1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
|
#include <limits.h>
#include <sys/types.h>
#include <stdlib.h>
#include <errno.h>
#include <linux/ncr.h>
#include "ncrypto.h"
int
ncr_key_generate_params_init(ncr_key_generate_params_t *params)
{
ncr_key_generate_params_t rv;
if (!params) {
errno = EINVAL;
return -1;
}
if (!(rv = calloc(1, sizeof(*rv)))) {
errno = ENOMEM;
return -1;
}
rv->algorithm = NCR_ALG_NONE;
*params = rv;
return 0;
}
int
ncr_key_generate_params_deinit(ncr_key_generate_params_t params)
{
if (params)
free(params);
return 0;
}
int
ncr_key_generate_params_set_algorithm(ncr_key_generate_params_t params, ncr_algorithm_t algorithm)
{
if (!params) {
errno = EINVAL;
return -1;
}
params->algorithm = algorithm;
return 0;
}
int
ncr_key_generate_params_set_keyflags(ncr_key_generate_params_t params, unsigned int keyflags)
{
if (!params) {
errno = EINVAL;
return -1;
}
params->keyflags = keyflags;
return 0;
}
int
ncr_key_generate_params_set_secret_bits(ncr_key_generate_params_t params, unsigned int bits)
{
if (!params) {
errno = EINVAL;
return -1;
}
params->params.secret.bits = bits;
return 0;
}
int
ncr_key_generate_params_set_rsa_bits(ncr_key_generate_params_t params, unsigned int bits)
{
if (!params) {
errno = EINVAL;
return -1;
}
params->params.rsa.bits = bits;
return 0;
}
int
ncr_key_generate_params_set_rsa_e(ncr_key_generate_params_t params, void *e, size_t e_size)
{
unsigned long value;
const uint8_t *p;
if (!params || !e) {
errno = EINVAL;
return -1;
}
value = 0;
for (p = e; p < (const uint8_t *)e + e_size; p++) {
if (value > (ULONG_MAX - *p) / 256) {
errno = EOVERFLOW;
return -1;
}
value = value * 256 + *p;
}
params->params.rsa.e = value;
return 0;
}
int
ncr_key_generate_params_set_dsa_p_bits(ncr_key_generate_params_t params,
unsigned int p_bits)
{
if (!params) {
errno = EINVAL;
return -1;
}
params->params.dsa.p_bits = p_bits;
return 0;
}
int
ncr_key_generate_params_set_dsa_q_bits(ncr_key_generate_params_t params,
unsigned int q_bits)
{
if (!params) {
errno = EINVAL;
return -1;
}
params->params.dsa.q_bits = q_bits;
return 0;
}
int
ncr_key_generate_params_set_dh(ncr_key_generate_params_t params, void *p, size_t p_size, void *g, size_t g_size)
{
if (!params) {
errno = EINVAL;
return -1;
}
params->params.dh.p = p;
params->params.dh.p_size = p_size;
params->params.dh.g = g;
params->params.dh.g_size = g_size;
return 0;
}
|