summaryrefslogtreecommitdiff
path: root/src/libnm-core-impl/nm-crypto.h
diff options
context:
space:
mode:
Diffstat (limited to 'src/libnm-core-impl/nm-crypto.h')
-rw-r--r--src/libnm-core-impl/nm-crypto.h103
1 files changed, 103 insertions, 0 deletions
diff --git a/src/libnm-core-impl/nm-crypto.h b/src/libnm-core-impl/nm-crypto.h
new file mode 100644
index 0000000000..8665a234bf
--- /dev/null
+++ b/src/libnm-core-impl/nm-crypto.h
@@ -0,0 +1,103 @@
+/* SPDX-License-Identifier: LGPL-2.1-or-later */
+/*
+ * Dan Williams <dcbw@redhat.com>
+ * Copyright (C) 2007 - 2014 Red Hat, Inc.
+ */
+
+#ifndef __NM_CRYPTO_H__
+#define __NM_CRYPTO_H__
+
+typedef enum {
+ NM_CRYPTO_CIPHER_UNKNOWN,
+ NM_CRYPTO_CIPHER_DES_EDE3_CBC,
+ NM_CRYPTO_CIPHER_DES_CBC,
+ NM_CRYPTO_CIPHER_AES_128_CBC,
+ NM_CRYPTO_CIPHER_AES_192_CBC,
+ NM_CRYPTO_CIPHER_AES_256_CBC,
+} NMCryptoCipherType;
+
+typedef struct {
+ const char * name;
+ NMCryptoCipherType cipher;
+ guint8 digest_len;
+ guint8 real_iv_len;
+} NMCryptoCipherInfo;
+
+const NMCryptoCipherInfo *nm_crypto_cipher_get_info(NMCryptoCipherType cipher);
+const NMCryptoCipherInfo *nm_crypto_cipher_get_info_by_name(const char *cipher_name, gssize p_len);
+
+typedef enum {
+ NM_CRYPTO_KEY_TYPE_UNKNOWN = 0,
+ NM_CRYPTO_KEY_TYPE_RSA,
+ NM_CRYPTO_KEY_TYPE_DSA
+} NMCryptoKeyType;
+
+typedef enum {
+ NM_CRYPTO_FILE_FORMAT_UNKNOWN = 0,
+ NM_CRYPTO_FILE_FORMAT_X509,
+ NM_CRYPTO_FILE_FORMAT_RAW_KEY,
+ NM_CRYPTO_FILE_FORMAT_PKCS12
+} NMCryptoFileFormat;
+
+/*****************************************************************************/
+
+GBytes *nm_crypto_read_file(const char *filename, GError **error);
+
+gboolean nm_crypto_load_and_verify_certificate(const char * file,
+ NMCryptoFileFormat *out_file_format,
+ GBytes ** out_certificat,
+ GError ** error);
+
+gboolean nm_crypto_is_pkcs12_file(const char *file, GError **error);
+
+gboolean nm_crypto_is_pkcs12_data(const guint8 *data, gsize len, GError **error);
+
+NMCryptoFileFormat nm_crypto_verify_private_key_data(const guint8 *data,
+ gsize data_len,
+ const char * password,
+ gboolean * out_is_encrypted,
+ GError ** error);
+
+NMCryptoFileFormat nm_crypto_verify_private_key(const char *file,
+ const char *password,
+ gboolean * out_is_encrypted,
+ GError ** error);
+
+void nm_crypto_md5_hash(const guint8 *salt,
+ gsize salt_len,
+ const guint8 *password,
+ gsize password_len,
+ guint8 * buffer,
+ gsize buflen);
+
+gboolean nm_crypto_randomize(void *buffer, gsize buffer_len, GError **error);
+
+/*****************************************************************************/
+
+GBytes *nmtst_crypto_decrypt_openssl_private_key_data(const guint8 * data,
+ gsize data_len,
+ const char * password,
+ NMCryptoKeyType *out_key_type,
+ GError ** error);
+
+GBytes *nmtst_crypto_decrypt_openssl_private_key(const char * file,
+ const char * password,
+ NMCryptoKeyType *out_key_type,
+ GError ** error);
+
+GBytes *nmtst_crypto_rsa_key_encrypt(const guint8 *data,
+ gsize len,
+ const char * in_password,
+ char ** out_password,
+ GError ** error);
+
+guint8 *nmtst_crypto_make_des_aes_key(NMCryptoCipherType cipher,
+ const guint8 * salt,
+ gsize salt_len,
+ const char * password,
+ gsize * out_len,
+ GError ** error);
+
+/*****************************************************************************/
+
+#endif /* __NM_CRYPTO_H__ */