1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
|
/*
* Copyright 2010 Red Hat, Inc.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions are met:
*
* 1. Redistributions of source code must retain the above copyright notice,
* this list of conditions and the following disclaimer.
*
* 2. Redistributions in binary form must reproduce the above copyright notice,
* this list of conditions and the following disclaimer in the documentation
* and/or other materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY RED HAT, INC. AND CONTRIBUTORS ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL RED HAT, INC. OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
* SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
* CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
* DAMAGE.
*
* Red Hat authors: Jan Chadima <jchadima@redhat.com>
* Miloslav Trmač <mitr@redhat.com
*/
#include <sys/types.h>
#include <stdlib.h>
#include <string.h>
#include <errno.h>
#include <linux/ncr.h>
#include "ncrypto.h"
int
ncr_key_params_init(ncr_key_params_t *params)
{
ncr_key_params_t rv;
if (!params) {
errno = EINVAL;
return -1;
}
if (!(rv = calloc(1, sizeof(*rv)))) {
errno = ENOMEM;
return -1;
}
*params = rv;
return 0;
}
void
ncr_key_params_deinit(ncr_key_params_t params)
{
if (params)
free(params);
}
int
ncr_key_params_set_cipher_iv(ncr_key_params_t params, void* iv, unsigned int iv_size)
{
if (!params) {
errno = EINVAL;
return -1;
}
if (iv_size > NCR_CIPHER_MAX_BLOCK_LEN) {
errno = EOVERFLOW;
return -1;
}
memmove(params->params.cipher.iv, iv, iv_size);
params->params.cipher.iv_size = iv_size;
return 0;
}
int
ncr_key_params_set_dh_pub(ncr_key_params_t params, void *pub, size_t pub_size)
{
if (!params || !pub || !pub_size) {
errno = EINVAL;
return -1;
}
params->params.dh.pub = pub;
params->params.dh.pub_size = pub_size;
return 0;
}
int
ncr_key_params_set_rsa_type(ncr_key_params_t params, ncr_rsa_type_t type)
{
if (!params) {
errno = EINVAL;
return -1;
}
params->params.rsa.type = type;
return 0;
}
int
ncr_key_params_set_rsa_oaep_hash(ncr_key_params_t params,
ncr_algorithm_t oaep_hash)
{
if (!params) {
errno = EINVAL;
return -1;
}
params->params.rsa.oaep_hash = oaep_hash;
return 0;
}
int
ncr_key_params_set_rsa_sign_hash(ncr_key_params_t params,
ncr_algorithm_t sign_hash)
{
if (!params) {
errno = EINVAL;
return -1;
}
params->params.rsa.sign_hash = sign_hash;
return 0;
}
int
ncr_key_params_set_rsa_pss_salt(ncr_key_params_t params, unsigned int pss_salt)
{
if (!params) {
errno = EINVAL;
return -1;
}
params->params.rsa.pss_salt = pss_salt;
return 0;
}
int
ncr_key_params_set_dsa_sign_hash(ncr_key_params_t params,
ncr_algorithm_t sign_hash)
{
if (!params) {
errno = EINVAL;
return -1;
}
params->params.dsa.sign_hash = sign_hash;
return 0;
}
|