123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250 |
- /*-
- * Written by Corinne Dive-Reclus(cdive@baltimore.com)
- *
- * Copyright@2001 Baltimore Technologies Ltd.
- *
- * THIS FILE IS PROVIDED BY BALTIMORE TECHNOLOGIES ``AS IS'' AND
- * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
- * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
- * ARE DISCLAIMED. IN NO EVENT SHALL BALTIMORE TECHNOLOGIES BE LIABLE
- * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
- * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
- * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
- * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
- * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
- * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
- * SUCH DAMAGE.
- */
- #ifdef WIN32
- # define SW_EXPORT __declspec ( dllexport )
- #else
- # define SW_EXPORT
- #endif
- /*
- * List of exposed SureWare errors
- */
- #define SUREWAREHOOK_ERROR_FAILED -1
- #define SUREWAREHOOK_ERROR_FALLBACK -2
- #define SUREWAREHOOK_ERROR_UNIT_FAILURE -3
- #define SUREWAREHOOK_ERROR_DATA_SIZE -4
- #define SUREWAREHOOK_ERROR_INVALID_PAD -5
- /*-
- * -----------------WARNING-----------------------------------
- * In all the following functions:
- * msg is a string with at least 24 bytes free.
- * A 24 bytes string will be concatenated to the existing content of msg.
- */
- /*-
- * SureWare Initialisation function
- * in param threadsafe, if !=0, thread safe enabled
- * return SureWareHOOK_ERROR_UNIT_FAILURE if failure, 1 if success
- */
- typedef int SureWareHook_Init_t(char *const msg, int threadsafe);
- extern SW_EXPORT SureWareHook_Init_t SureWareHook_Init;
- /*-
- * SureWare Finish function
- */
- typedef void SureWareHook_Finish_t(void);
- extern SW_EXPORT SureWareHook_Finish_t SureWareHook_Finish;
- /*-
- * PRE_CONDITION:
- * DO NOT CALL ANY OF THE FOLLOWING FUNCTIONS IN CASE OF INIT FAILURE
- */
- /*-
- * SureWare RAND Bytes function
- * In case of failure, the content of buf is unpredictable.
- * return 1 if success
- * SureWareHOOK_ERROR_FALLBACK if function not available in hardware
- * SureWareHOOK_ERROR_FAILED if error while processing
- * SureWareHOOK_ERROR_UNIT_FAILURE if hardware failure
- * SUREWAREHOOK_ERROR_DATA_SIZE wrong size for buf
- *
- * in/out param buf : a num bytes long buffer where random bytes will be put
- * in param num : the number of bytes into buf
- */
- typedef int SureWareHook_Rand_Bytes_t(char *const msg, unsigned char *buf,
- int num);
- extern SW_EXPORT SureWareHook_Rand_Bytes_t SureWareHook_Rand_Bytes;
- /*-
- * SureWare RAND Seed function
- * Adds some seed to the Hardware Random Number Generator
- * return 1 if success
- * SureWareHOOK_ERROR_FALLBACK if function not available in hardware
- * SureWareHOOK_ERROR_FAILED if error while processing
- * SureWareHOOK_ERROR_UNIT_FAILURE if hardware failure
- * SUREWAREHOOK_ERROR_DATA_SIZE wrong size for buf
- *
- * in param buf : the seed to add into the HRNG
- * in param num : the number of bytes into buf
- */
- typedef int SureWareHook_Rand_Seed_t(char *const msg, const void *buf,
- int num);
- extern SW_EXPORT SureWareHook_Rand_Seed_t SureWareHook_Rand_Seed;
- /*-
- * SureWare Load Private Key function
- * return 1 if success
- * SureWareHOOK_ERROR_FAILED if error while processing
- * No hardware is contact for this function.
- *
- * in param key_id :the name of the private protected key file without the extension
- ".sws"
- * out param hptr : a pointer to a buffer allocated by SureWare_Hook
- * out param num: the effective key length in bytes
- * out param keytype: 1 if RSA 2 if DSA
- */
- typedef int SureWareHook_Load_Privkey_t(char *const msg, const char *key_id,
- char **hptr, unsigned long *num,
- char *keytype);
- extern SW_EXPORT SureWareHook_Load_Privkey_t SureWareHook_Load_Privkey;
- /*-
- * SureWare Info Public Key function
- * return 1 if success
- * SureWareHOOK_ERROR_FAILED if error while processing
- * No hardware is contact for this function.
- *
- * in param key_id :the name of the private protected key file without the extension
- ".swp"
- * out param hptr : a pointer to a buffer allocated by SureWare_Hook
- * out param num: the effective key length in bytes
- * out param keytype: 1 if RSA 2 if DSA
- */
- typedef int SureWareHook_Info_Pubkey_t(char *const msg, const char *key_id,
- unsigned long *num, char *keytype);
- extern SW_EXPORT SureWareHook_Info_Pubkey_t SureWareHook_Info_Pubkey;
- /*-
- * SureWare Load Public Key function
- * return 1 if success
- * SureWareHOOK_ERROR_FAILED if error while processing
- * No hardware is contact for this function.
- *
- * in param key_id :the name of the public protected key file without the extension
- ".swp"
- * in param num : the bytes size of n and e
- * out param n: where to write modulus in bn format
- * out param e: where to write exponent in bn format
- */
- typedef int SureWareHook_Load_Rsa_Pubkey_t(char *const msg,
- const char *key_id,
- unsigned long num,
- unsigned long *n,
- unsigned long *e);
- extern SW_EXPORT SureWareHook_Load_Rsa_Pubkey_t SureWareHook_Load_Rsa_Pubkey;
- /*-
- * SureWare Load DSA Public Key function
- * return 1 if success
- * SureWareHOOK_ERROR_FAILED if error while processing
- * No hardware is contact for this function.
- *
- * in param key_id :the name of the public protected key file without the extension
- ".swp"
- * in param num : the bytes size of n and e
- * out param pub: where to write pub key in bn format
- * out param p: where to write prime in bn format
- * out param q: where to write sunprime (length 20 bytes) in bn format
- * out param g: where to write base in bn format
- */
- typedef int SureWareHook_Load_Dsa_Pubkey_t(char *const msg,
- const char *key_id,
- unsigned long num,
- unsigned long *pub,
- unsigned long *p, unsigned long *q,
- unsigned long *g);
- extern SW_EXPORT SureWareHook_Load_Dsa_Pubkey_t SureWareHook_Load_Dsa_Pubkey;
- /*-
- * SureWare Free function
- * Destroy the key into the hardware if destroy==1
- */
- typedef void SureWareHook_Free_t(char *p, int destroy);
- extern SW_EXPORT SureWareHook_Free_t SureWareHook_Free;
- #define SUREWARE_PKCS1_PAD 1
- #define SUREWARE_ISO9796_PAD 2
- #define SUREWARE_NO_PAD 0
- /*-
- * SureWare RSA Private Decryption
- * return 1 if success
- * SureWareHOOK_ERROR_FAILED if error while processing
- * SureWareHOOK_ERROR_UNIT_FAILURE if hardware failure
- * SUREWAREHOOK_ERROR_DATA_SIZE wrong size for buf
- *
- * in param flen : byte size of from and to
- * in param from : encrypted data buffer, should be a not-null valid pointer
- * out param tlen: byte size of decrypted data, if error, unexpected value
- * out param to : decrypted data buffer, should be a not-null valid pointer
- * in param prsa: a protected key pointer, should be a not-null valid pointer
- * int padding: padding id as follow
- * SUREWARE_PKCS1_PAD
- * SUREWARE_NO_PAD
- *
- */
- typedef int SureWareHook_Rsa_Priv_Dec_t(char *const msg, int flen,
- unsigned char *from, int *tlen,
- unsigned char *to, char *prsa,
- int padding);
- extern SW_EXPORT SureWareHook_Rsa_Priv_Dec_t SureWareHook_Rsa_Priv_Dec;
- /*-
- * SureWare RSA Signature
- * return 1 if success
- * SureWareHOOK_ERROR_FAILED if error while processing
- * SureWareHOOK_ERROR_UNIT_FAILURE if hardware failure
- * SUREWAREHOOK_ERROR_DATA_SIZE wrong size for buf
- *
- * in param flen : byte size of from and to
- * in param from : encrypted data buffer, should be a not-null valid pointer
- * out param tlen: byte size of decrypted data, if error, unexpected value
- * out param to : decrypted data buffer, should be a not-null valid pointer
- * in param prsa: a protected key pointer, should be a not-null valid pointer
- * int padding: padding id as follow
- * SUREWARE_PKCS1_PAD
- * SUREWARE_ISO9796_PAD
- *
- */
- typedef int SureWareHook_Rsa_Sign_t(char *const msg, int flen,
- unsigned char *from, int *tlen,
- unsigned char *to, char *prsa,
- int padding);
- extern SW_EXPORT SureWareHook_Rsa_Sign_t SureWareHook_Rsa_Sign;
- /*-
- * SureWare DSA Signature
- * return 1 if success
- * SureWareHOOK_ERROR_FAILED if error while processing
- * SureWareHOOK_ERROR_UNIT_FAILURE if hardware failure
- * SUREWAREHOOK_ERROR_DATA_SIZE wrong size for buf
- *
- * in param flen : byte size of from and to
- * in param from : encrypted data buffer, should be a not-null valid pointer
- * out param to : decrypted data buffer, should be a 40bytes valid pointer
- * in param pdsa: a protected key pointer, should be a not-null valid pointer
- *
- */
- typedef int SureWareHook_Dsa_Sign_t(char *const msg, int flen,
- const unsigned char *from,
- unsigned long *r, unsigned long *s,
- char *pdsa);
- extern SW_EXPORT SureWareHook_Dsa_Sign_t SureWareHook_Dsa_Sign;
- /*-
- * SureWare Mod Exp
- * return 1 if success
- * SureWareHOOK_ERROR_FAILED if error while processing
- * SureWareHOOK_ERROR_UNIT_FAILURE if hardware failure
- * SUREWAREHOOK_ERROR_DATA_SIZE wrong size for buf
- *
- * mod and res are mlen bytes long.
- * exp is elen bytes long
- * data is dlen bytes long
- * mlen,elen and dlen are all multiple of sizeof(unsigned long)
- */
- typedef int SureWareHook_Mod_Exp_t(char *const msg, int mlen,
- const unsigned long *mod, int elen,
- const unsigned long *exponent, int dlen,
- unsigned long *data, unsigned long *res);
- extern SW_EXPORT SureWareHook_Mod_Exp_t SureWareHook_Mod_Exp;
|