/* * Copyright 2010 Red Hat, Inc. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions are met: * * 1. Redistributions of source code must retain the above copyright notice, * this list of conditions and the following disclaimer. * * 2. Redistributions in binary form must reproduce the above copyright notice, * this list of conditions and the following disclaimer in the documentation * and/or other materials provided with the distribution. * * THIS SOFTWARE IS PROVIDED BY RED HAT, INC. AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL RED HAT, INC. OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH * DAMAGE. * * Red Hat authors: Jan Chadima * Miloslav Trmač #include #include #include #include #include #include "ncrypto.h" int ncr_key_generate_params_init(ncr_key_generate_params_t *params) { ncr_key_generate_params_t rv; if (!params) { errno = EINVAL; return -1; } if (!(rv = calloc(1, sizeof(*rv)))) { errno = ENOMEM; return -1; } rv->algorithm = NCR_ALG_NONE; *params = rv; return 0; } int ncr_key_generate_params_deinit(ncr_key_generate_params_t params) { if (params) free(params); return 0; } int ncr_key_generate_params_set_algorithm(ncr_key_generate_params_t params, ncr_algorithm_t algorithm) { if (!params) { errno = EINVAL; return -1; } params->algorithm = algorithm; return 0; } int ncr_key_generate_params_set_keyflags(ncr_key_generate_params_t params, unsigned int keyflags) { if (!params) { errno = EINVAL; return -1; } params->keyflags = keyflags; return 0; } int ncr_key_generate_params_set_secret_bits(ncr_key_generate_params_t params, unsigned int bits) { if (!params) { errno = EINVAL; return -1; } params->params.secret.bits = bits; return 0; } int ncr_key_generate_params_set_rsa_bits(ncr_key_generate_params_t params, unsigned int bits) { if (!params) { errno = EINVAL; return -1; } params->params.rsa.bits = bits; return 0; } int ncr_key_generate_params_set_rsa_e(ncr_key_generate_params_t params, void *e, size_t e_size) { unsigned long value; const uint8_t *p; if (!params || !e) { errno = EINVAL; return -1; } value = 0; for (p = e; p < (const uint8_t *)e + e_size; p++) { if (value > (ULONG_MAX - *p) / 256) { errno = EOVERFLOW; return -1; } value = value * 256 + *p; } params->params.rsa.e = value; return 0; } int ncr_key_generate_params_set_dsa_p_bits(ncr_key_generate_params_t params, unsigned int p_bits) { if (!params) { errno = EINVAL; return -1; } params->params.dsa.p_bits = p_bits; return 0; } int ncr_key_generate_params_set_dsa_q_bits(ncr_key_generate_params_t params, unsigned int q_bits) { if (!params) { errno = EINVAL; return -1; } params->params.dsa.q_bits = q_bits; return 0; } int ncr_key_generate_params_set_dh(ncr_key_generate_params_t params, void *p, size_t p_size, void *g, size_t g_size) { if (!params) { errno = EINVAL; return -1; } params->params.dh.p = p; params->params.dh.p_size = p_size; params->params.dh.g = g; params->params.dh.g_size = g_size; return 0; }