You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

149 lines
9.3 KiB

/***************************************************************************/
/* */
/* Project: OpenSLP - OpenSource implementation of Service Location */
/* Protocol */
/* */
/* File: slp_crypto.h */
/* */
/* Abstract: Primitive cryptographic functions to support DSA signature */
/* of SHA1 digests. Current implementation is uses the */
/* OpenSSL (http://www.openssl.org)) crypto library. */
/* */
/*-------------------------------------------------------------------------*/
/* */
/* Please submit patches to http://www.openslp.org */
/* */
/*-------------------------------------------------------------------------*/
/* */
/* Copyright (C) 2000 Caldera Systems, Inc */
/* All rights reserved. */
/* */
/* Redistribution and use in source and binary forms, with or without */
/* modification, are permitted provided that the following conditions are */
/* met: */
/* */
/* Redistributions of source code must retain the above copyright */
/* notice, this list of conditions and the following disclaimer. */
/* */
/* Redistributions in binary form must reproduce the above copyright */
/* notice, this list of conditions and the following disclaimer in */
/* the documentation and/or other materials provided with the */
/* distribution. */
/* */
/* Neither the name of Caldera Systems nor the names of its */
/* contributors may be used to endorse or promote products derived */
/* from this software without specific prior written permission. */
/* */
/* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS */
/* `AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT */
/* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR */
/* A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE CALDERA */
/* SYSTEMS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, */
/* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT */
/* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, */
/* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON */
/* ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT */
/* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE */
/* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */
/* */
/***************************************************************************/
#ifndef SLP_CRYPTO_H_INCLUDED
#define SLP_CRYPTO_H_INCLUDED
#include <openssl/dsa.h>
#include <openssl/sha.h>
/*=========================================================================*/
typedef DSA SLPCryptoDSAKey;
/*=========================================================================*/
/*=========================================================================*/
int SLPCryptoSHA1Digest(const unsigned char* data,
int datalen,
unsigned char* digest);
/* Generate a SHA1 digest for the specified block data */
/* */
/* Parameters: data (IN) pointer to buffer that to be hashed */
/* datalen (IN) size of the data buffer in bytes */
/* digest (OUT) pointer to buffer of at least 20 bytes in */
/* size where the digest will be copied */
/* */
/* Returns: zero on success. non-zero on failure */
/*=========================================================================*/
/*=========================================================================*/
SLPCryptoDSAKey* SLPCryptoDSAKeyDup(SLPCryptoDSAKey* dsa);
/* Duplicates the specified key */
/* */
/* Parameters: dsa (IN) the key to duplicate */
/* */
/* Returns: Pointer to the duplicated key. Caller is responsible for */
/* SLPCryptoDSAKeyDestroy()ing the returned pointer */
/*=========================================================================*/
/*=========================================================================*/
void SLPCryptoDSAKeyDestroy(SLPCryptoDSAKey* dsa);
/* Destroy a key that was created by SLPCryptoDSAKeyCreate(). Care should */
/* be taken to make sure all private keys are destroyed */
/* */
/* Parameters: dsa (IN) the key to destroy */
/* */
/* Returns: None */
/*=========================================================================*/
/*=========================================================================*/
int SLPCryptoDSASignLen(SLPCryptoDSAKey* key);
/* Determine the length of a signatures produced with specified key. */
/* */
/* Parameters: key (IN) the key that will be used for signing */
/* */
/* Returns: The length of signatures in bytes */
/*=========================================================================*/
/*=========================================================================*/
int SLPCryptoDSASign(SLPCryptoDSAKey* key,
const unsigned char* digest,
int digestlen,
unsigned char* signature,
int* signaturelen);
/* Sign the specified digest with the specified DSA key */
/* */
/* Parameters: key (IN) Signing (private) key */
/* digest (IN) pointer to digest buffer */
/* digestlen (IN) length of the digest buffer */
/* signature (OUT) buffer that will hold the ASN.1 DER */
/* encoded signature. */
/* signaturelen (OUT) The length of the signature buffer */
/* SLPCryptoDSASignLen(key) should be */
/* called to determine how big signature */
/* should be. */
/* */
/* Returns: zero on success. non-zero on failure */
/*=========================================================================*/
/*=========================================================================*/
int SLPCryptoDSAVerify(SLPCryptoDSAKey* key,
const unsigned char* digest,
int digestlen,
const unsigned char* signature,
int signaturelen);
/* Verify a DSA signature to ensure it matches the specified digest */
/* */
/* Parameters: key (IN) Verifying (public) key */
/* (IN) pointer to the digest buffer */
/* (IN) length of the digest buffer */
/* (IN) the ASN.1 DER encoded signature */
/* (IN) the length of the signature */
/* */
/* Returns: 1 if the signature is valid, 0 of it is not */
/*=========================================================================*/
#endif