summaryrefslogtreecommitdiffstats
path: root/userspace/ncrypto_generate_params.c
diff options
context:
space:
mode:
Diffstat (limited to 'userspace/ncrypto_generate_params.c')
-rw-r--r--userspace/ncrypto_generate_params.c182
1 files changed, 182 insertions, 0 deletions
diff --git a/userspace/ncrypto_generate_params.c b/userspace/ncrypto_generate_params.c
new file mode 100644
index 0000000..a993360
--- /dev/null
+++ b/userspace/ncrypto_generate_params.c
@@ -0,0 +1,182 @@
+/*
+ * Copyright 2010 Red Hat, Inc.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions are met:
+ *
+ * 1. Redistributions of source code must retain the above copyright notice,
+ * this list of conditions and the following disclaimer.
+ *
+ * 2. Redistributions in binary form must reproduce the above copyright notice,
+ * this list of conditions and the following disclaimer in the documentation
+ * and/or other materials provided with the distribution.
+ *
+ * THIS SOFTWARE IS PROVIDED BY RED HAT, INC. AND CONTRIBUTORS ``AS IS'' AND
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+ * ARE DISCLAIMED. IN NO EVENT SHALL RED HAT, INC. OR CONTRIBUTORS BE LIABLE
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
+ * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
+ * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
+ * DAMAGE.
+ *
+ * Red Hat authors: Jan Chadima <jchadima@redhat.com>
+ * Miloslav Trmač <mitr@redhat.com
+ */
+
+#include <limits.h>
+#include <stdint.h>
+#include <sys/types.h>
+#include <stdlib.h>
+#include <errno.h>
+#include <linux/ncr.h>
+#include "ncrypto.h"
+
+int
+ncr_key_generate_params_init(ncr_key_generate_params_t *params)
+{
+ ncr_key_generate_params_t rv;
+
+ if (!params) {
+ errno = EINVAL;
+ return -1;
+ }
+
+ if (!(rv = calloc(1, sizeof(*rv)))) {
+ errno = ENOMEM;
+ return -1;
+ }
+
+ rv->algorithm = NCR_ALG_NONE;
+ *params = rv;
+
+ return 0;
+}
+
+int
+ncr_key_generate_params_deinit(ncr_key_generate_params_t params)
+{
+ if (params)
+ free(params);
+
+ return 0;
+}
+
+int
+ncr_key_generate_params_set_algorithm(ncr_key_generate_params_t params, ncr_algorithm_t algorithm)
+{
+ if (!params) {
+ errno = EINVAL;
+ return -1;
+ }
+
+ params->algorithm = algorithm;
+
+ return 0;
+}
+
+int
+ncr_key_generate_params_set_keyflags(ncr_key_generate_params_t params, unsigned int keyflags)
+{
+ if (!params) {
+ errno = EINVAL;
+ return -1;
+ }
+
+ params->keyflags = keyflags;
+
+ return 0;
+}
+
+int
+ncr_key_generate_params_set_secret_bits(ncr_key_generate_params_t params, unsigned int bits)
+{
+ if (!params) {
+ errno = EINVAL;
+ return -1;
+ }
+ params->params.secret.bits = bits;
+
+ return 0;
+}
+
+int
+ncr_key_generate_params_set_rsa_bits(ncr_key_generate_params_t params, unsigned int bits)
+{
+ if (!params) {
+ errno = EINVAL;
+ return -1;
+ }
+ params->params.rsa.bits = bits;
+
+ return 0;
+}
+
+int
+ncr_key_generate_params_set_rsa_e(ncr_key_generate_params_t params, void *e, size_t e_size)
+{
+ unsigned long value;
+ const uint8_t *p;
+
+ if (!params || !e) {
+ errno = EINVAL;
+ return -1;
+ }
+ value = 0;
+ for (p = e; p < (const uint8_t *)e + e_size; p++) {
+ if (value > (ULONG_MAX - *p) / 256) {
+ errno = EOVERFLOW;
+ return -1;
+ }
+ value = value * 256 + *p;
+ }
+
+ params->params.rsa.e = value;
+ return 0;
+}
+
+int
+ncr_key_generate_params_set_dsa_p_bits(ncr_key_generate_params_t params,
+ unsigned int p_bits)
+{
+ if (!params) {
+ errno = EINVAL;
+ return -1;
+ }
+ params->params.dsa.p_bits = p_bits;
+
+ return 0;
+}
+
+int
+ncr_key_generate_params_set_dsa_q_bits(ncr_key_generate_params_t params,
+ unsigned int q_bits)
+{
+ if (!params) {
+ errno = EINVAL;
+ return -1;
+ }
+ params->params.dsa.q_bits = q_bits;
+
+ return 0;
+}
+
+int
+ncr_key_generate_params_set_dh(ncr_key_generate_params_t params, void *p, size_t p_size, void *g, size_t g_size)
+{
+ if (!params) {
+ errno = EINVAL;
+ return -1;
+ }
+
+ params->params.dh.p = p;
+ params->params.dh.p_size = p_size;
+ params->params.dh.g = g;
+ params->params.dh.g_size = g_size;
+
+ return 0;
+}
+