *EVP_aes_192_cfb8(void); | |
874 | const EVP_CIPHER *EVP_aes_192_cfb128(void); | |
0f113f3e | 875 | # define EVP_aes_192_cfb EVP_aes_192_cfb128 |
bd54d55c | 876 | const EVP_CIPHER *EVP_aes_192_ofb(void); |
bd54d55c | 877 | const EVP_CIPHER *EVP_aes_192_ctr(void); |
23916810 | 878 | const EVP_CIPHER *EVP_aes_192_ccm(void); |
bdaa5415 | 879 | const EVP_CIPHER *EVP_aes_192_gcm(void); |
97cf1f6c | 880 | const EVP_CIPHER *EVP_aes_192_wrap(void); |
d31fed73 | 881 | const EVP_CIPHER *EVP_aes_192_wrap_pad(void); |
0f113f3e | 882 | # ifndef OPENSSL_NO_OCB |
e6b336ef | 883 | const EVP_CIPHER *EVP_aes_192_ocb(void); |
0f113f3e | 884 | # endif |
13588350 DSH |
885 | const EVP_CIPHER *EVP_aes_256_ecb(void); |
886 | const EVP_CIPHER *EVP_aes_256_cbc(void); | |
8d1ebe0b RL |
887 | const EVP_CIPHER *EVP_aes_256_cfb1(void); |
888 | const EVP_CIPHER *EVP_aes_256_cfb8(void); | |
889 | const EVP_CIPHER *EVP_aes_256_cfb128(void); | |
0f113f3e | 890 | # define EVP_aes_256_cfb EVP_aes_256_cfb128 |
bd54d55c | 891 | const EVP_CIPHER *EVP_aes_256_ofb(void); |
bd54d55c | 892 | const EVP_CIPHER *EVP_aes_256_ctr(void); |
23916810 | 893 | const EVP_CIPHER *EVP_aes_256_ccm(void); |
bdaa5415 | 894 | const EVP_CIPHER *EVP_aes_256_gcm(void); |
32a2d8dd | 895 | const EVP_CIPHER *EVP_aes_256_xts(void); |
97cf1f6c | 896 | const EVP_CIPHER *EVP_aes_256_wrap(void); |
d31fed73 | 897 | const EVP_CIPHER *EVP_aes_256_wrap_pad(void); |
0f113f3e | 898 | # ifndef OPENSSL_NO_OCB |
e6b336ef | 899 | const EVP_CIPHER *EVP_aes_256_ocb(void); |
0f113f3e | 900 | # endif |
c608171d AP |
901 | const EVP_CIPHER *EVP_aes_128_cbc_hmac_sha1(void); |
902 | const EVP_CIPHER *EVP_aes_256_cbc_hmac_sha1(void); | |
b25b8417 BL |
903 | const EVP_CIPHER *EVP_aes_128_cbc_hmac_sha256(void); |
904 | const EVP_CIPHER *EVP_aes_256_cbc_hmac_sha256(void); | |
905 | # endif | |
0f113f3e | 906 | # ifndef OPENSSL_NO_CAMELLIA |
f3dea9a5 BM |
907 | const EVP_CIPHER *EVP_camellia_128_ecb(void); |
908 | const EVP_CIPHER *EVP_camellia_128_cbc(void); | |
909 | const EVP_CIPHER *EVP_camellia_128_cfb1(void); | |
910 | const EVP_CIPHER *EVP_camellia_128_cfb8(void); | |
911 | const EVP_CIPHER *EVP_camellia_128_cfb128(void); | |
0f113f3e | 912 | # define EVP_camellia_128_cfb EVP_camellia_128_cfb128 |
f3dea9a5 | 913 | const EVP_CIPHER *EVP_camellia_128_ofb(void); |
2b8f33a5 | 914 | const EVP_CIPHER *EVP_camellia_128_ctr(void); |
f3dea9a5 BM |
915 | const EVP_CIPHER *EVP_camellia_192_ecb(void); |
916 | const EVP_CIPHER *EVP_camellia_192_cbc(void); | |
917 | const EVP_CIPHER *EVP_camellia_192_cfb1(void); | |
918 | const EVP_CIPHER *EVP_camellia_192_cfb8(void); | |
919 | const EVP_CIPHER *EVP_camellia_192_cfb128(void); | |
0f113f3e | 920 | # define EVP_camellia_192_cfb EVP_camellia_192_cfb128 |
f3dea9a5 | 921 | const EVP_CIPHER *EVP_camellia_192_ofb(void); |
2b8f33a5 | 922 | const EVP_CIPHER *EVP_camellia_192_ctr(void); |
f3dea9a5 BM |
923 | const EVP_CIPHER *EVP_camellia_256_ecb(void); |
924 | const EVP_CIPHER *EVP_camellia_256_cbc(void); | |
925 | const EVP_CIPHER *EVP_camellia_256_cfb1(void); | |
926 | const EVP_CIPHER *EVP_camellia_256_cfb8(void); | |
927 | const EVP_CIPHER *EVP_camellia_256_cfb128(void); | |
0f113f3e | 928 | # define EVP_camellia_256_cfb EVP_camellia_256_cfb128 |
f3dea9a5 | 929 | const EVP_CIPHER *EVP_camellia_256_ofb(void); |
2b8f33a5 | 930 | const EVP_CIPHER *EVP_camellia_256_ctr(void); |
0f113f3e | 931 | # endif |
3ab56511 | 932 | |
0f113f3e | 933 | # ifndef OPENSSL_NO_SEED |
96afc1cf BM |
934 | const EVP_CIPHER *EVP_seed_ecb(void); |
935 | const EVP_CIPHER *EVP_seed_cbc(void); | |
936 | const EVP_CIPHER *EVP_seed_cfb128(void); | |
0f113f3e | 937 | # define EVP_seed_cfb EVP_seed_cfb128 |
96afc1cf | 938 | const EVP_CIPHER *EVP_seed_ofb(void); |
0f113f3e | 939 | # endif |
96afc1cf | 940 | |
e84be9b4 DSH |
941 | void OPENSSL_add_all_algorithms_noconf(void); |
942 | void OPENSSL_add_all_algorithms_conf(void); | |
943 | ||
0f113f3e MC |
944 | # ifdef OPENSSL_LOAD_CONF |
945 | # define OpenSSL_add_all_algorithms() \ | |
946 | OPENSSL_add_all_algorithms_conf() | |
947 | # else | |
948 | # define OpenSSL_add_all_algorithms() \ | |
949 | OPENSSL_add_all_algorithms_noconf() | |
950 | # endif | |
e84be9b4 | 951 | |
af57d843 DSH |
952 | void OpenSSL_add_all_ciphers(void); |
953 | void OpenSSL_add_all_digests(void); | |
0f113f3e MC |
954 | # define SSLeay_add_all_algorithms() OpenSSL_add_all_algorithms() |
955 | # define SSLeay_add_all_ciphers() OpenSSL_add_all_ciphers() | |
956 | # define SSLeay_add_all_digests() OpenSSL_add_all_digests() | |
d02b48c6 | 957 | |
13588350 DSH |
958 | int EVP_add_cipher(const EVP_CIPHER *cipher); |
959 | int EVP_add_digest(const EVP_MD *digest); | |
d02b48c6 | 960 | |
e778802f BL |
961 | const EVP_CIPHER *EVP_get_cipherbyname(const char *name); |
962 | const EVP_MD *EVP_get_digestbyname(const char *name); | |
d02b48c6 RE |
963 | void EVP_cleanup(void); |
964 | ||
0f113f3e MC |
965 | void EVP_CIPHER_do_all(void (*fn) (const EVP_CIPHER *ciph, |
966 | const char *from, const char *to, void *x), | |
967 | void *arg); | |
968 | void EVP_CIPHER_do_all_sorted(void (*fn) | |
969 | (const EVP_CIPHER *ciph, const char *from, | |
970 | const char *to, void *x), void *arg); | |
971 | ||
972 | void EVP_MD_do_all(void (*fn) (const EVP_MD *ciph, | |
973 | const char *from, const char *to, void *x), | |
974 | void *arg); | |
975 | void EVP_MD_do_all_sorted(void (*fn) | |
976 | (const EVP_MD *ciph, const char *from, | |
977 | const char *to, void *x), void *arg); | |
978 | ||
979 | int EVP_PKEY_decrypt_old(unsigned char *dec_key, | |
980 | const unsigned char *enc_key, int enc_key_len, | |
981 | EVP_PKEY *private_key); | |
982 | int EVP_PKEY_encrypt_old(unsigned char *enc_key, | |
983 | const unsigned char *key, int key_len, | |
984 | EVP_PKEY *pub_key); | |
985 | int EVP_PKEY_type(int type); | |
986 | int EVP_PKEY_id(const EVP_PKEY *pkey); | |
987 | int EVP_PKEY_base_id(const EVP_PKEY *pkey); | |
988 | int EVP_PKEY_bits(EVP_PKEY *pkey); | |
989 | int EVP_PKEY_security_bits(const EVP_PKEY *pkey); | |
990 | int EVP_PKEY_size(EVP_PKEY *pkey); | |
991 | int EVP_PKEY_set_type(EVP_PKEY *pkey, int type); | |
992 | int EVP_PKEY_set_type_str(EVP_PKEY *pkey, const char *str, int len); | |
993 | int EVP_PKEY_assign(EVP_PKEY *pkey, int type, void *key); | |
994 | void *EVP_PKEY_get0(EVP_PKEY *pkey); | |
995 | ||
996 | # ifndef OPENSSL_NO_RSA | |
bb2297a4 | 997 | struct rsa_st; |
0f113f3e | 998 | int EVP_PKEY_set1_RSA(EVP_PKEY *pkey, struct rsa_st *key); |
bb2297a4 | 999 | struct rsa_st *EVP_PKEY_get1_RSA(EVP_PKEY *pkey); |
0f113f3e MC |
1000 | # endif |
1001 | # ifndef OPENSSL_NO_DSA | |
bb2297a4 | 1002 | struct dsa_st; |
0f113f3e | 1003 | int EVP_PKEY_set1_DSA(EVP_PKEY *pkey, struct dsa_st *key); |
bb2297a4 | 1004 | struct dsa_st *EVP_PKEY_get1_DSA(EVP_PKEY *pkey); |
0f113f3e MC |
1005 | # endif |
1006 | # ifndef OPENSSL_NO_DH | |
bb2297a4 | 1007 | struct dh_st; |
0f113f3e | 1008 | int EVP_PKEY_set1_DH(EVP_PKEY *pkey, struct dh_st *key); |
bb2297a4 | 1009 | struct dh_st *EVP_PKEY_get1_DH(EVP_PKEY *pkey); |
0f113f3e MC |
1010 | # endif |
1011 | # ifndef OPENSSL_NO_EC | |
14a7cfb3 | 1012 | struct ec_key_st; |
0f113f3e | 1013 | int EVP_PKEY_set1_EC_KEY(EVP_PKEY *pkey, struct ec_key_st *key); |
14a7cfb3 | 1014 | struct ec_key_st *EVP_PKEY_get1_EC_KEY(EVP_PKEY *pkey); |
0f113f3e | 1015 | # endif |
bb2297a4 | 1016 | |
0f113f3e MC |
1017 | EVP_PKEY *EVP_PKEY_new(void); |
1018 | void EVP_PKEY_free(EVP_PKEY *pkey); | |
b6995add | 1019 | |
0f113f3e MC |
1020 | EVP_PKEY *d2i_PublicKey(int type, EVP_PKEY **a, const unsigned char **pp, |
1021 | long length); | |
1022 | int i2d_PublicKey(EVP_PKEY *a, unsigned char **pp); | |
d02b48c6 | 1023 | |
0f113f3e MC |
1024 | EVP_PKEY *d2i_PrivateKey(int type, EVP_PKEY **a, const unsigned char **pp, |
1025 | long length); | |
1026 | EVP_PKEY *d2i_AutoPrivateKey(EVP_PKEY **a, const unsigned char **pp, | |
1027 | long length); | |
1028 | int i2d_PrivateKey(EVP_PKEY *a, unsigned char **pp); | |
d02b48c6 | 1029 | |
af0f0f3e RL |
1030 | int EVP_PKEY_copy_parameters(EVP_PKEY *to, const EVP_PKEY *from); |
1031 | int EVP_PKEY_missing_parameters(const EVP_PKEY *pkey); | |
0f113f3e | 1032 | int EVP_PKEY_save_parameters(EVP_PKEY *pkey, int mode); |
af0f0f3e | 1033 | int EVP_PKEY_cmp_parameters(const EVP_PKEY *a, const EVP_PKEY *b); |
58964a49 | 1034 | |
af0f0f3e | 1035 | int EVP_PKEY_cmp(const EVP_PKEY *a, const EVP_PKEY *b); |
e6526fbf | 1036 | |
35208f36 | 1037 | int EVP_PKEY_print_public(BIO *out, const EVP_PKEY *pkey, |
0f113f3e | 1038 | int indent, ASN1_PCTX *pctx); |
35208f36 | 1039 | int EVP_PKEY_print_private(BIO *out, const EVP_PKEY *pkey, |
0f113f3e | 1040 | int indent, ASN1_PCTX *pctx); |
35208f36 | 1041 | int EVP_PKEY_print_params(BIO *out, const EVP_PKEY *pkey, |
0f113f3e | 1042 | int indent, ASN1_PCTX *pctx); |
35208f36 | 1043 | |
03919683 DSH |
1044 | int EVP_PKEY_get_default_digest_nid(EVP_PKEY *pkey, int *pnid); |
1045 | ||
84fa704c | 1046 | int EVP_CIPHER_type(const EVP_CIPHER *ctx); |
884e8ec6 | 1047 | |
58964a49 RE |
1048 | /* calls methods */ |
1049 | int EVP_CIPHER_param_to_asn1(EVP_CIPHER_CTX *c, ASN1_TYPE *type); | |
1050 | int EVP_CIPHER_asn1_to_param(EVP_CIPHER_CTX *c, ASN1_TYPE *type); | |
1051 | ||
1052 | /* These are used by EVP_CIPHER methods */ | |
0f113f3e MC |
1053 | int EVP_CIPHER_set_asn1_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type); |
1054 | int EVP_CIPHER_get_asn1_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type); | |
d02b48c6 | 1055 | |
b0c6fb80 | 1056 | /* PKCS5 password based encryption */ |
2bd83ca1 | 1057 | int PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, |
0f113f3e MC |
1058 | ASN1_TYPE *param, const EVP_CIPHER *cipher, |
1059 | const EVP_MD *md, int en_de); | |
97e4a932 | 1060 | int PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, |
0f113f3e MC |
1061 | const unsigned char *salt, int saltlen, int iter, |
1062 | int keylen, unsigned char *out); | |
777c47ac | 1063 | int PKCS5_PBKDF2_HMAC(const char *pass, int passlen, |
0f113f3e MC |
1064 | const unsigned char *salt, int saltlen, int iter, |
1065 | const EVP_MD *digest, int keylen, unsigned char *out); | |
97e4a932 | 1066 | int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, |
0f113f3e MC |
1067 | ASN1_TYPE *param, const EVP_CIPHER *cipher, |
1068 | const EVP_MD *md, int en_de); | |
b0c6fb80 | 1069 | |
a95fb9e3 DSH |
1070 | int EVP_PBE_scrypt(const char *pass, size_t passlen, |
1071 | const unsigned char *salt, size_t saltlen, | |
1072 | uint64_t N, uint64_t r, uint64_t p, uint64_t maxmem, | |
1073 | unsigned char *key, size_t keylen); | |
1074 | ||
e98aa30d DSH |
1075 | int PKCS5_v2_scrypt_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, |
1076 | int passlen, ASN1_TYPE *param, | |
1077 | const EVP_CIPHER *c, const EVP_MD *md, int en_de); | |
1078 | ||
600dec15 DSH |
1079 | void PKCS5_PBE_add(void); |
1080 | ||
0f113f3e MC |
1081 | int EVP_PBE_CipherInit(ASN1_OBJECT *pbe_obj, const char *pass, int passlen, |
1082 | ASN1_TYPE *param, EVP_CIPHER_CTX *ctx, int en_de); | |
856640b5 DSH |
1083 | |
1084 | /* PBE type */ | |
1085 | ||
1086 | /* Can appear as the outermost AlgorithmIdentifier */ | |
0f113f3e | 1087 | # define EVP_PBE_TYPE_OUTER 0x0 |
856640b5 | 1088 | /* Is an PRF type OID */ |
0f113f3e | 1089 | # define EVP_PBE_TYPE_PRF 0x1 |
d6c5462e DSH |
1090 | /* Is a PKCS#5 v2.0 KDF */ |
1091 | # define EVP_PBE_TYPE_KDF 0x2 | |
856640b5 | 1092 | |
0f113f3e MC |
1093 | int EVP_PBE_alg_add_type(int pbe_type, int pbe_nid, int cipher_nid, |
1094 | int md_nid, EVP_PBE_KEYGEN *keygen); | |
13588350 | 1095 | int EVP_PBE_alg_add(int nid, const EVP_CIPHER *cipher, const EVP_MD *md, |
0f113f3e MC |
1096 | EVP_PBE_KEYGEN *keygen); |
1097 | int EVP_PBE_find(int type, int pbe_nid, int *pcnid, int *pmnid, | |
1098 | EVP_PBE_KEYGEN **pkeygen); | |
69cbf468 DSH |
1099 | void EVP_PBE_cleanup(void); |
1100 | ||
0f113f3e MC |
1101 | # define ASN1_PKEY_ALIAS 0x1 |
1102 | # define ASN1_PKEY_DYNAMIC 0x2 | |
1103 | # define ASN1_PKEY_SIGPARAM_NULL 0x4 | |
0b33dac3 | 1104 | |
0f113f3e MC |
1105 | # define ASN1_PKEY_CTRL_PKCS7_SIGN 0x1 |
1106 | # define ASN1_PKEY_CTRL_PKCS7_ENCRYPT 0x2 | |
1107 | # define ASN1_PKEY_CTRL_DEFAULT_MD_NID 0x3 | |
1108 | # define ASN1_PKEY_CTRL_CMS_SIGN 0x5 | |
1109 | # define ASN1_PKEY_CTRL_CMS_ENVELOPE 0x7 | |
1110 | # define ASN1_PKEY_CTRL_CMS_RI_TYPE 0x8 | |
492a9e24 | 1111 | |
e4263314 DSH |
1112 | int EVP_PKEY_asn1_get_count(void); |
1113 | const EVP_PKEY_ASN1_METHOD *EVP_PKEY_asn1_get0(int idx); | |
01b8b3c7 DSH |
1114 | const EVP_PKEY_ASN1_METHOD *EVP_PKEY_asn1_find(ENGINE **pe, int type); |
1115 | const EVP_PKEY_ASN1_METHOD *EVP_PKEY_asn1_find_str(ENGINE **pe, | |
0f113f3e | 1116 | const char *str, int len); |
e46691a0 DSH |
1117 | int EVP_PKEY_asn1_add0(const EVP_PKEY_ASN1_METHOD *ameth); |
1118 | int EVP_PKEY_asn1_add_alias(int to, int from); | |
0f113f3e MC |
1119 | int EVP_PKEY_asn1_get0_info(int *ppkey_id, int *pkey_base_id, |
1120 | int *ppkey_flags, const char **pinfo, | |
1121 | const char **ppem_str, | |
1122 | const EVP_PKEY_ASN1_METHOD *ameth); | |
1123 | ||
1124 | const EVP_PKEY_ASN1_METHOD *EVP_PKEY_get0_asn1(EVP_PKEY *pkey); | |
1125 | EVP_PKEY_ASN1_METHOD *EVP_PKEY_asn1_new(int id, int flags, | |
1126 | const char *pem_str, | |
1127 | const char *info); | |
1128 | void EVP_PKEY_asn1_copy(EVP_PKEY_ASN1_METHOD *dst, | |
1129 | const EVP_PKEY_ASN1_METHOD *src); | |
d82e2718 | 1130 | void EVP_PKEY_asn1_free(EVP_PKEY_ASN1_METHOD *ameth); |
42eae426 | 1131 | void EVP_PKEY_asn1_set_public(EVP_PKEY_ASN1_METHOD *ameth, |
0f113f3e MC |
1132 | int (*pub_decode) (EVP_PKEY *pk, |
1133 | X509_PUBKEY *pub), | |
1134 | int (*pub_encode) (X509_PUBKEY *pub, | |
1135 | const EVP_PKEY *pk), | |
1136 | int (*pub_cmp) (const EVP_PKEY *a, | |
1137 | const EVP_PKEY *b), | |
1138 | int (*pub_print) (BIO *out, | |
1139 | const EVP_PKEY *pkey, | |
1140 | int indent, ASN1_PCTX *pctx), | |
1141 | int (*pkey_size) (const EVP_PKEY *pk), | |
1142 | int (*pkey_bits) (const EVP_PKEY *pk)); | |
d82e2718 | 1143 | void EVP_PKEY_asn1_set_private(EVP_PKEY_ASN1_METHOD *ameth, |
0f113f3e MC |
1144 | int (*priv_decode) (EVP_PKEY *pk, |
1145 | PKCS8_PRIV_KEY_INFO | |
1146 | *p8inf), | |
1147 | int (*priv_encode) (PKCS8_PRIV_KEY_INFO *p8, | |
1148 | const EVP_PKEY *pk), | |
1149 | int (*priv_print) (BIO *out, | |
1150 | const EVP_PKEY *pkey, | |
1151 | int indent, | |
1152 | ASN1_PCTX *pctx)); | |
d82e2718 | 1153 | void EVP_PKEY_asn1_set_param(EVP_PKEY_ASN1_METHOD *ameth, |
0f113f3e MC |
1154 | int (*param_decode) (EVP_PKEY *pkey, |
1155 | const unsigned char **pder, | |
1156 | int derlen), | |
1157 | int (*param_encode) (const EVP_PKEY *pkey, | |
1158 | unsigned char **pder), | |
1159 | int (*param_missing) (const EVP_PKEY *pk), | |
1160 | int (*param_copy) (EVP_PKEY *to, | |
1161 | const EVP_PKEY *from), | |
1162 | int (*param_cmp) (const EVP_PKEY *a, | |
1163 | const EVP_PKEY *b), | |
1164 | int (*param_print) (BIO *out, | |
1165 | const EVP_PKEY *pkey, | |
1166 | int indent, | |
1167 | ASN1_PCTX *pctx)); | |
db98bbc1 | 1168 | |
d82e2718 | 1169 | void EVP_PKEY_asn1_set_free(EVP_PKEY_ASN1_METHOD *ameth, |
0f113f3e | 1170 | void (*pkey_free) (EVP_PKEY *pkey)); |
d82e2718 | 1171 | void EVP_PKEY_asn1_set_ctrl(EVP_PKEY_ASN1_METHOD *ameth, |
0f113f3e MC |
1172 | int (*pkey_ctrl) (EVP_PKEY *pkey, int op, |
1173 | long arg1, void *arg2)); | |
3418f7b7 SA |
1174 | void EVP_PKEY_asn1_set_item(EVP_PKEY_ASN1_METHOD *ameth, |
1175 | int (*item_verify) (EVP_MD_CTX *ctx, | |
1176 | const ASN1_ITEM *it, | |
1177 | void *asn, | |
1178 | X509_ALGOR *a, | |
1179 | ASN1_BIT_STRING *sig, | |
1180 | EVP_PKEY *pkey), | |
1181 | int (*item_sign) (EVP_MD_CTX *ctx, | |
1182 | const ASN1_ITEM *it, | |
1183 | void *asn, | |
1184 | X509_ALGOR *alg1, | |
1185 | X509_ALGOR *alg2, | |
1186 | ASN1_BIT_STRING *sig)); | |
448be743 | 1187 | |
2514fa79 | 1188 | void EVP_PKEY_asn1_set_security_bits(EVP_PKEY_ASN1_METHOD *ameth, |
0f113f3e MC |
1189 | int (*pkey_security_bits) (const EVP_PKEY |
1190 | *pk)); | |
5da98aa6 | 1191 | |
0f113f3e MC |
1192 | # define EVP_PKEY_OP_UNDEFINED 0 |
1193 | # define EVP_PKEY_OP_PARAMGEN (1<<1) | |
1194 | # define EVP_PKEY_OP_KEYGEN (1<<2) | |
1195 | # define EVP_PKEY_OP_SIGN (1<<3) | |
1196 | # define EVP_PKEY_OP_VERIFY (1<<4) | |
1197 | # define EVP_PKEY_OP_VERIFYRECOVER (1<<5) | |
1198 | # define EVP_PKEY_OP_SIGNCTX (1<<6) | |
1199 | # define EVP_PKEY_OP_VERIFYCTX (1<<7) | |
1200 | # define EVP_PKEY_OP_ENCRYPT (1<<8) | |
1201 | # define EVP_PKEY_OP_DECRYPT (1<<9) | |
1202 | # define EVP_PKEY_OP_DERIVE (1<<10) | |
716630c0 | 1203 | |
0f113f3e MC |
1204 | # define EVP_PKEY_OP_TYPE_SIG \ |
1205 | (EVP_PKEY_OP_SIGN | EVP_PKEY_OP_VERIFY | EVP_PKEY_OP_VERIFYRECOVER \ | |
1206 | | EVP_PKEY_OP_SIGNCTX | EVP_PKEY_OP_VERIFYCTX) | |
716630c0 | 1207 | |
0f113f3e MC |
1208 | # define EVP_PKEY_OP_TYPE_CRYPT \ |
1209 | (EVP_PKEY_OP_ENCRYPT | EVP_PKEY_OP_DECRYPT) | |
716630c0 | 1210 | |
0f113f3e MC |
1211 | # define EVP_PKEY_OP_TYPE_NOGEN \ |
1212 | (EVP_PKEY_OP_TYPE_SIG | EVP_PKEY_OP_TYPE_CRYPT | EVP_PKEY_OP_DERIVE) | |
29db322e | 1213 | |
0f113f3e MC |
1214 | # define EVP_PKEY_OP_TYPE_GEN \ |
1215 | (EVP_PKEY_OP_PARAMGEN | EVP_PKEY_OP_KEYGEN) | |
716630c0 | 1216 | |
0f113f3e MC |
1217 | # define EVP_PKEY_CTX_set_signature_md(ctx, md) \ |
1218 | EVP_PKEY_CTX_ctrl(ctx, -1, EVP_PKEY_OP_TYPE_SIG, \ | |
1219 | EVP_PKEY_CTRL_MD, 0, (void *)md) | |
5da98aa6 | 1220 | |
0f113f3e MC |
1221 | # define EVP_PKEY_CTX_get_signature_md(ctx, pmd) \ |
1222 | EVP_PKEY_CTX_ctrl(ctx, -1, EVP_PKEY_OP_TYPE_SIG, \ | |
1223 | EVP_PKEY_CTRL_GET_MD, 0, (void *)pmd) | |
81063953 | 1224 | |
eff1a4d2 DSH |
1225 | # define EVP_PKEY_CTX_set_mac_key(ctx, key, len) \ |
1226 | EVP_PKEY_CTX_ctrl(ctx, -1, EVP_PKEY_OP_KEYGEN, \ | |
1227 | EVP_PKEY_CTRL_SET_MAC_KEY, len, (void *)key) | |
1228 | ||
0f113f3e MC |
1229 | # define EVP_PKEY_CTRL_MD 1 |
1230 | # define EVP_PKEY_CTRL_PEER_KEY 2 | |
b7683e3a | 1231 | |
0f113f3e MC |
1232 | # define EVP_PKEY_CTRL_PKCS7_ENCRYPT 3 |
1233 | # define EVP_PKEY_CTRL_PKCS7_DECRYPT 4 | |
399a6f0b | 1234 | |
0f113f3e | 1235 | # define EVP_PKEY_CTRL_PKCS7_SIGN 5 |
b2a97be7 | 1236 | |
0f113f3e | 1237 | # define EVP_PKEY_CTRL_SET_MAC_KEY 6 |
74633553 | 1238 | |
0f113f3e | 1239 | # define EVP_PKEY_CTRL_DIGESTINIT 7 |
74633553 | 1240 | |
0e1dba93 | 1241 | /* Used by GOST key encryption in TLS */ |
0f113f3e | 1242 | # define EVP_PKEY_CTRL_SET_IV 8 |
0e1dba93 | 1243 | |
0f113f3e MC |
1244 | # define EVP_PKEY_CTRL_CMS_ENCRYPT 9 |
1245 | # define EVP_PKEY_CTRL_CMS_DECRYPT 10 | |
1246 | # define EVP_PKEY_CTRL_CMS_SIGN 11 | |
8931b30d | 1247 | |
0f113f3e | 1248 | # define EVP_PKEY_CTRL_CIPHER 12 |
c8ef656d | 1249 | |
0f113f3e | 1250 | # define EVP_PKEY_CTRL_GET_MD 13 |
81063953 | 1251 | |
0f113f3e | 1252 | # define EVP_PKEY_ALG_CTRL 0x1000 |
b2a97be7 | 1253 | |
0f113f3e MC |
1254 | # define EVP_PKEY_FLAG_AUTOARGLEN 2 |
1255 | /* | |
1256 | * Method handles all operations: don't assume any digest related defaults. | |
c8ef656d | 1257 | */ |
0f113f3e | 1258 | # define EVP_PKEY_FLAG_SIGCTX_CUSTOM 4 |
b010b7c4 | 1259 | |
c9777d26 | 1260 | const EVP_PKEY_METHOD *EVP_PKEY_meth_find(int type); |
0f113f3e | 1261 | EVP_PKEY_METHOD *EVP_PKEY_meth_new(int id, int flags); |
f830c68f | 1262 | void EVP_PKEY_meth_get0_info(int *ppkey_id, int *pflags, |
0f113f3e | 1263 | const EVP_PKEY_METHOD *meth); |
f830c68f | 1264 | void EVP_PKEY_meth_copy(EVP_PKEY_METHOD *dst, const EVP_PKEY_METHOD *src); |
3207e612 | 1265 | void EVP_PKEY_meth_free(EVP_PKEY_METHOD *pmeth); |
81cebb8b DSH |
1266 | int EVP_PKEY_meth_add0(const EVP_PKEY_METHOD *pmeth); |
1267 | ||
f5cda4cb DSH |
1268 | EVP_PKEY_CTX *EVP_PKEY_CTX_new(EVP_PKEY *pkey, ENGINE *e); |
1269 | EVP_PKEY_CTX *EVP_PKEY_CTX_new_id(int id, ENGINE *e); | |
3a828611 | 1270 | EVP_PKEY_CTX *EVP_PKEY_CTX_dup(EVP_PKEY_CTX *ctx); |
5da98aa6 | 1271 | void EVP_PKEY_CTX_free(EVP_PKEY_CTX *ctx); |
4a3dc3c0 | 1272 | |
5da98aa6 | 1273 | int EVP_PKEY_CTX_ctrl(EVP_PKEY_CTX *ctx, int keytype, int optype, |
0f113f3e | 1274 | int cmd, int p1, void *p2); |
4a3dc3c0 | 1275 | int EVP_PKEY_CTX_ctrl_str(EVP_PKEY_CTX *ctx, const char *type, |
0f113f3e | 1276 | const char *value); |
5da98aa6 | 1277 | |
b28dea4e DSH |
1278 | int EVP_PKEY_CTX_get_operation(EVP_PKEY_CTX *ctx); |
1279 | void EVP_PKEY_CTX_set0_keygen_info(EVP_PKEY_CTX *ctx, int *dat, int datlen); | |
1280 | ||
2022cfe0 | 1281 | EVP_PKEY *EVP_PKEY_new_mac_key(int type, ENGINE *e, |
0f113f3e | 1282 | const unsigned char *key, int keylen); |
2022cfe0 | 1283 | |
f5cda4cb DSH |
1284 | void EVP_PKEY_CTX_set_data(EVP_PKEY_CTX *ctx, void *data); |
1285 | void *EVP_PKEY_CTX_get_data(EVP_PKEY_CTX *ctx); | |
81cebb8b DSH |
1286 | EVP_PKEY *EVP_PKEY_CTX_get0_pkey(EVP_PKEY_CTX *ctx); |
1287 | ||
0e1dba93 DSH |
1288 | EVP_PKEY *EVP_PKEY_CTX_get0_peerkey(EVP_PKEY_CTX *ctx); |
1289 | ||
f5cda4cb DSH |
1290 | void EVP_PKEY_CTX_set_app_data(EVP_PKEY_CTX *ctx, void *data); |
1291 | void *EVP_PKEY_CTX_get_app_data(EVP_PKEY_CTX *ctx); | |
5da98aa6 | 1292 | |
9e4d0f0b DSH |
1293 | int EVP_PKEY_sign_init(EVP_PKEY_CTX *ctx); |
1294 | int EVP_PKEY_sign(EVP_PKEY_CTX *ctx, | |
0f113f3e MC |
1295 | unsigned char *sig, size_t *siglen, |
1296 | const unsigned char *tbs, size_t tbslen); | |
9e4d0f0b DSH |
1297 | int EVP_PKEY_verify_init(EVP_PKEY_CTX *ctx); |
1298 | int EVP_PKEY_verify(EVP_PKEY_CTX *ctx, | |
0f113f3e MC |
1299 | const unsigned char *sig, size_t siglen, |
1300 | const unsigned char *tbs, size_t tbslen); | |
9e4d0f0b DSH |
1301 | int EVP_PKEY_verify_recover_init(EVP_PKEY_CTX *ctx); |
1302 | int EVP_PKEY_verify_recover(EVP_PKEY_CTX *ctx, | |
0f113f3e MC |
1303 | unsigned char *rout, size_t *routlen, |
1304 | const unsigned char *sig, size_t siglen); | |
9e4d0f0b DSH |
1305 | int EVP_PKEY_encrypt_init(EVP_PKEY_CTX *ctx); |
1306 | int EVP_PKEY_encrypt(EVP_PKEY_CTX *ctx, | |
0f113f3e MC |
1307 | unsigned char *out, size_t *outlen, |
1308 | const unsigned char *in, size_t inlen); | |
9e4d0f0b DSH |
1309 | int EVP_PKEY_decrypt_init(EVP_PKEY_CTX *ctx); |
1310 | int EVP_PKEY_decrypt(EVP_PKEY_CTX *ctx, | |
0f113f3e MC |
1311 | unsigned char *out, size_t *outlen, |
1312 | const unsigned char *in, size_t inlen); | |
9e4d0f0b | 1313 | |
ffb1ac67 DSH |
1314 | int EVP_PKEY_derive_init(EVP_PKEY_CTX *ctx); |
1315 | int EVP_PKEY_derive_set_peer(EVP_PKEY_CTX *ctx, EVP_PKEY *peer); | |
eaff5a14 | 1316 | int EVP_PKEY_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *keylen); |
ffb1ac67 | 1317 | |
0f113f3e | 1318 | typedef int EVP_PKEY_gen_cb (EVP_PKEY_CTX *ctx); |
f5cda4cb DSH |
1319 | |
1320 | int EVP_PKEY_paramgen_init(EVP_PKEY_CTX *ctx); | |
1321 | int EVP_PKEY_paramgen(EVP_PKEY_CTX *ctx, EVP_PKEY **ppkey); | |
1322 | int EVP_PKEY_keygen_init(EVP_PKEY_CTX *ctx); | |
1323 | int EVP_PKEY_keygen(EVP_PKEY_CTX *ctx, EVP_PKEY **ppkey); | |
1324 | ||
1325 | void EVP_PKEY_CTX_set_cb(EVP_PKEY_CTX *ctx, EVP_PKEY_gen_cb *cb); | |
b28dea4e DSH |
1326 | EVP_PKEY_gen_cb *EVP_PKEY_CTX_get_cb(EVP_PKEY_CTX *ctx); |
1327 | ||
f5cda4cb DSH |
1328 | int EVP_PKEY_CTX_get_keygen_info(EVP_PKEY_CTX *ctx, int idx); |
1329 | ||
ba30bad5 | 1330 | void EVP_PKEY_meth_set_init(EVP_PKEY_METHOD *pmeth, |
0f113f3e | 1331 | int (*init) (EVP_PKEY_CTX *ctx)); |
ba30bad5 | 1332 | |
3207e612 | 1333 | void EVP_PKEY_meth_set_copy(EVP_PKEY_METHOD *pmeth, |
0f113f3e MC |
1334 | int (*copy) (EVP_PKEY_CTX *dst, |
1335 | EVP_PKEY_CTX *src)); | |
3207e612 | 1336 | |
ba30bad5 | 1337 | void EVP_PKEY_meth_set_cleanup(EVP_PKEY_METHOD *pmeth, |
0f113f3e | 1338 | void (*cleanup) (EVP_PKEY_CTX *ctx)); |
ba30bad5 DSH |
1339 | |
1340 | void EVP_PKEY_meth_set_paramgen(EVP_PKEY_METHOD *pmeth, | |
0f113f3e MC |
1341 | int (*paramgen_init) (EVP_PKEY_CTX *ctx), |
1342 | int (*paramgen) (EVP_PKEY_CTX *ctx, | |
1343 | EVP_PKEY *pkey)); | |
ba30bad5 DSH |
1344 | |
1345 | void EVP_PKEY_meth_set_keygen(EVP_PKEY_METHOD *pmeth, | |
0f113f3e MC |
1346 | int (*keygen_init) (EVP_PKEY_CTX *ctx), |
1347 | int (*keygen) (EVP_PKEY_CTX *ctx, | |
1348 | EVP_PKEY *pkey)); | |
ba30bad5 DSH |
1349 | |
1350 | void EVP_PKEY_meth_set_sign(EVP_PKEY_METHOD *pmeth, | |
0f113f3e MC |
1351 | int (*sign_init) (EVP_PKEY_CTX *ctx), |
1352 | int (*sign) (EVP_PKEY_CTX *ctx, | |
1353 | unsigned char *sig, size_t *siglen, | |
1354 | const unsigned char *tbs, | |
1355 | size_t tbslen)); | |
ba30bad5 DSH |
1356 | |
1357 | void EVP_PKEY_meth_set_verify(EVP_PKEY_METHOD *pmeth, | |
0f113f3e MC |
1358 | int (*verify_init) (EVP_PKEY_CTX *ctx), |
1359 | int (*verify) (EVP_PKEY_CTX *ctx, | |
1360 | const unsigned char *sig, | |
1361 | size_t siglen, | |
1362 | const unsigned char *tbs, | |
1363 | size_t tbslen)); | |
ba30bad5 DSH |
1364 | |
1365 | void EVP_PKEY_meth_set_verify_recover(EVP_PKEY_METHOD *pmeth, | |
0f113f3e MC |
1366 | int (*verify_recover_init) (EVP_PKEY_CTX |
1367 | *ctx), | |
1368 | int (*verify_recover) (EVP_PKEY_CTX | |
1369 | *ctx, | |
1370 | unsigned char | |
1371 | *sig, | |
1372 | size_t *siglen, | |
1373 | const unsigned | |
1374 | char *tbs, | |
1375 | size_t tbslen)); | |
ba30bad5 DSH |
1376 | |
1377 | void EVP_PKEY_meth_set_signctx(EVP_PKEY_METHOD *pmeth, | |
0f113f3e MC |
1378 | int (*signctx_init) (EVP_PKEY_CTX *ctx, |
1379 | EVP_MD_CTX *mctx), | |
1380 | int (*signctx) (EVP_PKEY_CTX *ctx, | |
1381 | unsigned char *sig, | |
1382 | size_t *siglen, | |
1383 | EVP_MD_CTX *mctx)); | |
ba30bad5 DSH |
1384 | |
1385 | void EVP_PKEY_meth_set_verifyctx(EVP_PKEY_METHOD *pmeth, | |
0f113f3e MC |
1386 | int (*verifyctx_init) (EVP_PKEY_CTX *ctx, |
1387 | EVP_MD_CTX *mctx), | |
1388 | int (*verifyctx) (EVP_PKEY_CTX *ctx, | |
1389 | const unsigned char *sig, | |
1390 | int siglen, | |
1391 | EVP_MD_CTX *mctx)); | |
ba30bad5 DSH |
1392 | |
1393 | void EVP_PKEY_meth_set_encrypt(EVP_PKEY_METHOD *pmeth, | |
0f113f3e MC |
1394 | int (*encrypt_init) (EVP_PKEY_CTX *ctx), |
1395 | int (*encryptfn) (EVP_PKEY_CTX *ctx, | |
1396 | unsigned char *out, | |
1397 | size_t *outlen, | |
1398 | const unsigned char *in, | |
1399 | size_t inlen)); | |
ba30bad5 DSH |
1400 | |
1401 | void EVP_PKEY_meth_set_decrypt(EVP_PKEY_METHOD *pmeth, | |
0f113f3e MC |
1402 | int (*decrypt_init) (EVP_PKEY_CTX *ctx), |
1403 | int (*decrypt) (EVP_PKEY_CTX *ctx, | |
1404 | unsigned char *out, | |
1405 | size_t *outlen, | |
1406 | const unsigned char *in, | |
1407 | size_t inlen)); | |
ba30bad5 DSH |
1408 | |
1409 | void EVP_PKEY_meth_set_derive(EVP_PKEY_METHOD *pmeth, | |
0f113f3e MC |
1410 | int (*derive_init) (EVP_PKEY_CTX *ctx), |
1411 | int (*derive) (EVP_PKEY_CTX *ctx, | |
1412 | unsigned char *key, | |
1413 | size_t *keylen)); | |
ba30bad5 DSH |
1414 | |
1415 | void EVP_PKEY_meth_set_ctrl(EVP_PKEY_METHOD *pmeth, | |
0f113f3e MC |
1416 | int (*ctrl) (EVP_PKEY_CTX *ctx, int type, int p1, |
1417 | void *p2), | |
1418 | int (*ctrl_str) (EVP_PKEY_CTX *ctx, | |
1419 | const char *type, | |
1420 | const char *value)); | |
ba30bad5 | 1421 | |
ea1d8435 DSH |
1422 | void EVP_add_alg_module(void); |
1423 | ||
d02b48c6 | 1424 | /* BEGIN ERROR CODES */ |
0f113f3e MC |
1425 | /* |
1426 | * The following lines are auto generated by the script mkerr.pl. Any changes | |
6d311938 DSH |
1427 | * made after this point may be overwritten when the script is next run. |
1428 | */ | |
11a57c7b | 1429 | void ERR_load_EVP_strings(void); |
6d311938 | 1430 | |
d02b48c6 RE |
1431 | /* Error codes for the EVP functions. */ |
1432 | ||
1433 | /* Function codes. */ | |
0f113f3e MC |
1434 | # define EVP_F_AESNI_INIT_KEY 165 |
1435 | # define EVP_F_AESNI_XTS_CIPHER 176 | |
1436 | # define EVP_F_AES_INIT_KEY 133 | |
1437 | # define EVP_F_AES_T4_INIT_KEY 178 | |
1438 | # define EVP_F_AES_XTS 172 | |
1439 | # define EVP_F_AES_XTS_CIPHER 175 | |
1440 | # define EVP_F_ALG_MODULE_INIT 177 | |
1441 | # define EVP_F_CAMELLIA_INIT_KEY 159 | |
1442 | # define EVP_F_CMAC_INIT 173 | |
1443 | # define EVP_F_CMLL_T4_INIT_KEY 179 | |
1444 | # define EVP_F_D2I_PKEY 100 | |
1445 | # define EVP_F_DO_SIGVER_INIT 161 | |
1446 | # define EVP_F_DSAPKEY2PKCS8 134 | |
1447 | # define EVP_F_DSA_PKEY2PKCS8 135 | |
1448 | # define EVP_F_ECDSA_PKEY2PKCS8 129 | |
1449 | # define EVP_F_ECKEY_PKEY2PKCS8 132 | |
1450 | # define EVP_F_EVP_CIPHERINIT_EX 123 | |
1451 | # define EVP_F_EVP_CIPHER_CTX_COPY 163 | |
1452 | # define EVP_F_EVP_CIPHER_CTX_CTRL 124 | |
1453 | # define EVP_F_EVP_CIPHER_CTX_SET_KEY_LENGTH 122 | |
1454 | # define EVP_F_EVP_DECRYPTFINAL_EX 101 | |
1455 | # define EVP_F_EVP_DIGESTINIT_EX 128 | |
1456 | # define EVP_F_EVP_ENCRYPTFINAL_EX 127 | |
1457 | # define EVP_F_EVP_MD_CTX_COPY_EX 110 | |
1458 | # define EVP_F_EVP_MD_SIZE 162 | |
1459 | # define EVP_F_EVP_OPENINIT 102 | |
1460 | # define EVP_F_EVP_PBE_ALG_ADD 115 | |
1461 | # define EVP_F_EVP_PBE_ALG_ADD_TYPE 160 | |
1462 | # define EVP_F_EVP_PBE_CIPHERINIT 116 | |
fef034f8 | 1463 | # define EVP_F_EVP_PBE_SCRYPT 181 |
0f113f3e MC |
1464 | # define EVP_F_EVP_PKCS82PKEY 111 |
1465 | # define EVP_F_EVP_PKCS82PKEY_BROKEN 136 | |
1466 | # define EVP_F_EVP_PKEY2PKCS8_BROKEN 113 | |
1467 | # define EVP_F_EVP_PKEY_COPY_PARAMETERS 103 | |
1468 | # define EVP_F_EVP_PKEY_CTX_CTRL 137 | |
1469 | # define EVP_F_EVP_PKEY_CTX_CTRL_STR 150 | |
1470 | # define EVP_F_EVP_PKEY_CTX_DUP 156 | |
1471 | # define EVP_F_EVP_PKEY_DECRYPT 104 | |
1472 | # define EVP_F_EVP_PKEY_DECRYPT_INIT 138 | |
1473 | # define EVP_F_EVP_PKEY_DECRYPT_OLD 151 | |
1474 | # define EVP_F_EVP_PKEY_DERIVE 153 | |
1475 | # define EVP_F_EVP_PKEY_DERIVE_INIT 154 | |
1476 | # define EVP_F_EVP_PKEY_DERIVE_SET_PEER 155 | |
1477 | # define EVP_F_EVP_PKEY_ENCRYPT 105 | |
1478 | # define EVP_F_EVP_PKEY_ENCRYPT_INIT 139 | |
1479 | # define EVP_F_EVP_PKEY_ENCRYPT_OLD 152 | |
1480 | # define EVP_F_EVP_PKEY_GET1_DH 119 | |
1481 | # define EVP_F_EVP_PKEY_GET1_DSA 120 | |
1482 | # define EVP_F_EVP_PKEY_GET1_ECDSA 130 | |
1483 | # define EVP_F_EVP_PKEY_GET1_EC_KEY 131 | |
1484 | # define EVP_F_EVP_PKEY_GET1_RSA 121 | |
1485 | # define EVP_F_EVP_PKEY_KEYGEN 146 | |
1486 | # define EVP_F_EVP_PKEY_KEYGEN_INIT 147 | |
1487 | # define EVP_F_EVP_PKEY_NEW 106 | |
1488 | # define EVP_F_EVP_PKEY_PARAMGEN 148 | |
1489 | # define EVP_F_EVP_PKEY_PARAMGEN_INIT 149 | |
1490 | # define EVP_F_EVP_PKEY_SIGN 140 | |
1491 | # define EVP_F_EVP_PKEY_SIGN_INIT 141 | |
1492 | # define EVP_F_EVP_PKEY_VERIFY 142 | |
1493 | # define EVP_F_EVP_PKEY_VERIFY_INIT 143 | |
1494 | # define EVP_F_EVP_PKEY_VERIFY_RECOVER 144 | |
1495 | # define EVP_F_EVP_PKEY_VERIFY_RECOVER_INIT 145 | |
1496 | # define EVP_F_EVP_RIJNDAEL 126 | |
1497 | # define EVP_F_EVP_SIGNFINAL 107 | |
1498 | # define EVP_F_EVP_VERIFYFINAL 108 | |
1499 | # define EVP_F_FIPS_CIPHERINIT 166 | |
1500 | # define EVP_F_FIPS_CIPHER_CTX_COPY 170 | |
1501 | # define EVP_F_FIPS_CIPHER_CTX_CTRL 167 | |
1502 | # define EVP_F_FIPS_CIPHER_CTX_SET_KEY_LENGTH 171 | |
1503 | # define EVP_F_FIPS_DIGESTINIT 168 | |
1504 | # define EVP_F_FIPS_MD_CTX_COPY 169 | |
1505 | # define EVP_F_HMAC_INIT_EX 174 | |
1506 | # define EVP_F_INT_CTX_NEW 157 | |
1507 | # define EVP_F_PKCS5_PBE_KEYIVGEN 117 | |
1508 | # define EVP_F_PKCS5_V2_PBE_KEYIVGEN 118 | |
1509 | # define EVP_F_PKCS5_V2_PBKDF2_KEYIVGEN 164 | |
e98aa30d | 1510 | # define EVP_F_PKCS5_V2_SCRYPT_KEYIVGEN 180 |
0f113f3e MC |
1511 | # define EVP_F_PKCS8_SET_BROKEN 112 |
1512 | # define EVP_F_PKEY_SET_TYPE 158 | |
1513 | # define EVP_F_RC2_MAGIC_TO_METH 109 | |
1514 | # define EVP_F_RC5_CTRL 125 | |
d02b48c6 RE |
1515 | |
1516 | /* Reason codes. */ | |
0f113f3e MC |
1517 | # define EVP_R_AES_IV_SETUP_FAILED 162 |
1518 | # define EVP_R_AES_KEY_SETUP_FAILED 143 | |
1519 | # define EVP_R_ASN1_LIB 140 | |
1520 | # define EVP_R_BAD_BLOCK_LENGTH 136 | |
1521 | # define EVP_R_BAD_DECRYPT 100 | |
1522 | # define EVP_R_BAD_KEY_LENGTH 137 | |
1523 | # define EVP_R_BN_DECODE_ERROR 112 | |
1524 | # define EVP_R_BN_PUBKEY_ERROR 113 | |
1525 | # define EVP_R_BUFFER_TOO_SMALL 155 | |
1526 | # define EVP_R_CAMELLIA_KEY_SETUP_FAILED 157 | |
1527 | # define EVP_R_CIPHER_PARAMETER_ERROR 122 | |
1528 | # define EVP_R_COMMAND_NOT_SUPPORTED 147 | |
1529 | # define EVP_R_CTRL_NOT_IMPLEMENTED 132 | |
1530 | # define EVP_R_CTRL_OPERATION_NOT_IMPLEMENTED 133 | |
1531 | # define EVP_R_DATA_NOT_MULTIPLE_OF_BLOCK_LENGTH 138 | |
1532 | # define EVP_R_DECODE_ERROR 114 | |
1533 | # define EVP_R_DIFFERENT_KEY_TYPES 101 | |
1534 | # define EVP_R_DIFFERENT_PARAMETERS 153 | |
1535 | # define EVP_R_DISABLED_FOR_FIPS 163 | |
1536 | # define EVP_R_ENCODE_ERROR 115 | |
1537 | # define EVP_R_ERROR_LOADING_SECTION 165 | |
1538 | # define EVP_R_ERROR_SETTING_FIPS_MODE 166 | |
1539 | # define EVP_R_EVP_PBE_CIPHERINIT_ERROR 119 | |
1540 | # define EVP_R_EXPECTING_AN_RSA_KEY 127 | |
1541 | # define EVP_R_EXPECTING_A_DH_KEY 128 | |
1542 | # define EVP_R_EXPECTING_A_DSA_KEY 129 | |
1543 | # define EVP_R_EXPECTING_A_ECDSA_KEY 141 | |
1544 | # define EVP_R_EXPECTING_A_EC_KEY 142 | |
1545 | # define EVP_R_FIPS_MODE_NOT_SUPPORTED 167 | |
e98aa30d | 1546 | # define EVP_R_ILLEGAL_SCRYPT_PARAMETERS 171 |
0f113f3e MC |
1547 | # define EVP_R_INITIALIZATION_ERROR 134 |
1548 | # define EVP_R_INPUT_NOT_INITIALIZED 111 | |
1549 | # define EVP_R_INVALID_DIGEST 152 | |
1550 | # define EVP_R_INVALID_FIPS_MODE 168 | |
1551 | # define EVP_R_INVALID_KEY_LENGTH 130 | |
1552 | # define EVP_R_INVALID_OPERATION 148 | |
1553 | # define EVP_R_IV_TOO_LARGE 102 | |
1554 | # define EVP_R_KEYGEN_FAILURE 120 | |
fef034f8 | 1555 | # define EVP_R_MEMORY_LIMIT_EXCEEDED 172 |
0f113f3e MC |
1556 | # define EVP_R_MESSAGE_DIGEST_IS_NULL 159 |
1557 | # define EVP_R_METHOD_NOT_SUPPORTED 144 | |
1558 | # define EVP_R_MISSING_PARAMETERS 103 | |
1559 | # define EVP_R_NO_CIPHER_SET 131 | |
1560 | # define EVP_R_NO_DEFAULT_DIGEST 158 | |
1561 | # define EVP_R_NO_DIGEST_SET 139 | |
1562 | # define EVP_R_NO_DSA_PARAMETERS 116 | |
1563 | # define EVP_R_NO_KEY_SET 154 | |
1564 | # define EVP_R_NO_OPERATION_SET 149 | |
1565 | # define EVP_R_NO_SIGN_FUNCTION_CONFIGURED 104 | |
1566 | # define EVP_R_NO_VERIFY_FUNCTION_CONFIGURED 105 | |
1567 | # define EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE 150 | |
1568 | # define EVP_R_OPERATON_NOT_INITIALIZED 151 | |
1569 | # define EVP_R_PKCS8_UNKNOWN_BROKEN_TYPE 117 | |
1570 | # define EVP_R_PRIVATE_KEY_DECODE_ERROR 145 | |
1571 | # define EVP_R_PRIVATE_KEY_ENCODE_ERROR 146 | |
1572 | # define EVP_R_PUBLIC_KEY_NOT_RSA 106 | |
1573 | # define EVP_R_TOO_LARGE 164 | |
1574 | # define EVP_R_UNKNOWN_CIPHER 160 | |
1575 | # define EVP_R_UNKNOWN_DIGEST 161 | |
1576 | # define EVP_R_UNKNOWN_OPTION 169 | |
1577 | # define EVP_R_UNKNOWN_PBE_ALGORITHM 121 | |
1578 | # define EVP_R_UNSUPORTED_NUMBER_OF_ROUNDS 135 | |
1579 | # define EVP_R_UNSUPPORTED_ALGORITHM 156 | |
1580 | # define EVP_R_UNSUPPORTED_CIPHER 107 | |
1581 | # define EVP_R_UNSUPPORTED_KEYLENGTH 123 | |
1582 | # define EVP_R_UNSUPPORTED_KEY_DERIVATION_FUNCTION 124 | |
1583 | # define EVP_R_UNSUPPORTED_KEY_SIZE 108 | |
1584 | # define EVP_R_UNSUPPORTED_PRF 125 | |
1585 | # define EVP_R_UNSUPPORTED_PRIVATE_KEY_ALGORITHM 118 | |
1586 | # define EVP_R_UNSUPPORTED_SALT_TYPE 126 | |
1587 | # define EVP_R_WRAP_MODE_NOT_ALLOWED 170 | |
1588 | # define EVP_R_WRONG_FINAL_BLOCK_LENGTH 109 | |
1589 | # define EVP_R_WRONG_PUBLIC_KEY_TYPE 110 | |
6d311938 | 1590 | |
d02b48c6 RE |
1591 | #ifdef __cplusplus |
1592 | } | |
1593 | #endif | |
1594 | #endif |