mirror of
https://gitlab.freedesktop.org/NetworkManager/NetworkManager.git
synced 2025-12-24 19:30:07 +01:00
Our coding style recommends C style comments (/* */) instead of C++ (//). Also, systemd (which we partly fork) uses C style comments for the SPDX-License-Identifier. Unify the style. $ sed -i '1 s#// SPDX-License-Identifier: \([^ ]\+\)$#/* SPDX-License-Identifier: \1 */#' -- $(git ls-files -- '*.[hc]' '*.[hc]pp')
107 lines
4.3 KiB
C
107 lines
4.3 KiB
C
/* SPDX-License-Identifier: LGPL-2.1+ */
|
|
/*
|
|
* Dan Williams <dcbw@redhat.com>
|
|
* Copyright (C) 2007 - 2014 Red Hat, Inc.
|
|
*/
|
|
|
|
#ifndef __NM_CRYPTO_H__
|
|
#define __NM_CRYPTO_H__
|
|
|
|
#if !((NETWORKMANAGER_COMPILATION) &NM_NETWORKMANAGER_COMPILATION_WITH_LIBNM_CORE_PRIVATE)
|
|
#error Cannot use this header.
|
|
#endif
|
|
|
|
typedef enum {
|
|
NM_CRYPTO_CIPHER_UNKNOWN,
|
|
NM_CRYPTO_CIPHER_DES_EDE3_CBC,
|
|
NM_CRYPTO_CIPHER_DES_CBC,
|
|
NM_CRYPTO_CIPHER_AES_128_CBC,
|
|
NM_CRYPTO_CIPHER_AES_192_CBC,
|
|
NM_CRYPTO_CIPHER_AES_256_CBC,
|
|
} NMCryptoCipherType;
|
|
|
|
typedef struct {
|
|
const char * name;
|
|
NMCryptoCipherType cipher;
|
|
guint8 digest_len;
|
|
guint8 real_iv_len;
|
|
} NMCryptoCipherInfo;
|
|
|
|
const NMCryptoCipherInfo *nm_crypto_cipher_get_info(NMCryptoCipherType cipher);
|
|
const NMCryptoCipherInfo *nm_crypto_cipher_get_info_by_name(const char *cipher_name, gssize p_len);
|
|
|
|
typedef enum {
|
|
NM_CRYPTO_KEY_TYPE_UNKNOWN = 0,
|
|
NM_CRYPTO_KEY_TYPE_RSA,
|
|
NM_CRYPTO_KEY_TYPE_DSA
|
|
} NMCryptoKeyType;
|
|
|
|
typedef enum {
|
|
NM_CRYPTO_FILE_FORMAT_UNKNOWN = 0,
|
|
NM_CRYPTO_FILE_FORMAT_X509,
|
|
NM_CRYPTO_FILE_FORMAT_RAW_KEY,
|
|
NM_CRYPTO_FILE_FORMAT_PKCS12
|
|
} NMCryptoFileFormat;
|
|
|
|
/*****************************************************************************/
|
|
|
|
GBytes *nm_crypto_read_file(const char *filename, GError **error);
|
|
|
|
gboolean nm_crypto_load_and_verify_certificate(const char * file,
|
|
NMCryptoFileFormat *out_file_format,
|
|
GBytes ** out_certificat,
|
|
GError ** error);
|
|
|
|
gboolean nm_crypto_is_pkcs12_file(const char *file, GError **error);
|
|
|
|
gboolean nm_crypto_is_pkcs12_data(const guint8 *data, gsize len, GError **error);
|
|
|
|
NMCryptoFileFormat nm_crypto_verify_private_key_data(const guint8 *data,
|
|
gsize data_len,
|
|
const char * password,
|
|
gboolean * out_is_encrypted,
|
|
GError ** error);
|
|
|
|
NMCryptoFileFormat nm_crypto_verify_private_key(const char *file,
|
|
const char *password,
|
|
gboolean * out_is_encrypted,
|
|
GError ** error);
|
|
|
|
void nm_crypto_md5_hash(const guint8 *salt,
|
|
gsize salt_len,
|
|
const guint8 *password,
|
|
gsize password_len,
|
|
guint8 * buffer,
|
|
gsize buflen);
|
|
|
|
gboolean nm_crypto_randomize(void *buffer, gsize buffer_len, GError **error);
|
|
|
|
/*****************************************************************************/
|
|
|
|
GBytes *nmtst_crypto_decrypt_openssl_private_key_data(const guint8 * data,
|
|
gsize data_len,
|
|
const char * password,
|
|
NMCryptoKeyType *out_key_type,
|
|
GError ** error);
|
|
|
|
GBytes *nmtst_crypto_decrypt_openssl_private_key(const char * file,
|
|
const char * password,
|
|
NMCryptoKeyType *out_key_type,
|
|
GError ** error);
|
|
|
|
GBytes *nmtst_crypto_rsa_key_encrypt(const guint8 *data,
|
|
gsize len,
|
|
const char * in_password,
|
|
char ** out_password,
|
|
GError ** error);
|
|
|
|
guint8 *nmtst_crypto_make_des_aes_key(NMCryptoCipherType cipher,
|
|
const guint8 * salt,
|
|
gsize salt_len,
|
|
const char * password,
|
|
gsize * out_len,
|
|
GError ** error);
|
|
|
|
/*****************************************************************************/
|
|
|
|
#endif /* __NM_CRYPTO_H__ */
|