PolarSSL v1.2.7
openssl.h
Go to the documentation of this file.
1 
27 /*
28  * OpenSSL wrapper contributed by David Barett
29  */
30 #ifndef POLARSSL_OPENSSL_H
31 #define POLARSSL_OPENSSL_H
32 
33 #include "aes.h"
34 #include "md5.h"
35 #include "rsa.h"
36 #include "sha1.h"
37 
38 #define AES_SIZE 16
39 #define AES_BLOCK_SIZE 16
40 #define AES_KEY aes_context
41 #define MD5_CTX md5_context
42 #define SHA_CTX sha1_context
43 
44 #define SHA1_Init( CTX ) \
45  sha1_starts( (CTX) )
46 #define SHA1_Update( CTX, BUF, LEN ) \
47  sha1_update( (CTX), (unsigned char *)(BUF), (LEN) )
48 #define SHA1_Final( OUT, CTX ) \
49  sha1_finish( (CTX), (OUT) )
50 
51 #define MD5_Init( CTX ) \
52  md5_starts( (CTX) )
53 #define MD5_Update( CTX, BUF, LEN ) \
54  md5_update( (CTX), (unsigned char *)(BUF), (LEN) )
55 #define MD5_Final( OUT, CTX ) \
56  md5_finish( (CTX), (OUT) )
57 
58 #define AES_set_encrypt_key( KEY, KEYSIZE, CTX ) \
59  aes_setkey_enc( (CTX), (KEY), (KEYSIZE) )
60 #define AES_set_decrypt_key( KEY, KEYSIZE, CTX ) \
61  aes_setkey_dec( (CTX), (KEY), (KEYSIZE) )
62 #define AES_cbc_encrypt( INPUT, OUTPUT, LEN, CTX, IV, MODE ) \
63  aes_crypt_cbc( (CTX), (MODE), (LEN), (IV), (INPUT), (OUTPUT) )
64 
65 /*
66  * RSA stuff follows. TODO: needs cleanup
67  */
68 inline int __RSA_Passthrough( void *output, void *input, int size )
69 {
70  memcpy( output, input, size );
71  return size;
72 }
73 
74 inline rsa_context* d2i_RSA_PUBKEY( void *ignore, unsigned char **bufptr,
75  int len )
76 {
77  unsigned char *buffer = *(unsigned char **) bufptr;
78  rsa_context *rsa;
79 
80  /*
81  * Not a general-purpose parser: only parses public key from *exactly*
82  * openssl genrsa -out privkey.pem 512 (or 1024)
83  * openssl rsa -in privkey.pem -out privatekey.der -outform der
84  * openssl rsa -in privkey.pem -out pubkey.der -outform der -pubout
85  *
86  * TODO: make a general-purpose parse
87  */
88  if( ignore != 0 || ( len != 94 && len != 162 ) )
89  return( 0 );
90 
91  rsa = (rsa_context *) malloc( sizeof( rsa_rsa ) );
92  if( rsa == NULL )
93  return( 0 );
94 
95  memset( rsa, 0, sizeof( rsa_context ) );
96 
97  if( ( len == 94 &&
98  mpi_read_binary( &rsa->N, &buffer[ 25], 64 ) == 0 &&
99  mpi_read_binary( &rsa->E, &buffer[ 91], 3 ) == 0 ) ||
100  ( len == 162 &&
101  mpi_read_binary( &rsa->N, &buffer[ 29], 128 ) == 0 ) &&
102  mpi_read_binary( &rsa->E, &buffer[159], 3 ) == 0 )
103  {
104  /*
105  * key read successfully
106  */
107  rsa->len = ( mpi_msb( &rsa->N ) + 7 ) >> 3;
108  return( rsa );
109  }
110  else
111  {
112  memset( rsa, 0, sizeof( rsa_context ) );
113  free( rsa );
114  return( 0 );
115  }
116 }
117 
118 #define RSA rsa_context
119 #define RSA_PKCS1_PADDING 1 /* ignored; always encrypt with this */
120 #define RSA_size( CTX ) (CTX)->len
121 #define RSA_free( CTX ) rsa_free( CTX )
122 #define ERR_get_error( ) "ERR_get_error() not supported"
123 #define RSA_blinding_off( IGNORE )
124 
125 #define d2i_RSAPrivateKey( a, b, c ) new rsa_context /* TODO: C++ bleh */
126 
127 inline int RSA_public_decrypt ( int size, unsigned char* input, unsigned char* output, RSA* key, int ignore ) { int outsize=size; if( !rsa_pkcs1_decrypt( key, RSA_PUBLIC, &outsize, input, output ) ) return outsize; else return -1; }
128 inline int RSA_private_decrypt( int size, unsigned char* input, unsigned char* output, RSA* key, int ignore ) { int outsize=size; if( !rsa_pkcs1_decrypt( key, RSA_PRIVATE, &outsize, input, output ) ) return outsize; else return -1; }
129 inline int RSA_public_encrypt ( int size, unsigned char* input, unsigned char* output, RSA* key, int ignore ) { if( !rsa_pkcs1_encrypt( key, RSA_PUBLIC, size, input, output ) ) return RSA_size(key); else return -1; }
130 inline int RSA_private_encrypt( int size, unsigned char* input, unsigned char* output, RSA* key, int ignore ) { if( !rsa_pkcs1_encrypt( key, RSA_PRIVATE, size, input, output ) ) return RSA_size(key); else return -1; }
131 
132 #ifdef __cplusplus
133 }
134 #endif
135 
136 #endif /* openssl.h */