Loading crypto/engine/vendor_defns/aep.h 0 → 100644 +178 −0 Original line number Diff line number Diff line /* This header declares the necessary definitions for using the exponentiation * acceleration capabilities, and rnd number generation of the AEP card. * */ /* * * Some AEP defines * */ /*Successful return value*/ #define AEP_R_OK 0x00000000 /*Miscelleanous unsuccessful return value*/ #define AEP_R_GENERAL_ERROR 0x10000001 /*Insufficient host memory*/ #define AEP_R_HOST_MEMORY 0x10000002 #define AEP_R_FUNCTION_FAILED 0x10000006 /*Invalid arguments in function call*/ #define AEP_R_ARGUMENTS_BAD 0x10020000 #define AEP_R_NO_TARGET_RESOURCES 0x10030000 /*Error occuring on socket operation*/ #define AEP_R_SOCKERROR 0x10000010 /*Socket has been closed from the other end*/ #define AEP_R_SOCKEOF 0x10000011 /*Invalid handles*/ #define AEP_R_CONNECTION_HANDLE_INVALID 0x100000B3 #define AEP_R_TRANSACTION_HANDLE_INVALID 0x10040000 /*Transaction has not yet returned from accelerator*/ #define AEP_R_TRANSACTION_NOT_READY 0x00010000 /*There is already a thread waiting on this transaction*/ #define AEP_R_TRANSACTION_CLAIMED 0x10050000 /*The transaction timed out*/ #define AEP_R_TIMED_OUT 0x10060000 #define AEP_R_FXN_NOT_IMPLEMENTED 0x10070000 #define AEP_R_TARGET_ERROR 0x10080000 /*Error in the AEP daemon process*/ #define AEP_R_DAEMON_ERROR 0x10090000 /*Invalid ctx id*/ #define AEP_R_INVALID_CTX_ID 0x10009000 #define AEP_R_NO_KEY_MANAGER 0x1000a000 /*Error obtaining a mutex*/ #define AEP_R_MUTEX_BAD 0x000001A0 /*Fxn call before AEP_Initialise ot after AEP_Finialise*/ #define AEP_R_AEPAPI_NOT_INITIALIZED 0x10000190 /*AEP_Initialise has already been called*/ #define AEP_R_AEPAPI_ALREADY_INITIALIZED 0x10000191 /*Maximum number of connections to daemon reached*/ #define AEP_R_NO_MORE_CONNECTION_HNDLS 0x10000200 /* * * Some AEP Type definitions * */ /* an unsigned 8-bit value */ typedef unsigned char AEP_U8; /* an unsigned 8-bit character */ typedef char AEP_CHAR; /* a BYTE-sized Boolean flag */ typedef AEP_U8 AEP_BBOOL; /*Unsigned value, at least 16 bits long*/ typedef unsigned short AEP_U16; /* an unsigned value, at least 32 bits long */ #ifdef SIXTY_FOUR_BIT_LONG typedef unsigned int AEP_U32; #else typedef unsigned long AEP_U32; #endif #ifdef SIXTY_FOUR_BIT_LONG typedef unsigned long AEP_U64; #else typedef struct { unsigned long l1, l2; } AEP_U64; #endif /* at least 32 bits; each bit is a Boolean flag */ typedef AEP_U32 AEP_FLAGS; typedef AEP_U8 *AEP_U8_PTR; typedef AEP_CHAR *AEP_CHAR_PTR; typedef AEP_U32 *AEP_U32_PTR; typedef AEP_U64 *AEP_U64_PTR; typedef void *AEP_VOID_PTR; /* Pointer to a AEP_VOID_PTR-- i.e., pointer to pointer to void */ typedef AEP_VOID_PTR *AEP_VOID_PTR_PTR; /*Used to identify an AEP connection handle*/ typedef AEP_U32 AEP_CONNECTION_HNDL; /*Pointer to an AEP connection handle*/ typedef AEP_CONNECTION_HNDL *AEP_CONNECTION_HNDL_PTR; /*Used by an application (in conjunction with the apps process id) to identify an individual transaction*/ typedef AEP_U32 AEP_TRANSACTION_ID; /*Pointer to an applications transaction identifier*/ typedef AEP_TRANSACTION_ID *AEP_TRANSACTION_ID_PTR; /*Return value type*/ typedef AEP_U32 AEP_RV; #define MAX_PROCESS_CONNECTIONS 256 #define RAND_BLK_SIZE 1024 typedef enum{ NotConnected= 0, Connected= 1, InUse= 2 } AEP_CONNECTION_STATE; typedef struct AEP_CONNECTION_ENTRY{ AEP_CONNECTION_STATE conn_state; AEP_CONNECTION_HNDL conn_hndl; } AEP_CONNECTION_ENTRY; typedef AEP_RV t_AEP_OpenConnection(AEP_CONNECTION_HNDL_PTR phConnection); typedef AEP_RV t_AEP_CloseConnection(AEP_CONNECTION_HNDL hConnection); typedef AEP_RV t_AEP_ModExp(AEP_CONNECTION_HNDL hConnection, AEP_VOID_PTR pA, AEP_VOID_PTR pP, AEP_VOID_PTR pN, AEP_VOID_PTR pResult, AEP_TRANSACTION_ID* pidTransID); typedef AEP_RV t_AEP_ModExpCrt(AEP_CONNECTION_HNDL hConnection, AEP_VOID_PTR pA, AEP_VOID_PTR pP, AEP_VOID_PTR pQ, AEP_VOID_PTR pDmp1, AEP_VOID_PTR pDmq1, AEP_VOID_PTR pIqmp, AEP_VOID_PTR pResult, AEP_TRANSACTION_ID* pidTransID); #ifdef AEPRAND typedef AEP_RV t_AEP_GenRandom(AEP_CONNECTION_HNDL hConnection, AEP_U32 Len, AEP_U32 Type, AEP_VOID_PTR pResult, AEP_TRANSACTION_ID* pidTransID); #endif typedef AEP_RV t_AEP_Initialize(AEP_VOID_PTR pInitArgs); typedef AEP_RV t_AEP_Finalize(); typedef AEP_RV t_AEP_SetBNCallBacks(AEP_RV (*GetBigNumSizeFunc)(), AEP_RV (*MakeAEPBigNumFunc)(), AEP_RV (*ConverAEPBigNumFunc)()); crypto/engine/vendor_defns/sureware.h 0 → 100644 +239 −0 Original line number Diff line number Diff line /* * Written by Corinne Dive-Reclus(cdive@baltimore.com) * * Copyright@2001 Baltimore Technologies Ltd. * * * THIS FILE IS PROVIDED BY BALTIMORE TECHNOLOGIES ``AS IS'' AND * * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * * ARE DISCLAIMED. IN NO EVENT SHALL BALTIMORE TECHNOLOGIES BE LIABLE * * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * * SUCH DAMAGE. * * * */ #ifdef WIN32 #define SW_EXPORT __declspec ( dllexport ) #else #define SW_EXPORT #endif /* * List of exposed SureWare errors */ #define SUREWAREHOOK_ERROR_FAILED -1 #define SUREWAREHOOK_ERROR_FALLBACK -2 #define SUREWAREHOOK_ERROR_UNIT_FAILURE -3 #define SUREWAREHOOK_ERROR_DATA_SIZE -4 #define SUREWAREHOOK_ERROR_INVALID_PAD -5 /* * -----------------WARNING----------------------------------- * In all the following functions: * msg is a string with at least 24 bytes free. * A 24 bytes string will be concatenated to the existing content of msg. */ /* * SureWare Initialisation function * in param threadsafe, if !=0, thread safe enabled * return SureWareHOOK_ERROR_UNIT_FAILURE if failure, 1 if success */ typedef int SureWareHook_Init_t(char*const msg,int threadsafe); extern SW_EXPORT SureWareHook_Init_t SureWareHook_Init; /* * SureWare Finish function */ typedef void SureWareHook_Finish_t(); extern SW_EXPORT SureWareHook_Finish_t SureWareHook_Finish; /* * PRE_CONDITION: * DO NOT CALL ANY OF THE FOLLOWING FUNCTIONS IN CASE OF INIT FAILURE */ /* * SureWare RAND Bytes function * In case of failure, the content of buf is unpredictable. * return 1 if success * SureWareHOOK_ERROR_FALLBACK if function not available in hardware * SureWareHOOK_ERROR_FAILED if error while processing * SureWareHOOK_ERROR_UNIT_FAILURE if hardware failure * SUREWAREHOOK_ERROR_DATA_SIZE wrong size for buf * * in/out param buf : a num bytes long buffer where random bytes will be put * in param num : the number of bytes into buf */ typedef int SureWareHook_Rand_Bytes_t(char*const msg,unsigned char *buf, int num); extern SW_EXPORT SureWareHook_Rand_Bytes_t SureWareHook_Rand_Bytes; /* * SureWare RAND Seed function * Adds some seed to the Hardware Random Number Generator * return 1 if success * SureWareHOOK_ERROR_FALLBACK if function not available in hardware * SureWareHOOK_ERROR_FAILED if error while processing * SureWareHOOK_ERROR_UNIT_FAILURE if hardware failure * SUREWAREHOOK_ERROR_DATA_SIZE wrong size for buf * * in param buf : the seed to add into the HRNG * in param num : the number of bytes into buf */ typedef int SureWareHook_Rand_Seed_t(char*const msg,const void *buf, int num); extern SW_EXPORT SureWareHook_Rand_Seed_t SureWareHook_Rand_Seed; /* * SureWare Load Private Key function * return 1 if success * SureWareHOOK_ERROR_FAILED if error while processing * No hardware is contact for this function. * * in param key_id :the name of the private protected key file without the extension ".sws" * out param hptr : a pointer to a buffer allocated by SureWare_Hook * out param num: the effective key length in bytes * out param keytype: 1 if RSA 2 if DSA */ typedef int SureWareHook_Load_Privkey_t(char*const msg,const char *key_id,char **hptr,unsigned long *num,char *keytype); extern SW_EXPORT SureWareHook_Load_Privkey_t SureWareHook_Load_Privkey; /* * SureWare Info Public Key function * return 1 if success * SureWareHOOK_ERROR_FAILED if error while processing * No hardware is contact for this function. * * in param key_id :the name of the private protected key file without the extension ".swp" * out param hptr : a pointer to a buffer allocated by SureWare_Hook * out param num: the effective key length in bytes * out param keytype: 1 if RSA 2 if DSA */ typedef int SureWareHook_Info_Pubkey_t(char*const msg,const char *key_id,unsigned long *num, char *keytype); extern SW_EXPORT SureWareHook_Info_Pubkey_t SureWareHook_Info_Pubkey; /* * SureWare Load Public Key function * return 1 if success * SureWareHOOK_ERROR_FAILED if error while processing * No hardware is contact for this function. * * in param key_id :the name of the public protected key file without the extension ".swp" * in param num : the bytes size of n and e * out param n: where to write modulus in bn format * out param e: where to write exponent in bn format */ typedef int SureWareHook_Load_Rsa_Pubkey_t(char*const msg,const char *key_id,unsigned long num, unsigned long *n, unsigned long *e); extern SW_EXPORT SureWareHook_Load_Rsa_Pubkey_t SureWareHook_Load_Rsa_Pubkey; /* * SureWare Load DSA Public Key function * return 1 if success * SureWareHOOK_ERROR_FAILED if error while processing * No hardware is contact for this function. * * in param key_id :the name of the public protected key file without the extension ".swp" * in param num : the bytes size of n and e * out param pub: where to write pub key in bn format * out param p: where to write prime in bn format * out param q: where to write sunprime (length 20 bytes) in bn format * out param g: where to write base in bn format */ typedef int SureWareHook_Load_Dsa_Pubkey_t(char*const msg,const char *key_id,unsigned long num, unsigned long *pub, unsigned long *p,unsigned long*q, unsigned long *g); extern SW_EXPORT SureWareHook_Load_Dsa_Pubkey_t SureWareHook_Load_Dsa_Pubkey; /* * SureWare Free function * Destroy the key into the hardware if destroy==1 */ typedef void SureWareHook_Free_t(char *p,int destroy); extern SW_EXPORT SureWareHook_Free_t SureWareHook_Free; #define SUREWARE_PKCS1_PAD 1 #define SUREWARE_ISO9796_PAD 2 #define SUREWARE_NO_PAD 0 /* * SureWare RSA Private Decryption * return 1 if success * SureWareHOOK_ERROR_FAILED if error while processing * SureWareHOOK_ERROR_UNIT_FAILURE if hardware failure * SUREWAREHOOK_ERROR_DATA_SIZE wrong size for buf * * in param flen : byte size of from and to * in param from : encrypted data buffer, should be a not-null valid pointer * out param tlen: byte size of decrypted data, if error, unexpected value * out param to : decrypted data buffer, should be a not-null valid pointer * in param prsa: a protected key pointer, should be a not-null valid pointer * int padding: padding id as follow * SUREWARE_PKCS1_PAD * SUREWARE_NO_PAD * */ typedef int SureWareHook_Rsa_Priv_Dec_t(char*const msg,int flen,unsigned char *from, int *tlen,unsigned char *to, char *prsa,int padding); extern SW_EXPORT SureWareHook_Rsa_Priv_Dec_t SureWareHook_Rsa_Priv_Dec; /* * SureWare RSA Signature * return 1 if success * SureWareHOOK_ERROR_FAILED if error while processing * SureWareHOOK_ERROR_UNIT_FAILURE if hardware failure * SUREWAREHOOK_ERROR_DATA_SIZE wrong size for buf * * in param flen : byte size of from and to * in param from : encrypted data buffer, should be a not-null valid pointer * out param tlen: byte size of decrypted data, if error, unexpected value * out param to : decrypted data buffer, should be a not-null valid pointer * in param prsa: a protected key pointer, should be a not-null valid pointer * int padding: padding id as follow * SUREWARE_PKCS1_PAD * SUREWARE_ISO9796_PAD * */ typedef int SureWareHook_Rsa_Sign_t(char*const msg,int flen,unsigned char *from, int *tlen,unsigned char *to, char *prsa,int padding); extern SW_EXPORT SureWareHook_Rsa_Sign_t SureWareHook_Rsa_Sign; /* * SureWare DSA Signature * return 1 if success * SureWareHOOK_ERROR_FAILED if error while processing * SureWareHOOK_ERROR_UNIT_FAILURE if hardware failure * SUREWAREHOOK_ERROR_DATA_SIZE wrong size for buf * * in param flen : byte size of from and to * in param from : encrypted data buffer, should be a not-null valid pointer * out param to : decrypted data buffer, should be a 40bytes valid pointer * in param pdsa: a protected key pointer, should be a not-null valid pointer * */ typedef int SureWareHook_Dsa_Sign_t(char*const msg,int flen,const unsigned char *from, unsigned long *r,unsigned long *s,char *pdsa); extern SW_EXPORT SureWareHook_Dsa_Sign_t SureWareHook_Dsa_Sign; /* * SureWare Mod Exp * return 1 if success * SureWareHOOK_ERROR_FAILED if error while processing * SureWareHOOK_ERROR_UNIT_FAILURE if hardware failure * SUREWAREHOOK_ERROR_DATA_SIZE wrong size for buf * * mod and res are mlen bytes long. * exp is elen bytes long * data is dlen bytes long * mlen,elen and dlen are all multiple of sizeof(unsigned long) */ typedef int SureWareHook_Mod_Exp_t(char*const msg,int mlen,const unsigned long *mod, int elen,const unsigned long *exp, int dlen,unsigned long *data, unsigned long *res); extern SW_EXPORT SureWareHook_Mod_Exp_t SureWareHook_Mod_Exp; Loading
crypto/engine/vendor_defns/aep.h 0 → 100644 +178 −0 Original line number Diff line number Diff line /* This header declares the necessary definitions for using the exponentiation * acceleration capabilities, and rnd number generation of the AEP card. * */ /* * * Some AEP defines * */ /*Successful return value*/ #define AEP_R_OK 0x00000000 /*Miscelleanous unsuccessful return value*/ #define AEP_R_GENERAL_ERROR 0x10000001 /*Insufficient host memory*/ #define AEP_R_HOST_MEMORY 0x10000002 #define AEP_R_FUNCTION_FAILED 0x10000006 /*Invalid arguments in function call*/ #define AEP_R_ARGUMENTS_BAD 0x10020000 #define AEP_R_NO_TARGET_RESOURCES 0x10030000 /*Error occuring on socket operation*/ #define AEP_R_SOCKERROR 0x10000010 /*Socket has been closed from the other end*/ #define AEP_R_SOCKEOF 0x10000011 /*Invalid handles*/ #define AEP_R_CONNECTION_HANDLE_INVALID 0x100000B3 #define AEP_R_TRANSACTION_HANDLE_INVALID 0x10040000 /*Transaction has not yet returned from accelerator*/ #define AEP_R_TRANSACTION_NOT_READY 0x00010000 /*There is already a thread waiting on this transaction*/ #define AEP_R_TRANSACTION_CLAIMED 0x10050000 /*The transaction timed out*/ #define AEP_R_TIMED_OUT 0x10060000 #define AEP_R_FXN_NOT_IMPLEMENTED 0x10070000 #define AEP_R_TARGET_ERROR 0x10080000 /*Error in the AEP daemon process*/ #define AEP_R_DAEMON_ERROR 0x10090000 /*Invalid ctx id*/ #define AEP_R_INVALID_CTX_ID 0x10009000 #define AEP_R_NO_KEY_MANAGER 0x1000a000 /*Error obtaining a mutex*/ #define AEP_R_MUTEX_BAD 0x000001A0 /*Fxn call before AEP_Initialise ot after AEP_Finialise*/ #define AEP_R_AEPAPI_NOT_INITIALIZED 0x10000190 /*AEP_Initialise has already been called*/ #define AEP_R_AEPAPI_ALREADY_INITIALIZED 0x10000191 /*Maximum number of connections to daemon reached*/ #define AEP_R_NO_MORE_CONNECTION_HNDLS 0x10000200 /* * * Some AEP Type definitions * */ /* an unsigned 8-bit value */ typedef unsigned char AEP_U8; /* an unsigned 8-bit character */ typedef char AEP_CHAR; /* a BYTE-sized Boolean flag */ typedef AEP_U8 AEP_BBOOL; /*Unsigned value, at least 16 bits long*/ typedef unsigned short AEP_U16; /* an unsigned value, at least 32 bits long */ #ifdef SIXTY_FOUR_BIT_LONG typedef unsigned int AEP_U32; #else typedef unsigned long AEP_U32; #endif #ifdef SIXTY_FOUR_BIT_LONG typedef unsigned long AEP_U64; #else typedef struct { unsigned long l1, l2; } AEP_U64; #endif /* at least 32 bits; each bit is a Boolean flag */ typedef AEP_U32 AEP_FLAGS; typedef AEP_U8 *AEP_U8_PTR; typedef AEP_CHAR *AEP_CHAR_PTR; typedef AEP_U32 *AEP_U32_PTR; typedef AEP_U64 *AEP_U64_PTR; typedef void *AEP_VOID_PTR; /* Pointer to a AEP_VOID_PTR-- i.e., pointer to pointer to void */ typedef AEP_VOID_PTR *AEP_VOID_PTR_PTR; /*Used to identify an AEP connection handle*/ typedef AEP_U32 AEP_CONNECTION_HNDL; /*Pointer to an AEP connection handle*/ typedef AEP_CONNECTION_HNDL *AEP_CONNECTION_HNDL_PTR; /*Used by an application (in conjunction with the apps process id) to identify an individual transaction*/ typedef AEP_U32 AEP_TRANSACTION_ID; /*Pointer to an applications transaction identifier*/ typedef AEP_TRANSACTION_ID *AEP_TRANSACTION_ID_PTR; /*Return value type*/ typedef AEP_U32 AEP_RV; #define MAX_PROCESS_CONNECTIONS 256 #define RAND_BLK_SIZE 1024 typedef enum{ NotConnected= 0, Connected= 1, InUse= 2 } AEP_CONNECTION_STATE; typedef struct AEP_CONNECTION_ENTRY{ AEP_CONNECTION_STATE conn_state; AEP_CONNECTION_HNDL conn_hndl; } AEP_CONNECTION_ENTRY; typedef AEP_RV t_AEP_OpenConnection(AEP_CONNECTION_HNDL_PTR phConnection); typedef AEP_RV t_AEP_CloseConnection(AEP_CONNECTION_HNDL hConnection); typedef AEP_RV t_AEP_ModExp(AEP_CONNECTION_HNDL hConnection, AEP_VOID_PTR pA, AEP_VOID_PTR pP, AEP_VOID_PTR pN, AEP_VOID_PTR pResult, AEP_TRANSACTION_ID* pidTransID); typedef AEP_RV t_AEP_ModExpCrt(AEP_CONNECTION_HNDL hConnection, AEP_VOID_PTR pA, AEP_VOID_PTR pP, AEP_VOID_PTR pQ, AEP_VOID_PTR pDmp1, AEP_VOID_PTR pDmq1, AEP_VOID_PTR pIqmp, AEP_VOID_PTR pResult, AEP_TRANSACTION_ID* pidTransID); #ifdef AEPRAND typedef AEP_RV t_AEP_GenRandom(AEP_CONNECTION_HNDL hConnection, AEP_U32 Len, AEP_U32 Type, AEP_VOID_PTR pResult, AEP_TRANSACTION_ID* pidTransID); #endif typedef AEP_RV t_AEP_Initialize(AEP_VOID_PTR pInitArgs); typedef AEP_RV t_AEP_Finalize(); typedef AEP_RV t_AEP_SetBNCallBacks(AEP_RV (*GetBigNumSizeFunc)(), AEP_RV (*MakeAEPBigNumFunc)(), AEP_RV (*ConverAEPBigNumFunc)());
crypto/engine/vendor_defns/sureware.h 0 → 100644 +239 −0 Original line number Diff line number Diff line /* * Written by Corinne Dive-Reclus(cdive@baltimore.com) * * Copyright@2001 Baltimore Technologies Ltd. * * * THIS FILE IS PROVIDED BY BALTIMORE TECHNOLOGIES ``AS IS'' AND * * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * * ARE DISCLAIMED. IN NO EVENT SHALL BALTIMORE TECHNOLOGIES BE LIABLE * * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * * SUCH DAMAGE. * * * */ #ifdef WIN32 #define SW_EXPORT __declspec ( dllexport ) #else #define SW_EXPORT #endif /* * List of exposed SureWare errors */ #define SUREWAREHOOK_ERROR_FAILED -1 #define SUREWAREHOOK_ERROR_FALLBACK -2 #define SUREWAREHOOK_ERROR_UNIT_FAILURE -3 #define SUREWAREHOOK_ERROR_DATA_SIZE -4 #define SUREWAREHOOK_ERROR_INVALID_PAD -5 /* * -----------------WARNING----------------------------------- * In all the following functions: * msg is a string with at least 24 bytes free. * A 24 bytes string will be concatenated to the existing content of msg. */ /* * SureWare Initialisation function * in param threadsafe, if !=0, thread safe enabled * return SureWareHOOK_ERROR_UNIT_FAILURE if failure, 1 if success */ typedef int SureWareHook_Init_t(char*const msg,int threadsafe); extern SW_EXPORT SureWareHook_Init_t SureWareHook_Init; /* * SureWare Finish function */ typedef void SureWareHook_Finish_t(); extern SW_EXPORT SureWareHook_Finish_t SureWareHook_Finish; /* * PRE_CONDITION: * DO NOT CALL ANY OF THE FOLLOWING FUNCTIONS IN CASE OF INIT FAILURE */ /* * SureWare RAND Bytes function * In case of failure, the content of buf is unpredictable. * return 1 if success * SureWareHOOK_ERROR_FALLBACK if function not available in hardware * SureWareHOOK_ERROR_FAILED if error while processing * SureWareHOOK_ERROR_UNIT_FAILURE if hardware failure * SUREWAREHOOK_ERROR_DATA_SIZE wrong size for buf * * in/out param buf : a num bytes long buffer where random bytes will be put * in param num : the number of bytes into buf */ typedef int SureWareHook_Rand_Bytes_t(char*const msg,unsigned char *buf, int num); extern SW_EXPORT SureWareHook_Rand_Bytes_t SureWareHook_Rand_Bytes; /* * SureWare RAND Seed function * Adds some seed to the Hardware Random Number Generator * return 1 if success * SureWareHOOK_ERROR_FALLBACK if function not available in hardware * SureWareHOOK_ERROR_FAILED if error while processing * SureWareHOOK_ERROR_UNIT_FAILURE if hardware failure * SUREWAREHOOK_ERROR_DATA_SIZE wrong size for buf * * in param buf : the seed to add into the HRNG * in param num : the number of bytes into buf */ typedef int SureWareHook_Rand_Seed_t(char*const msg,const void *buf, int num); extern SW_EXPORT SureWareHook_Rand_Seed_t SureWareHook_Rand_Seed; /* * SureWare Load Private Key function * return 1 if success * SureWareHOOK_ERROR_FAILED if error while processing * No hardware is contact for this function. * * in param key_id :the name of the private protected key file without the extension ".sws" * out param hptr : a pointer to a buffer allocated by SureWare_Hook * out param num: the effective key length in bytes * out param keytype: 1 if RSA 2 if DSA */ typedef int SureWareHook_Load_Privkey_t(char*const msg,const char *key_id,char **hptr,unsigned long *num,char *keytype); extern SW_EXPORT SureWareHook_Load_Privkey_t SureWareHook_Load_Privkey; /* * SureWare Info Public Key function * return 1 if success * SureWareHOOK_ERROR_FAILED if error while processing * No hardware is contact for this function. * * in param key_id :the name of the private protected key file without the extension ".swp" * out param hptr : a pointer to a buffer allocated by SureWare_Hook * out param num: the effective key length in bytes * out param keytype: 1 if RSA 2 if DSA */ typedef int SureWareHook_Info_Pubkey_t(char*const msg,const char *key_id,unsigned long *num, char *keytype); extern SW_EXPORT SureWareHook_Info_Pubkey_t SureWareHook_Info_Pubkey; /* * SureWare Load Public Key function * return 1 if success * SureWareHOOK_ERROR_FAILED if error while processing * No hardware is contact for this function. * * in param key_id :the name of the public protected key file without the extension ".swp" * in param num : the bytes size of n and e * out param n: where to write modulus in bn format * out param e: where to write exponent in bn format */ typedef int SureWareHook_Load_Rsa_Pubkey_t(char*const msg,const char *key_id,unsigned long num, unsigned long *n, unsigned long *e); extern SW_EXPORT SureWareHook_Load_Rsa_Pubkey_t SureWareHook_Load_Rsa_Pubkey; /* * SureWare Load DSA Public Key function * return 1 if success * SureWareHOOK_ERROR_FAILED if error while processing * No hardware is contact for this function. * * in param key_id :the name of the public protected key file without the extension ".swp" * in param num : the bytes size of n and e * out param pub: where to write pub key in bn format * out param p: where to write prime in bn format * out param q: where to write sunprime (length 20 bytes) in bn format * out param g: where to write base in bn format */ typedef int SureWareHook_Load_Dsa_Pubkey_t(char*const msg,const char *key_id,unsigned long num, unsigned long *pub, unsigned long *p,unsigned long*q, unsigned long *g); extern SW_EXPORT SureWareHook_Load_Dsa_Pubkey_t SureWareHook_Load_Dsa_Pubkey; /* * SureWare Free function * Destroy the key into the hardware if destroy==1 */ typedef void SureWareHook_Free_t(char *p,int destroy); extern SW_EXPORT SureWareHook_Free_t SureWareHook_Free; #define SUREWARE_PKCS1_PAD 1 #define SUREWARE_ISO9796_PAD 2 #define SUREWARE_NO_PAD 0 /* * SureWare RSA Private Decryption * return 1 if success * SureWareHOOK_ERROR_FAILED if error while processing * SureWareHOOK_ERROR_UNIT_FAILURE if hardware failure * SUREWAREHOOK_ERROR_DATA_SIZE wrong size for buf * * in param flen : byte size of from and to * in param from : encrypted data buffer, should be a not-null valid pointer * out param tlen: byte size of decrypted data, if error, unexpected value * out param to : decrypted data buffer, should be a not-null valid pointer * in param prsa: a protected key pointer, should be a not-null valid pointer * int padding: padding id as follow * SUREWARE_PKCS1_PAD * SUREWARE_NO_PAD * */ typedef int SureWareHook_Rsa_Priv_Dec_t(char*const msg,int flen,unsigned char *from, int *tlen,unsigned char *to, char *prsa,int padding); extern SW_EXPORT SureWareHook_Rsa_Priv_Dec_t SureWareHook_Rsa_Priv_Dec; /* * SureWare RSA Signature * return 1 if success * SureWareHOOK_ERROR_FAILED if error while processing * SureWareHOOK_ERROR_UNIT_FAILURE if hardware failure * SUREWAREHOOK_ERROR_DATA_SIZE wrong size for buf * * in param flen : byte size of from and to * in param from : encrypted data buffer, should be a not-null valid pointer * out param tlen: byte size of decrypted data, if error, unexpected value * out param to : decrypted data buffer, should be a not-null valid pointer * in param prsa: a protected key pointer, should be a not-null valid pointer * int padding: padding id as follow * SUREWARE_PKCS1_PAD * SUREWARE_ISO9796_PAD * */ typedef int SureWareHook_Rsa_Sign_t(char*const msg,int flen,unsigned char *from, int *tlen,unsigned char *to, char *prsa,int padding); extern SW_EXPORT SureWareHook_Rsa_Sign_t SureWareHook_Rsa_Sign; /* * SureWare DSA Signature * return 1 if success * SureWareHOOK_ERROR_FAILED if error while processing * SureWareHOOK_ERROR_UNIT_FAILURE if hardware failure * SUREWAREHOOK_ERROR_DATA_SIZE wrong size for buf * * in param flen : byte size of from and to * in param from : encrypted data buffer, should be a not-null valid pointer * out param to : decrypted data buffer, should be a 40bytes valid pointer * in param pdsa: a protected key pointer, should be a not-null valid pointer * */ typedef int SureWareHook_Dsa_Sign_t(char*const msg,int flen,const unsigned char *from, unsigned long *r,unsigned long *s,char *pdsa); extern SW_EXPORT SureWareHook_Dsa_Sign_t SureWareHook_Dsa_Sign; /* * SureWare Mod Exp * return 1 if success * SureWareHOOK_ERROR_FAILED if error while processing * SureWareHOOK_ERROR_UNIT_FAILURE if hardware failure * SUREWAREHOOK_ERROR_DATA_SIZE wrong size for buf * * mod and res are mlen bytes long. * exp is elen bytes long * data is dlen bytes long * mlen,elen and dlen are all multiple of sizeof(unsigned long) */ typedef int SureWareHook_Mod_Exp_t(char*const msg,int mlen,const unsigned long *mod, int elen,const unsigned long *exp, int dlen,unsigned long *data, unsigned long *res); extern SW_EXPORT SureWareHook_Mod_Exp_t SureWareHook_Mod_Exp;