5869 Need AES CMAC support in KCF+PKCS11
[unleashed.git] / usr / src / lib / pkcs11 / pkcs11_softtoken / common / softCrypt.h
blobeb9f69e74bcd63a516ee4e82cf7060480c729718
1 /*
2 * CDDL HEADER START
4 * The contents of this file are subject to the terms of the
5 * Common Development and Distribution License (the "License").
6 * You may not use this file except in compliance with the License.
8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9 * or http://www.opensolaris.org/os/licensing.
10 * See the License for the specific language governing permissions
11 * and limitations under the License.
13 * When distributing Covered Code, include this CDDL HEADER in each
14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15 * If applicable, add the following below this CDDL HEADER, with the
16 * fields enclosed by brackets "[]" replaced with your own identifying
17 * information: Portions Copyright [yyyy] [name of copyright owner]
19 * CDDL HEADER END
23 * Copyright (c) 2003, 2010, Oracle and/or its affiliates. All rights reserved.
26 #ifndef _SOFTCRYPT_H
27 #define _SOFTCRYPT_H
29 #ifdef __cplusplus
30 extern "C" {
31 #endif
33 #include <sys/types.h>
34 #include <security/pkcs11t.h>
35 #include <modes/modes.h>
36 #include <aes_impl.h>
37 #include <blowfish_impl.h>
38 #include <des_impl.h>
39 #include "softObject.h"
40 #include "softSession.h"
42 #define DES_MAC_LEN (DES_BLOCK_LEN / 2)
44 typedef struct soft_des_ctx {
45 void *key_sched; /* pointer to key schedule */
46 size_t keysched_len; /* Length of the key schedule */
47 uint8_t ivec[DES_BLOCK_LEN]; /* initialization vector */
48 uint8_t data[DES_BLOCK_LEN]; /* for use by update */
49 size_t remain_len; /* for use by update */
50 void *des_cbc; /* to be used by CBC mode */
51 CK_KEY_TYPE key_type; /* used to determine DES or DES3 */
52 size_t mac_len; /* digest len in bytes */
53 } soft_des_ctx_t;
55 typedef struct soft_aes_ctx {
56 void *key_sched; /* pointer to key schedule */
57 size_t keysched_len; /* Length of the key schedule */
58 uint8_t ivec[AES_BLOCK_LEN]; /* initialization vector */
59 uint8_t data[AES_BLOCK_LEN]; /* for use by update */
60 size_t remain_len; /* for use by update */
61 void *aes_cbc; /* to be used by CBC mode */
62 size_t mac_len;
63 } soft_aes_ctx_t;
65 typedef struct soft_blowfish_ctx {
66 void *key_sched; /* pointer to key schedule */
67 size_t keysched_len; /* Length of the key schedule */
68 uint8_t ivec[BLOWFISH_BLOCK_LEN]; /* initialization vector */
69 uint8_t data[BLOWFISH_BLOCK_LEN]; /* for use by update */
70 size_t remain_len; /* for use by update */
71 void *blowfish_cbc; /* to be used by CBC mode */
72 } soft_blowfish_ctx_t;
75 * Function Prototypes.
77 void *des_cbc_ctx_init(void *, size_t, uint8_t *, CK_KEY_TYPE);
79 CK_RV soft_des_crypt_init_common(soft_session_t *, CK_MECHANISM_PTR,
80 soft_object_t *, boolean_t);
82 CK_RV soft_des_encrypt_common(soft_session_t *, CK_BYTE_PTR, CK_ULONG,
83 CK_BYTE_PTR, CK_ULONG_PTR, boolean_t);
85 CK_RV soft_des_decrypt_common(soft_session_t *, CK_BYTE_PTR, CK_ULONG,
86 CK_BYTE_PTR, CK_ULONG_PTR, boolean_t);
88 CK_RV soft_des_sign_verify_common(soft_session_t *, CK_BYTE_PTR,
89 CK_ULONG, CK_BYTE_PTR, CK_ULONG_PTR,
90 boolean_t, boolean_t);
92 CK_RV soft_des_sign_verify_init_common(soft_session_t *, CK_MECHANISM_PTR,
93 soft_object_t *, boolean_t);
95 CK_RV soft_des_mac_sign_verify_update(soft_session_t *, CK_BYTE_PTR, CK_ULONG);
97 void soft_add_pkcs7_padding(CK_BYTE *, int, CK_ULONG);
99 CK_RV soft_remove_pkcs7_padding(CK_BYTE *, CK_ULONG, CK_ULONG *);
101 CK_RV soft_arcfour_crypt_init(soft_session_t *, CK_MECHANISM_PTR,
102 soft_object_t *, boolean_t);
104 CK_RV soft_arcfour_crypt(crypto_active_op_t *, CK_BYTE_PTR, CK_ULONG,
105 CK_BYTE_PTR, CK_ULONG_PTR);
107 void *aes_cbc_ctx_init(void *, size_t, uint8_t *);
108 void *aes_cmac_ctx_init(void *, size_t);
109 void *aes_ctr_ctx_init(void *, size_t, uint8_t *);
111 CK_RV soft_aes_crypt_init_common(soft_session_t *, CK_MECHANISM_PTR,
112 soft_object_t *, boolean_t);
114 CK_RV soft_aes_encrypt_common(soft_session_t *, CK_BYTE_PTR, CK_ULONG,
115 CK_BYTE_PTR, CK_ULONG_PTR, boolean_t);
117 CK_RV soft_aes_decrypt_common(soft_session_t *, CK_BYTE_PTR, CK_ULONG,
118 CK_BYTE_PTR, CK_ULONG_PTR, boolean_t);
120 CK_RV soft_aes_sign_verify_common(soft_session_t *, CK_BYTE_PTR,
121 CK_ULONG, CK_BYTE_PTR, CK_ULONG_PTR,
122 boolean_t, boolean_t);
124 CK_RV soft_aes_sign_verify_init_common(soft_session_t *, CK_MECHANISM_PTR,
125 soft_object_t *, boolean_t);
127 CK_RV soft_aes_mac_sign_verify_update(soft_session_t *, CK_BYTE_PTR, CK_ULONG);
129 void *blowfish_cbc_ctx_init(void *, size_t, uint8_t *);
131 CK_RV soft_blowfish_crypt_init_common(soft_session_t *, CK_MECHANISM_PTR,
132 soft_object_t *, boolean_t);
134 CK_RV soft_blowfish_encrypt_common(soft_session_t *, CK_BYTE_PTR, CK_ULONG,
135 CK_BYTE_PTR, CK_ULONG_PTR, boolean_t);
137 CK_RV soft_blowfish_decrypt_common(soft_session_t *, CK_BYTE_PTR, CK_ULONG,
138 CK_BYTE_PTR, CK_ULONG_PTR, boolean_t);
140 #ifdef __cplusplus
142 #endif
144 #endif /* _SOFTCRYPT_H */