| /* |
| * Copyright 1999-2016 The OpenSSL Project Authors. All Rights Reserved. |
| * |
| * Licensed under the OpenSSL license (the "License"). You may not use |
| * this file except in compliance with the License. You can obtain a copy |
| * in the file LICENSE in the source distribution or at |
| * https://www.openssl.org/source/license.html |
| */ |
| |
| #ifndef OPENSSL_HEADER_PKCS8_INTERNAL_H |
| #define OPENSSL_HEADER_PKCS8_INTERNAL_H |
| |
| #include <openssl/base.h> |
| #include <openssl/stack.h> |
| |
| #if defined(__cplusplus) |
| extern "C" { |
| #endif |
| |
| |
| struct pkcs8_priv_key_info_st { |
| ASN1_INTEGER *version; |
| X509_ALGOR *pkeyalg; |
| ASN1_OCTET_STRING *pkey; |
| STACK_OF(X509_ATTRIBUTE) *attributes; |
| }; |
| |
| // pkcs8_pbe_decrypt decrypts |in| using the PBE scheme described by |
| // |algorithm|, which should be a serialized AlgorithmIdentifier structure. On |
| // success, it sets |*out| to a newly-allocated buffer containing the decrypted |
| // result and returns one. Otherwise, it returns zero. |
| int pkcs8_pbe_decrypt(uint8_t **out, size_t *out_len, CBS *algorithm, |
| const char *pass, size_t pass_len, const uint8_t *in, |
| size_t in_len); |
| |
| #define PKCS12_KEY_ID 1 |
| #define PKCS12_IV_ID 2 |
| #define PKCS12_MAC_ID 3 |
| |
| // pkcs12_key_gen runs the PKCS#12 key derivation function as specified in |
| // RFC 7292, appendix B. On success, it writes the resulting |out_len| bytes of |
| // key material to |out| and returns one. Otherwise, it returns zero. |id| |
| // should be one of the |PKCS12_*_ID| values. |
| int pkcs12_key_gen(const char *pass, size_t pass_len, const uint8_t *salt, |
| size_t salt_len, uint8_t id, uint32_t iterations, |
| size_t out_len, uint8_t *out, const EVP_MD *md); |
| |
| // pkcs12_pbe_encrypt_init configures |ctx| for encrypting with a PBES1 scheme |
| // defined in PKCS#12. It writes the corresponding AlgorithmIdentifier to |out|. |
| int pkcs12_pbe_encrypt_init(CBB *out, EVP_CIPHER_CTX *ctx, int alg, |
| uint32_t iterations, const char *pass, |
| size_t pass_len, const uint8_t *salt, |
| size_t salt_len); |
| |
| struct pbe_suite { |
| int pbe_nid; |
| uint8_t oid[10]; |
| uint8_t oid_len; |
| const EVP_CIPHER *(*cipher_func)(void); |
| const EVP_MD *(*md_func)(void); |
| // decrypt_init initialize |ctx| for decrypting. The password is specified by |
| // |pass| and |pass_len|. |param| contains the serialized parameters field of |
| // the AlgorithmIdentifier. |
| // |
| // It returns one on success and zero on error. |
| int (*decrypt_init)(const struct pbe_suite *suite, EVP_CIPHER_CTX *ctx, |
| const char *pass, size_t pass_len, CBS *param); |
| }; |
| |
| #define PKCS5_SALT_LEN 8 |
| |
| int PKCS5_pbe2_decrypt_init(const struct pbe_suite *suite, EVP_CIPHER_CTX *ctx, |
| const char *pass, size_t pass_len, CBS *param); |
| |
| // PKCS5_pbe2_encrypt_init configures |ctx| for encrypting with PKCS #5 PBES2, |
| // as defined in RFC 2998, with the specified parameters. It writes the |
| // corresponding AlgorithmIdentifier to |out|. |
| int PKCS5_pbe2_encrypt_init(CBB *out, EVP_CIPHER_CTX *ctx, |
| const EVP_CIPHER *cipher, uint32_t iterations, |
| const char *pass, size_t pass_len, |
| const uint8_t *salt, size_t salt_len); |
| |
| // pkcs12_iterations_acceptable returns one if |iterations| is a reasonable |
| // number of PBKDF2 iterations and zero otherwise. |
| int pkcs12_iterations_acceptable(uint64_t iterations); |
| |
| |
| #if defined(__cplusplus) |
| } // extern C |
| #endif |
| |
| #endif // OPENSSL_HEADER_PKCS8_INTERNAL_H |