310 lines
6.7 KiB
C
310 lines
6.7 KiB
C
/*
|
|
* Copyright 2016 Michael Müller
|
|
*
|
|
* This library is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
* License as published by the Free Software Foundation; either
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
*
|
|
* This library is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
* License along with this library; if not, write to the Free Software
|
|
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
|
|
*
|
|
*/
|
|
|
|
#ifndef __BCRYPT_INTERNAL_H
|
|
#define __BCRYPT_INTERNAL_H
|
|
|
|
#include <stdarg.h>
|
|
|
|
#include "windef.h"
|
|
#include "winbase.h"
|
|
#include "winternl.h"
|
|
#include "wincrypt.h"
|
|
#include "bcrypt.h"
|
|
#include "wine/unixlib.h"
|
|
|
|
#define MAGIC_DSS1 ('D' | ('S' << 8) | ('S' << 16) | ('1' << 24))
|
|
#define MAGIC_DSS2 ('D' | ('S' << 8) | ('S' << 16) | ('2' << 24))
|
|
|
|
typedef struct
|
|
{
|
|
ULONG64 len;
|
|
DWORD h[8];
|
|
UCHAR buf[64];
|
|
} SHA256_CTX;
|
|
|
|
void sha256_init(SHA256_CTX *ctx) DECLSPEC_HIDDEN;
|
|
void sha256_update(SHA256_CTX *ctx, const UCHAR *buffer, ULONG len) DECLSPEC_HIDDEN;
|
|
void sha256_finalize(SHA256_CTX *ctx, UCHAR *buffer) DECLSPEC_HIDDEN;
|
|
|
|
typedef struct
|
|
{
|
|
ULONG64 len;
|
|
ULONG64 h[8];
|
|
UCHAR buf[128];
|
|
} SHA512_CTX;
|
|
|
|
void sha512_init(SHA512_CTX *ctx) DECLSPEC_HIDDEN;
|
|
void sha512_update(SHA512_CTX *ctx, const UCHAR *buffer, ULONG len) DECLSPEC_HIDDEN;
|
|
void sha512_finalize(SHA512_CTX *ctx, UCHAR *buffer) DECLSPEC_HIDDEN;
|
|
|
|
void sha384_init(SHA512_CTX *ctx) DECLSPEC_HIDDEN;
|
|
#define sha384_update sha512_update
|
|
void sha384_finalize(SHA512_CTX *ctx, UCHAR *buffer) DECLSPEC_HIDDEN;
|
|
|
|
typedef struct {
|
|
unsigned char chksum[16], X[48], buf[16];
|
|
unsigned long curlen;
|
|
} MD2_CTX;
|
|
|
|
void md2_init(MD2_CTX *ctx) DECLSPEC_HIDDEN;
|
|
void md2_update(MD2_CTX *ctx, const unsigned char *buf, ULONG len) DECLSPEC_HIDDEN;
|
|
void md2_finalize(MD2_CTX *ctx, unsigned char *hash) DECLSPEC_HIDDEN;
|
|
|
|
/* Definitions from advapi32 */
|
|
typedef struct tagMD4_CTX {
|
|
unsigned int buf[4];
|
|
unsigned int i[2];
|
|
unsigned char in[64];
|
|
unsigned char digest[16];
|
|
} MD4_CTX;
|
|
|
|
VOID WINAPI MD4Init(MD4_CTX *ctx);
|
|
VOID WINAPI MD4Update(MD4_CTX *ctx, const unsigned char *buf, unsigned int len);
|
|
VOID WINAPI MD4Final(MD4_CTX *ctx);
|
|
|
|
typedef struct
|
|
{
|
|
unsigned int i[2];
|
|
unsigned int buf[4];
|
|
unsigned char in[64];
|
|
unsigned char digest[16];
|
|
} MD5_CTX;
|
|
|
|
VOID WINAPI MD5Init(MD5_CTX *ctx);
|
|
VOID WINAPI MD5Update(MD5_CTX *ctx, const unsigned char *buf, unsigned int len);
|
|
VOID WINAPI MD5Final(MD5_CTX *ctx);
|
|
|
|
typedef struct
|
|
{
|
|
ULONG Unknown[6];
|
|
ULONG State[5];
|
|
ULONG Count[2];
|
|
UCHAR Buffer[64];
|
|
} SHA_CTX;
|
|
|
|
VOID WINAPI A_SHAInit(SHA_CTX *ctx);
|
|
VOID WINAPI A_SHAUpdate(SHA_CTX *ctx, const UCHAR *buffer, UINT size);
|
|
VOID WINAPI A_SHAFinal(SHA_CTX *ctx, PULONG result);
|
|
|
|
#define MAGIC_ALG (('A' << 24) | ('L' << 16) | ('G' << 8) | '0')
|
|
#define MAGIC_HASH (('H' << 24) | ('A' << 16) | ('S' << 8) | 'H')
|
|
#define MAGIC_KEY (('K' << 24) | ('E' << 16) | ('Y' << 8) | '0')
|
|
#define MAGIC_SECRET (('S' << 24) | ('C' << 16) | ('R' << 8) | 'T')
|
|
struct object
|
|
{
|
|
ULONG magic;
|
|
};
|
|
|
|
enum alg_id
|
|
{
|
|
/* cipher */
|
|
ALG_ID_3DES,
|
|
ALG_ID_AES,
|
|
|
|
/* hash */
|
|
ALG_ID_SHA256,
|
|
ALG_ID_SHA384,
|
|
ALG_ID_SHA512,
|
|
ALG_ID_SHA1,
|
|
ALG_ID_MD5,
|
|
ALG_ID_MD4,
|
|
ALG_ID_MD2,
|
|
|
|
/* asymmetric encryption */
|
|
ALG_ID_RSA,
|
|
|
|
/* secret agreement */
|
|
ALG_ID_ECDH_P256,
|
|
|
|
/* signature */
|
|
ALG_ID_RSA_SIGN,
|
|
ALG_ID_ECDSA_P256,
|
|
ALG_ID_ECDSA_P384,
|
|
ALG_ID_DSA,
|
|
|
|
/* rng */
|
|
ALG_ID_RNG,
|
|
};
|
|
|
|
enum mode_id
|
|
{
|
|
MODE_ID_ECB,
|
|
MODE_ID_CBC,
|
|
MODE_ID_GCM
|
|
};
|
|
|
|
struct algorithm
|
|
{
|
|
struct object hdr;
|
|
enum alg_id id;
|
|
enum mode_id mode;
|
|
ULONG flags;
|
|
};
|
|
|
|
struct key_symmetric
|
|
{
|
|
enum mode_id mode;
|
|
ULONG block_size;
|
|
UCHAR *vector;
|
|
ULONG vector_len;
|
|
UCHAR *secret;
|
|
ULONG secret_len;
|
|
CRITICAL_SECTION cs;
|
|
};
|
|
|
|
#define KEY_FLAG_LEGACY_DSA_V2 0x00000001
|
|
|
|
struct key_asymmetric
|
|
{
|
|
ULONG bitlen; /* ignored for ECC keys */
|
|
ULONG flags;
|
|
UCHAR *pubkey;
|
|
ULONG pubkey_len;
|
|
DSSSEED dss_seed;
|
|
};
|
|
|
|
struct key
|
|
{
|
|
struct object hdr;
|
|
enum alg_id alg_id;
|
|
void *private[2]; /* private data for backend */
|
|
union
|
|
{
|
|
struct key_symmetric s;
|
|
struct key_asymmetric a;
|
|
} u;
|
|
};
|
|
|
|
struct secret
|
|
{
|
|
struct object hdr;
|
|
};
|
|
|
|
struct key_symmetric_set_auth_data_params
|
|
{
|
|
struct key *key;
|
|
UCHAR *auth_data;
|
|
ULONG len;
|
|
};
|
|
|
|
struct key_symmetric_encrypt_params
|
|
{
|
|
struct key *key;
|
|
const UCHAR *input;
|
|
ULONG input_len;
|
|
UCHAR *output;
|
|
ULONG output_len;
|
|
};
|
|
|
|
struct key_symmetric_decrypt_params
|
|
{
|
|
struct key *key;
|
|
const UCHAR *input;
|
|
ULONG input_len;
|
|
UCHAR *output;
|
|
ULONG output_len;
|
|
};
|
|
|
|
struct key_symmetric_get_tag_params
|
|
{
|
|
struct key *key;
|
|
UCHAR *tag;
|
|
ULONG len;
|
|
};
|
|
|
|
struct key_asymmetric_decrypt_params
|
|
{
|
|
struct key *key;
|
|
UCHAR *input;
|
|
ULONG input_len;
|
|
UCHAR *output;
|
|
ULONG output_len;
|
|
ULONG *ret_len;
|
|
};
|
|
|
|
struct key_asymmetric_duplicate_params
|
|
{
|
|
struct key *key_orig;
|
|
struct key *key_copy;
|
|
};
|
|
|
|
struct key_asymmetric_sign_params
|
|
{
|
|
struct key *key;
|
|
void *padding;
|
|
UCHAR *input;
|
|
ULONG input_len;
|
|
UCHAR *output;
|
|
ULONG output_len;
|
|
ULONG *ret_len;
|
|
ULONG flags;
|
|
};
|
|
|
|
struct key_asymmetric_verify_params
|
|
{
|
|
struct key *key;
|
|
void *padding;
|
|
UCHAR *hash;
|
|
ULONG hash_len;
|
|
UCHAR *signature;
|
|
ULONG signature_len;
|
|
ULONG flags;
|
|
};
|
|
|
|
struct key_export_params
|
|
{
|
|
struct key *key;
|
|
UCHAR *buf;
|
|
ULONG len;
|
|
ULONG *ret_len;
|
|
};
|
|
|
|
struct key_import_params
|
|
{
|
|
struct key *key;
|
|
UCHAR *buf;
|
|
ULONG len;
|
|
};
|
|
|
|
enum key_funcs
|
|
{
|
|
unix_process_attach,
|
|
unix_process_detach,
|
|
unix_key_symmetric_vector_reset,
|
|
unix_key_symmetric_set_auth_data,
|
|
unix_key_symmetric_encrypt,
|
|
unix_key_symmetric_decrypt,
|
|
unix_key_symmetric_get_tag,
|
|
unix_key_symmetric_destroy,
|
|
unix_key_asymmetric_generate,
|
|
unix_key_asymmetric_decrypt,
|
|
unix_key_asymmetric_duplicate,
|
|
unix_key_asymmetric_sign,
|
|
unix_key_asymmetric_verify,
|
|
unix_key_asymmetric_destroy,
|
|
unix_key_export_dsa_capi,
|
|
unix_key_export_ecc,
|
|
unix_key_import_dsa_capi,
|
|
unix_key_import_ecc,
|
|
unix_key_import_rsa,
|
|
};
|
|
|
|
#endif /* __BCRYPT_INTERNAL_H */
|