blob: 4423857d06fab1863a6355bc719e28b336ed7c09 [file] [log] [blame]
Paul Bakker5121ce52009-01-03 21:22:43 +00001/**
2 * \file openssl.h
Paul Bakkere0ccd0a2009-01-04 16:27:10 +00003 *
Paul Bakker37ca75d2011-01-06 12:28:03 +00004 * \brief OpenSSL wrapper (definitions, inline functions).
5 *
Paul Bakker84f12b72010-07-18 10:13:04 +00006 * Copyright (C) 2006-2010, Brainspark B.V.
Paul Bakkerb96f1542010-07-18 20:36:00 +00007 *
8 * This file is part of PolarSSL (http://www.polarssl.org)
Paul Bakker84f12b72010-07-18 10:13:04 +00009 * Lead Maintainer: Paul Bakker <polarssl_maintainer at polarssl.org>
Paul Bakkerb96f1542010-07-18 20:36:00 +000010 *
Paul Bakker77b385e2009-07-28 17:23:11 +000011 * All rights reserved.
Paul Bakkere0ccd0a2009-01-04 16:27:10 +000012 *
Paul Bakkere0ccd0a2009-01-04 16:27:10 +000013 * This program is free software; you can redistribute it and/or modify
14 * it under the terms of the GNU General Public License as published by
15 * the Free Software Foundation; either version 2 of the License, or
16 * (at your option) any later version.
17 *
18 * This program is distributed in the hope that it will be useful,
19 * but WITHOUT ANY WARRANTY; without even the implied warranty of
20 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
21 * GNU General Public License for more details.
22 *
23 * You should have received a copy of the GNU General Public License along
24 * with this program; if not, write to the Free Software Foundation, Inc.,
25 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
Paul Bakker5121ce52009-01-03 21:22:43 +000026 */
27/*
28 * OpenSSL wrapper contributed by David Barett
29 */
Paul Bakker40e46942009-01-03 21:51:57 +000030#ifndef POLARSSL_OPENSSL_H
31#define POLARSSL_OPENSSL_H
Paul Bakker5121ce52009-01-03 21:22:43 +000032
Paul Bakker8e831ed2009-01-03 21:24:11 +000033#include "polarssl/aes.h"
34#include "polarssl/md5.h"
35#include "polarssl/rsa.h"
36#include "polarssl/sha1.h"
Paul Bakker5121ce52009-01-03 21:22:43 +000037
38#define AES_SIZE 16
39#define AES_BLOCK_SIZE 16
40#define AES_KEY aes_context
41#define MD5_CTX md5_context
42#define SHA_CTX sha1_context
43
44#define SHA1_Init( CTX ) \
45 sha1_starts( (CTX) )
46#define SHA1_Update( CTX, BUF, LEN ) \
47 sha1_update( (CTX), (unsigned char *)(BUF), (LEN) )
48#define SHA1_Final( OUT, CTX ) \
49 sha1_finish( (CTX), (OUT) )
50
51#define MD5_Init( CTX ) \
52 md5_starts( (CTX) )
53#define MD5_Update( CTX, BUF, LEN ) \
54 md5_update( (CTX), (unsigned char *)(BUF), (LEN) )
55#define MD5_Final( OUT, CTX ) \
56 md5_finish( (CTX), (OUT) )
57
58#define AES_set_encrypt_key( KEY, KEYSIZE, CTX ) \
59 aes_setkey_enc( (CTX), (KEY), (KEYSIZE) )
60#define AES_set_decrypt_key( KEY, KEYSIZE, CTX ) \
61 aes_setkey_dec( (CTX), (KEY), (KEYSIZE) )
62#define AES_cbc_encrypt( INPUT, OUTPUT, LEN, CTX, IV, MODE ) \
63 aes_crypt_cbc( (CTX), (MODE), (LEN), (IV), (INPUT), (OUTPUT) )
64
65/*
66 * RSA stuff follows. TODO: needs cleanup
67 */
68inline int __RSA_Passthrough( void *output, void *input, int size )
69{
70 memcpy( output, input, size );
71 return size;
72}
73
74inline rsa_context* d2i_RSA_PUBKEY( void *ignore, unsigned char **bufptr,
75 int len )
76{
77 unsigned char *buffer = *(unsigned char **) bufptr;
78 rsa_context *rsa;
79
80 /*
81 * Not a general-purpose parser: only parses public key from *exactly*
82 * openssl genrsa -out privkey.pem 512 (or 1024)
83 * openssl rsa -in privkey.pem -out privatekey.der -outform der
84 * openssl rsa -in privkey.pem -out pubkey.der -outform der -pubout
85 *
86 * TODO: make a general-purpose parse
87 */
88 if( ignore != 0 || ( len != 94 && len != 162 ) )
89 return( 0 );
90
91 rsa = (rsa_context *) malloc( sizeof( rsa_rsa ) );
92 if( rsa == NULL )
93 return( 0 );
94
95 memset( rsa, 0, sizeof( rsa_context ) );
96
97 if( ( len == 94 &&
98 mpi_read_binary( &rsa->N, &buffer[ 25], 64 ) == 0 &&
99 mpi_read_binary( &rsa->E, &buffer[ 91], 3 ) == 0 ) ||
100 ( len == 162 &&
101 mpi_read_binary( &rsa->N, &buffer[ 29], 128 ) == 0 ) &&
102 mpi_read_binary( &rsa->E, &buffer[159], 3 ) == 0 )
103 {
104 /*
105 * key read successfully
106 */
107 rsa->len = ( mpi_msb( &rsa->N ) + 7 ) >> 3;
108 return( rsa );
109 }
110 else
111 {
112 memset( rsa, 0, sizeof( rsa_context ) );
113 free( rsa );
114 return( 0 );
115 }
116}
117
118#define RSA rsa_context
119#define RSA_PKCS1_PADDING 1 /* ignored; always encrypt with this */
120#define RSA_size( CTX ) (CTX)->len
121#define RSA_free( CTX ) rsa_free( CTX )
122#define ERR_get_error( ) "ERR_get_error() not supported"
123#define RSA_blinding_off( IGNORE )
124
125#define d2i_RSAPrivateKey( a, b, c ) new rsa_context /* TODO: C++ bleh */
126
127inline int RSA_public_decrypt ( int size, unsigned char* input, unsigned char* output, RSA* key, int ignore ) { int outsize=size; if( !rsa_pkcs1_decrypt( key, RSA_PUBLIC, &outsize, input, output ) ) return outsize; else return -1; }
128inline int RSA_private_decrypt( int size, unsigned char* input, unsigned char* output, RSA* key, int ignore ) { int outsize=size; if( !rsa_pkcs1_decrypt( key, RSA_PRIVATE, &outsize, input, output ) ) return outsize; else return -1; }
129inline int RSA_public_encrypt ( int size, unsigned char* input, unsigned char* output, RSA* key, int ignore ) { if( !rsa_pkcs1_encrypt( key, RSA_PUBLIC, size, input, output ) ) return RSA_size(key); else return -1; }
130inline int RSA_private_encrypt( int size, unsigned char* input, unsigned char* output, RSA* key, int ignore ) { if( !rsa_pkcs1_encrypt( key, RSA_PRIVATE, size, input, output ) ) return RSA_size(key); else return -1; }
131
132#ifdef __cplusplus
133}
134#endif
135
136#endif /* openssl.h */