NetworkManager/libnm-core/nm-crypto.h
Thomas Haller 977ea352a0
all: update deprecated SPDX license identifiers
These SPDX license identifiers are deprecated ([1]). Update them.

[1] https://spdx.org/licenses/

  sed \
     -e '1 s%^/\* SPDX-License-Identifier: \(GPL-2.0\|LGPL-2.1\)+ \*/$%/* SPDX-License-Identifier: \1-or-later */%' \
     -e '1,2 s%^\(--\|#\|//\) SPDX-License-Identifier: \(GPL-2.0\|LGPL-2.1\)+$%\1 SPDX-License-Identifier: \2-or-later%' \
     -i \
     $(git grep -l SPDX-License-Identifier -- \
         ':(exclude)shared/c-*/' \
         ':(exclude)shared/n-*/' \
         ':(exclude)shared/systemd/src' \
         ':(exclude)src/systemd/src')
2021-01-05 09:46:21 +01:00

107 lines
4.4 KiB
C

/* SPDX-License-Identifier: LGPL-2.1-or-later */
/*
* Dan Williams <dcbw@redhat.com>
* Copyright (C) 2007 - 2014 Red Hat, Inc.
*/
#ifndef __NM_CRYPTO_H__
#define __NM_CRYPTO_H__
#if !((NETWORKMANAGER_COMPILATION) &NM_NETWORKMANAGER_COMPILATION_WITH_LIBNM_CORE_PRIVATE)
#error Cannot use this header.
#endif
typedef enum {
NM_CRYPTO_CIPHER_UNKNOWN,
NM_CRYPTO_CIPHER_DES_EDE3_CBC,
NM_CRYPTO_CIPHER_DES_CBC,
NM_CRYPTO_CIPHER_AES_128_CBC,
NM_CRYPTO_CIPHER_AES_192_CBC,
NM_CRYPTO_CIPHER_AES_256_CBC,
} NMCryptoCipherType;
typedef struct {
const char * name;
NMCryptoCipherType cipher;
guint8 digest_len;
guint8 real_iv_len;
} NMCryptoCipherInfo;
const NMCryptoCipherInfo *nm_crypto_cipher_get_info(NMCryptoCipherType cipher);
const NMCryptoCipherInfo *nm_crypto_cipher_get_info_by_name(const char *cipher_name, gssize p_len);
typedef enum {
NM_CRYPTO_KEY_TYPE_UNKNOWN = 0,
NM_CRYPTO_KEY_TYPE_RSA,
NM_CRYPTO_KEY_TYPE_DSA
} NMCryptoKeyType;
typedef enum {
NM_CRYPTO_FILE_FORMAT_UNKNOWN = 0,
NM_CRYPTO_FILE_FORMAT_X509,
NM_CRYPTO_FILE_FORMAT_RAW_KEY,
NM_CRYPTO_FILE_FORMAT_PKCS12
} NMCryptoFileFormat;
/*****************************************************************************/
GBytes *nm_crypto_read_file(const char *filename, GError **error);
gboolean nm_crypto_load_and_verify_certificate(const char * file,
NMCryptoFileFormat *out_file_format,
GBytes ** out_certificat,
GError ** error);
gboolean nm_crypto_is_pkcs12_file(const char *file, GError **error);
gboolean nm_crypto_is_pkcs12_data(const guint8 *data, gsize len, GError **error);
NMCryptoFileFormat nm_crypto_verify_private_key_data(const guint8 *data,
gsize data_len,
const char * password,
gboolean * out_is_encrypted,
GError ** error);
NMCryptoFileFormat nm_crypto_verify_private_key(const char *file,
const char *password,
gboolean * out_is_encrypted,
GError ** error);
void nm_crypto_md5_hash(const guint8 *salt,
gsize salt_len,
const guint8 *password,
gsize password_len,
guint8 * buffer,
gsize buflen);
gboolean nm_crypto_randomize(void *buffer, gsize buffer_len, GError **error);
/*****************************************************************************/
GBytes *nmtst_crypto_decrypt_openssl_private_key_data(const guint8 * data,
gsize data_len,
const char * password,
NMCryptoKeyType *out_key_type,
GError ** error);
GBytes *nmtst_crypto_decrypt_openssl_private_key(const char * file,
const char * password,
NMCryptoKeyType *out_key_type,
GError ** error);
GBytes *nmtst_crypto_rsa_key_encrypt(const guint8 *data,
gsize len,
const char * in_password,
char ** out_password,
GError ** error);
guint8 *nmtst_crypto_make_des_aes_key(NMCryptoCipherType cipher,
const guint8 * salt,
gsize salt_len,
const char * password,
gsize * out_len,
GError ** error);
/*****************************************************************************/
#endif /* __NM_CRYPTO_H__ */