summaryrefslogtreecommitdiff
path: root/libnm-core/nm-crypto.h
blob: 7a0e6b5c46d53c1e3184c188328742a42b7f52be (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
/* SPDX-License-Identifier: LGPL-2.1+ */
/*
 * Dan Williams <dcbw@redhat.com>
 * Copyright (C) 2007 - 2014 Red Hat, Inc.
 */

#ifndef __NM_CRYPTO_H__
#define __NM_CRYPTO_H__

#if !((NETWORKMANAGER_COMPILATION) &NM_NETWORKMANAGER_COMPILATION_WITH_LIBNM_CORE_PRIVATE)
    #error Cannot use this header.
#endif

typedef enum {
    NM_CRYPTO_CIPHER_UNKNOWN,
    NM_CRYPTO_CIPHER_DES_EDE3_CBC,
    NM_CRYPTO_CIPHER_DES_CBC,
    NM_CRYPTO_CIPHER_AES_128_CBC,
    NM_CRYPTO_CIPHER_AES_192_CBC,
    NM_CRYPTO_CIPHER_AES_256_CBC,
} NMCryptoCipherType;

typedef struct {
    const char *       name;
    NMCryptoCipherType cipher;
    guint8             digest_len;
    guint8             real_iv_len;
} NMCryptoCipherInfo;

const NMCryptoCipherInfo *nm_crypto_cipher_get_info(NMCryptoCipherType cipher);
const NMCryptoCipherInfo *nm_crypto_cipher_get_info_by_name(const char *cipher_name, gssize p_len);

typedef enum {
    NM_CRYPTO_KEY_TYPE_UNKNOWN = 0,
    NM_CRYPTO_KEY_TYPE_RSA,
    NM_CRYPTO_KEY_TYPE_DSA
} NMCryptoKeyType;

typedef enum {
    NM_CRYPTO_FILE_FORMAT_UNKNOWN = 0,
    NM_CRYPTO_FILE_FORMAT_X509,
    NM_CRYPTO_FILE_FORMAT_RAW_KEY,
    NM_CRYPTO_FILE_FORMAT_PKCS12
} NMCryptoFileFormat;

/*****************************************************************************/

GBytes *nm_crypto_read_file(const char *filename, GError **error);

gboolean nm_crypto_load_and_verify_certificate(const char *        file,
                                               NMCryptoFileFormat *out_file_format,
                                               GBytes **           out_certificat,
                                               GError **           error);

gboolean nm_crypto_is_pkcs12_file(const char *file, GError **error);

gboolean nm_crypto_is_pkcs12_data(const guint8 *data, gsize len, GError **error);

NMCryptoFileFormat nm_crypto_verify_private_key_data(const guint8 *data,
                                                     gsize         data_len,
                                                     const char *  password,
                                                     gboolean *    out_is_encrypted,
                                                     GError **     error);

NMCryptoFileFormat nm_crypto_verify_private_key(const char *file,
                                                const char *password,
                                                gboolean *  out_is_encrypted,
                                                GError **   error);

void nm_crypto_md5_hash(const guint8 *salt,
                        gsize         salt_len,
                        const guint8 *password,
                        gsize         password_len,
                        guint8 *      buffer,
                        gsize         buflen);

gboolean nm_crypto_randomize(void *buffer, gsize buffer_len, GError **error);

/*****************************************************************************/

GBytes *nmtst_crypto_decrypt_openssl_private_key_data(const guint8 *   data,
                                                      gsize            data_len,
                                                      const char *     password,
                                                      NMCryptoKeyType *out_key_type,
                                                      GError **        error);

GBytes *nmtst_crypto_decrypt_openssl_private_key(const char *     file,
                                                 const char *     password,
                                                 NMCryptoKeyType *out_key_type,
                                                 GError **        error);

GBytes *nmtst_crypto_rsa_key_encrypt(const guint8 *data,
                                     gsize         len,
                                     const char *  in_password,
                                     char **       out_password,
                                     GError **     error);

guint8 *nmtst_crypto_make_des_aes_key(NMCryptoCipherType cipher,
                                      const guint8 *     salt,
                                      gsize              salt_len,
                                      const char *       password,
                                      gsize *            out_len,
                                      GError **          error);

/*****************************************************************************/

#endif /* __NM_CRYPTO_H__ */