1
0
mirror of git://git.gnupg.org/gnupg.git synced 2024-11-10 21:38:50 +01:00
gnupg/include/cipher.h

179 lines
6.0 KiB
C
Raw Normal View History

1997-11-18 15:06:00 +01:00
/* cipher.h
1998-06-16 17:13:28 +02:00
* Copyright (C) 1998 Free Software Foundation, Inc.
1997-11-18 15:06:00 +01:00
*
1998-06-16 17:13:28 +02:00
* This file is part of GNUPG.
1997-11-18 15:06:00 +01:00
*
1998-06-16 17:13:28 +02:00
* GNUPG is free software; you can redistribute it and/or modify
1997-11-18 15:06:00 +01:00
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
1998-06-16 17:13:28 +02:00
* GNUPG is distributed in the hope that it will be useful,
1997-11-18 15:06:00 +01:00
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA
*/
#ifndef G10_CIPHER_H
#define G10_CIPHER_H
1998-06-13 19:00:02 +02:00
#define DBG_CIPHER g10c_debug_mode
1997-11-18 15:06:00 +01:00
#include "mpi.h"
1998-03-09 22:44:06 +01:00
#include "../cipher/random.h"
1997-11-18 15:06:00 +01:00
1997-11-24 23:24:04 +01:00
#define CIPHER_ALGO_NONE 0
#define CIPHER_ALGO_IDEA 1
#define CIPHER_ALGO_3DES 2
1998-06-09 17:14:06 +02:00
#define CIPHER_ALGO_CAST5 3
1998-04-30 16:06:01 +02:00
#define CIPHER_ALGO_BLOWFISH 4 /* blowfish 128 bit key */
1998-05-26 15:38:00 +02:00
#define CIPHER_ALGO_SAFER_SK128 5
#define CIPHER_ALGO_DES_SK 6
1998-04-30 16:06:01 +02:00
#define CIPHER_ALGO_BLOWFISH160 42 /* blowfish 160 bit key (not in OpenPGP)*/
#define CIPHER_ALGO_SKIPJACK 101 /* experimental: skipjack */
1998-07-29 21:35:05 +02:00
#define CIPHER_ALGO_TWOFISH 102 /* experimental: twofish 128 bit */
1998-05-26 15:38:00 +02:00
#define CIPHER_ALGO_DUMMY 110 /* no encryption at all */
1997-11-18 15:06:00 +01:00
1997-12-01 11:33:23 +01:00
#define PUBKEY_ALGO_RSA 1
#define PUBKEY_ALGO_RSA_E 2 /* RSA encrypt only */
#define PUBKEY_ALGO_RSA_S 3 /* RSA sign only */
1998-05-04 20:49:26 +02:00
#define PUBKEY_ALGO_ELGAMAL_E 16 /* encrypt only ElGamal (but not vor v3)*/
1997-12-01 11:33:23 +01:00
#define PUBKEY_ALGO_DSA 17
1998-05-04 20:49:26 +02:00
#define PUBKEY_ALGO_ELGAMAL 20 /* sign and encrypt elgamal */
1997-11-18 15:06:00 +01:00
1998-07-08 11:29:43 +02:00
#define PUBKEY_USAGE_SIG 1 /* key is good for signatures */
#define PUBKEY_USAGE_ENC 2 /* key is good for encryption */
1997-11-18 15:06:00 +01:00
#define DIGEST_ALGO_MD5 1
1997-11-24 23:24:04 +01:00
#define DIGEST_ALGO_SHA1 2
#define DIGEST_ALGO_RMD160 3
1998-05-26 15:38:00 +02:00
#define DIGEST_ALGO_TIGER 6
1997-11-18 15:06:00 +01:00
1998-05-04 20:49:26 +02:00
#define is_RSA(a) ((a)==PUBKEY_ALGO_RSA || (a)==PUBKEY_ALGO_RSA_E \
|| (a)==PUBKEY_ALGO_RSA_S )
#define is_ELGAMAL(a) ((a)==PUBKEY_ALGO_ELGAMAL || (a)==PUBKEY_ALGO_ELGAMAL_E)
1997-11-18 15:06:00 +01:00
typedef struct {
int algo;
int keylen;
1998-09-18 17:24:53 +02:00
byte key[24]; /* this is the largest used keylen (3des) */
1997-11-18 15:06:00 +01:00
} DEK;
1998-04-07 20:16:10 +02:00
typedef struct cipher_handle_s *CIPHER_HANDLE;
#ifndef DEFINES_CIPHER_HANDLE
struct cipher_handle_s { char does_not_matter[1]; };
#endif
#define CIPHER_MODE_ECB 1
#define CIPHER_MODE_CFB 2
#define CIPHER_MODE_PHILS_CFB 3
#define CIPHER_MODE_AUTO_CFB 4
1998-05-26 15:38:00 +02:00
#define CIPHER_MODE_DUMMY 5 /* used with algo DUMMY for no encryption */
1998-04-07 20:16:10 +02:00
1997-11-18 15:06:00 +01:00
1998-06-16 17:13:28 +02:00
#define MD_BUFFER_SIZE 512
typedef struct {
byte buffer[MD_BUFFER_SIZE];
int bufcount;
int secure;
FILE *debug;
struct md_digest_list_s *list;
} *MD_HANDLE;
#ifndef DEFINES_MD_HANDLE /* not really the handle but the algorithm list */
struct md_digest_list_s { char does_not_matter[1]; };
#endif
1998-06-13 19:00:02 +02:00
int g10c_debug_mode;
int g10_opt_verbose;
1997-11-18 15:06:00 +01:00
1998-06-11 09:16:50 +02:00
/*-- dynload.c --*/
1998-10-16 18:00:17 +02:00
void register_cipher_extension( const char *mainpgm, const char *fname );
1998-06-11 09:16:50 +02:00
1998-06-16 17:13:28 +02:00
/*-- md.c --*/
int string_to_digest_algo( const char *string );
const char * digest_algo_to_string( int algo );
int check_digest_algo( int algo );
MD_HANDLE md_open( int algo, int secure );
void md_enable( MD_HANDLE hd, int algo );
MD_HANDLE md_copy( MD_HANDLE a );
1998-09-28 21:25:31 +02:00
void md_reset( MD_HANDLE a );
1998-06-16 17:13:28 +02:00
void md_close(MD_HANDLE a);
void md_write( MD_HANDLE a, byte *inbuf, size_t inlen);
void md_final(MD_HANDLE a);
byte *md_read( MD_HANDLE a, int algo );
1998-09-28 21:25:31 +02:00
int md_digest( MD_HANDLE a, int algo, byte *buffer, int buflen );
1998-06-16 17:13:28 +02:00
int md_get_algo( MD_HANDLE a );
int md_digest_length( int algo );
const byte *md_asn_oid( int algo, size_t *asnlen, size_t *mdlen );
void md_start_debug( MD_HANDLE a, const char *suffix );
void md_stop_debug( MD_HANDLE a );
#define md_is_secure(a) ((a)->secure)
#define md_putc(h,c) \
do { \
if( (h)->bufcount == MD_BUFFER_SIZE ) \
md_write( (h), NULL, 0 ); \
(h)->buffer[(h)->bufcount++] = (c) & 0xff; \
} while(0)
1998-07-09 15:37:17 +02:00
/*-- rmd160.c --*/
void rmd160_hash_buffer( char *outbuf, const char *buffer, size_t length );
1998-06-16 17:13:28 +02:00
1998-04-07 20:16:10 +02:00
/*-- cipher.c --*/
int string_to_cipher_algo( const char *string );
const char * cipher_algo_to_string( int algo );
int check_cipher_algo( int algo );
1998-04-30 16:06:01 +02:00
unsigned cipher_get_keylen( int algo );
1998-07-29 21:35:05 +02:00
unsigned cipher_get_blocksize( int algo );
1998-04-07 20:16:10 +02:00
CIPHER_HANDLE cipher_open( int algo, int mode, int secure );
void cipher_close( CIPHER_HANDLE c );
1998-09-14 17:49:56 +02:00
int cipher_setkey( CIPHER_HANDLE c, byte *key, unsigned keylen );
1998-04-07 20:16:10 +02:00
void cipher_setiv( CIPHER_HANDLE c, const byte *iv );
void cipher_encrypt( CIPHER_HANDLE c, byte *out, byte *in, unsigned nbytes );
void cipher_decrypt( CIPHER_HANDLE c, byte *out, byte *in, unsigned nbytes );
void cipher_sync( CIPHER_HANDLE c );
1998-06-13 08:59:14 +02:00
/*-- pubkey.c --*/
#define PUBKEY_MAX_NPKEY 4
#define PUBKEY_MAX_NSKEY 6
#define PUBKEY_MAX_NSIG 2
#define PUBKEY_MAX_NENC 2
1998-06-13 19:00:02 +02:00
int string_to_pubkey_algo( const char *string );
const char * pubkey_algo_to_string( int algo );
int check_pubkey_algo( int algo );
int check_pubkey_algo2( int algo, unsigned usage );
1998-06-13 08:59:14 +02:00
int pubkey_get_npkey( int algo );
int pubkey_get_nskey( int algo );
int pubkey_get_nsig( int algo );
int pubkey_get_nenc( int algo );
unsigned pubkey_nbits( int algo, MPI *pkey );
1998-06-13 19:00:02 +02:00
int pubkey_generate( int algo, unsigned nbits, MPI *skey, MPI **retfactors );
1998-06-13 08:59:14 +02:00
int pubkey_check_secret_key( int algo, MPI *skey );
int pubkey_encrypt( int algo, MPI *resarr, MPI data, MPI *pkey );
int pubkey_decrypt( int algo, MPI *result, MPI *data, MPI *skey );
int pubkey_sign( int algo, MPI *resarr, MPI hash, MPI *skey );
int pubkey_verify( int algo, MPI hash, MPI *data, MPI *pkey,
int (*cmp)(void *, MPI), void *opaque );
1998-06-13 08:59:14 +02:00
1997-11-18 15:06:00 +01:00
/*-- smallprime.c --*/
extern ushort small_prime_numbers[];
/*-- primegen.c --*/
1997-11-24 23:24:04 +01:00
MPI generate_secret_prime( unsigned nbits );
MPI generate_public_prime( unsigned nbits );
1998-05-05 22:34:20 +02:00
MPI generate_elg_prime( int mode, unsigned pbits, unsigned qbits,
MPI g, MPI **factors );
1997-11-18 15:06:00 +01:00
#endif /*G10_CIPHER_H*/