mirror of
https://github.com/SoftEtherVPN/SoftEtherVPN.git
synced 2024-11-22 17:39:53 +03:00
src/Mayaqua/Encrypt.c: remove unused functions (#506)
[src/Mayaqua/Encrypt.c:1524]: (style) The function 'ByteToStr' is never used. [src/Mayaqua/Encrypt.c:2762]: (style) The function 'CheckX' is never used. [src/Mayaqua/Encrypt.c:4346]: (style) The function 'Des3Decrypt' is never used. [src/Mayaqua/Encrypt.c:4290]: (style) The function 'Des3Encrypt' is never used. [src/Mayaqua/Encrypt.c:4434]: (style) The function 'Des3RandKey' is never used. [src/Mayaqua/Encrypt.c:4474]: (style) The function 'DesFreeKey' is never used. [src/Mayaqua/Encrypt.c:4499]: (style) The function 'DesNewKey' is never used. [src/Mayaqua/Encrypt.c:4446]: (style) The function 'DesRandKey' is never used. [src/Mayaqua/Encrypt.c:4892]: (style) The function 'DhToBuf' is never used. [src/Mayaqua/Encrypt.c:293]: (style) The function 'EasyDecrypt' is never used. [src/Mayaqua/Encrypt.c:259]: (style) The function 'EasyEncrypt' is never used. [src/Mayaqua/Encrypt.c:3144]: (style) The function 'FileToK' is never used. [src/Mayaqua/Encrypt.c:1358]: (style) The function 'FileToP12' is never used. [src/Mayaqua/Encrypt.c:1061]: (style) The function 'GetAllNameFromA' is never used. [src/Mayaqua/Encrypt.c:973]: (style) The function 'GetAllNameFromXExA' is never used. [src/Mayaqua/Encrypt.c:4182]: (style) The function 'HashSha256' is never used. [src/Mayaqua/Encrypt.c:3192]: (style) The function 'KToFile' is never used. [src/Mayaqua/Encrypt.c:4721]: (style) The function 'MacSha196' is never used. [src/Mayaqua/Encrypt.c:1324]: (style) The function 'P12ToFile' is never used. [src/Mayaqua/Encrypt.c:3983]: (style) The function 'Rand128' is never used. [src/Mayaqua/Encrypt.c:670]: (style) The function 'RsaBinToPublic' is never used. [src/Mayaqua/Encrypt.c:2556]: (style) The function 'RsaPrivateDecrypt' is never used. [src/Mayaqua/Encrypt.c:2525]: (style) The function 'RsaPrivateEncrypt' is never used. [src/Mayaqua/Encrypt.c:2494]: (style) The function 'RsaPublicDecrypt' is never used. [src/Mayaqua/Encrypt.c:2584]: (style) The function 'RsaPublicEncrypt' is never used. [src/Mayaqua/Encrypt.c:771]: (style) The function 'RsaPublicToBin' is never used. [src/Mayaqua/Encrypt.c:4263]: (style) The function 'Sha1__' is never used. [src/Mayaqua/Encrypt.c:3672]: (style) The function 'SkipBufBeforeString' is never used.
This commit is contained in:
parent
e4840106c5
commit
13cadf6492
@ -255,74 +255,6 @@ void Enc_tls1_PRF(unsigned char *label, int label_len, const unsigned char *sec,
|
|||||||
Free(out2);
|
Free(out2);
|
||||||
}
|
}
|
||||||
|
|
||||||
// Easy encryption
|
|
||||||
BUF *EasyEncrypt(BUF *src_buf)
|
|
||||||
{
|
|
||||||
UCHAR key[SHA1_SIZE];
|
|
||||||
BUF *tmp_data;
|
|
||||||
CRYPT *rc4;
|
|
||||||
BUF *ret;
|
|
||||||
// Validate arguments
|
|
||||||
if (src_buf == NULL)
|
|
||||||
{
|
|
||||||
return NULL;
|
|
||||||
}
|
|
||||||
|
|
||||||
Rand(key, SHA1_SIZE);
|
|
||||||
|
|
||||||
tmp_data = CloneBuf(src_buf);
|
|
||||||
|
|
||||||
rc4 = NewCrypt(key, SHA1_SIZE);
|
|
||||||
|
|
||||||
Encrypt(rc4, tmp_data->Buf, tmp_data->Buf, tmp_data->Size);
|
|
||||||
|
|
||||||
ret = NewBuf();
|
|
||||||
|
|
||||||
WriteBuf(ret, key, SHA1_SIZE);
|
|
||||||
WriteBufBuf(ret, tmp_data);
|
|
||||||
|
|
||||||
FreeCrypt(rc4);
|
|
||||||
FreeBuf(tmp_data);
|
|
||||||
|
|
||||||
SeekBufToBegin(ret);
|
|
||||||
|
|
||||||
return ret;
|
|
||||||
}
|
|
||||||
|
|
||||||
// Easy decryption
|
|
||||||
BUF *EasyDecrypt(BUF *src_buf)
|
|
||||||
{
|
|
||||||
UCHAR key[SHA1_SIZE];
|
|
||||||
BUF *tmp_buf;
|
|
||||||
CRYPT *rc4;
|
|
||||||
// Validate arguments
|
|
||||||
if (src_buf == NULL)
|
|
||||||
{
|
|
||||||
return NULL;
|
|
||||||
}
|
|
||||||
|
|
||||||
SeekBufToBegin(src_buf);
|
|
||||||
|
|
||||||
if (ReadBuf(src_buf, key, SHA1_SIZE) != SHA1_SIZE)
|
|
||||||
{
|
|
||||||
return NULL;
|
|
||||||
}
|
|
||||||
|
|
||||||
tmp_buf = ReadRemainBuf(src_buf);
|
|
||||||
if (tmp_buf == NULL)
|
|
||||||
{
|
|
||||||
return NULL;
|
|
||||||
}
|
|
||||||
|
|
||||||
rc4 = NewCrypt(key, SHA1_SIZE);
|
|
||||||
Encrypt(rc4, tmp_buf->Buf, tmp_buf->Buf, tmp_buf->Size);
|
|
||||||
FreeCrypt(rc4);
|
|
||||||
|
|
||||||
SeekBufToBegin(tmp_buf);
|
|
||||||
|
|
||||||
return tmp_buf;
|
|
||||||
}
|
|
||||||
|
|
||||||
// Calculation of HMAC (MD5)
|
// Calculation of HMAC (MD5)
|
||||||
void HMacMd5(void *dst, void *key, UINT key_size, void *data, UINT data_size)
|
void HMacMd5(void *dst, void *key, UINT key_size, void *data, UINT data_size)
|
||||||
{
|
{
|
||||||
@ -666,62 +598,6 @@ void FreeCipher(CIPHER *c)
|
|||||||
Free(c);
|
Free(c);
|
||||||
}
|
}
|
||||||
|
|
||||||
// Convert the buffer to the public key
|
|
||||||
K *RsaBinToPublic(void *data, UINT size)
|
|
||||||
{
|
|
||||||
RSA *rsa;
|
|
||||||
K *k;
|
|
||||||
BIO *bio;
|
|
||||||
#if OPENSSL_VERSION_NUMBER >= 0x10100000L
|
|
||||||
BIGNUM *e, *n;
|
|
||||||
#endif
|
|
||||||
// Validate arguments
|
|
||||||
if (data == NULL || size < 4)
|
|
||||||
{
|
|
||||||
return NULL;
|
|
||||||
}
|
|
||||||
|
|
||||||
rsa = RSA_new();
|
|
||||||
|
|
||||||
#if OPENSSL_VERSION_NUMBER >= 0x10100000L
|
|
||||||
e = BN_new();
|
|
||||||
BN_set_word(e, RSA_F4);
|
|
||||||
|
|
||||||
n = BinToBigNum(data, size);
|
|
||||||
|
|
||||||
RSA_set0_key(rsa, n, e, NULL);
|
|
||||||
#else
|
|
||||||
if (rsa->e != NULL)
|
|
||||||
{
|
|
||||||
BN_free(rsa->e);
|
|
||||||
}
|
|
||||||
|
|
||||||
rsa->e = BN_new();
|
|
||||||
BN_set_word(rsa->e, RSA_F4);
|
|
||||||
|
|
||||||
if (rsa->n != NULL)
|
|
||||||
{
|
|
||||||
BN_free(rsa->n);
|
|
||||||
}
|
|
||||||
|
|
||||||
rsa->n = BinToBigNum(data, size);
|
|
||||||
#endif
|
|
||||||
|
|
||||||
bio = NewBio();
|
|
||||||
Lock(openssl_lock);
|
|
||||||
{
|
|
||||||
i2d_RSA_PUBKEY_bio(bio, rsa);
|
|
||||||
}
|
|
||||||
Unlock(openssl_lock);
|
|
||||||
BIO_seek(bio, 0);
|
|
||||||
k = BioToK(bio, false, false, NULL);
|
|
||||||
FreeBio(bio);
|
|
||||||
|
|
||||||
RSA_free(rsa);
|
|
||||||
|
|
||||||
return k;
|
|
||||||
}
|
|
||||||
|
|
||||||
// Convert the public key to a buffer
|
// Convert the public key to a buffer
|
||||||
BUF *RsaPublicToBuf(K *k)
|
BUF *RsaPublicToBuf(K *k)
|
||||||
{
|
{
|
||||||
@ -767,27 +643,6 @@ BUF *RsaPublicToBuf(K *k)
|
|||||||
return b;
|
return b;
|
||||||
}
|
}
|
||||||
|
|
||||||
// Convert the public key to a binary
|
|
||||||
void RsaPublicToBin(K *k, void *data)
|
|
||||||
{
|
|
||||||
BUF *b;
|
|
||||||
// Validate arguments
|
|
||||||
if (data == NULL)
|
|
||||||
{
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
b = RsaPublicToBuf(k);
|
|
||||||
if (b == NULL)
|
|
||||||
{
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
Copy(data, b->Buf, b->Size);
|
|
||||||
|
|
||||||
FreeBuf(b);
|
|
||||||
}
|
|
||||||
|
|
||||||
// Get public key size
|
// Get public key size
|
||||||
UINT RsaPublicSize(K *k)
|
UINT RsaPublicSize(K *k)
|
||||||
{
|
{
|
||||||
@ -970,19 +825,6 @@ void GetAllNameFromXEx(wchar_t *str, UINT size, X *x)
|
|||||||
|
|
||||||
GetAllNameFromNameEx(str, size, x->subject_name);
|
GetAllNameFromNameEx(str, size, x->subject_name);
|
||||||
}
|
}
|
||||||
void GetAllNameFromXExA(char *str, UINT size, X *x)
|
|
||||||
{
|
|
||||||
wchar_t tmp[MAX_SIZE];
|
|
||||||
// Validate arguments
|
|
||||||
if (str == NULL || x == NULL)
|
|
||||||
{
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
GetAllNameFromXEx(tmp, sizeof(tmp), x);
|
|
||||||
|
|
||||||
UniToStr(str, size, tmp);
|
|
||||||
}
|
|
||||||
|
|
||||||
// Get the display name from NAME
|
// Get the display name from NAME
|
||||||
void GetPrintNameFromName(wchar_t *str, UINT size, NAME *name)
|
void GetPrintNameFromName(wchar_t *str, UINT size, NAME *name)
|
||||||
@ -1058,18 +900,6 @@ void GetAllNameFromX(wchar_t *str, UINT size, X *x)
|
|||||||
UniFormat(tmp3, sizeof(tmp3), L" (Digest: MD5=\"%S\", SHA1=\"%S\")", tmp1, tmp2);
|
UniFormat(tmp3, sizeof(tmp3), L" (Digest: MD5=\"%S\", SHA1=\"%S\")", tmp1, tmp2);
|
||||||
UniStrCat(str, size, tmp3);
|
UniStrCat(str, size, tmp3);
|
||||||
}
|
}
|
||||||
void GetAllNameFromA(char *str, UINT size, X *x)
|
|
||||||
{
|
|
||||||
wchar_t tmp[MAX_SIZE];
|
|
||||||
// Validate arguments
|
|
||||||
if (str == NULL || x == NULL)
|
|
||||||
{
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
GetAllNameFromX(tmp, sizeof(tmp), x);
|
|
||||||
UniToStr(str, size, tmp);
|
|
||||||
}
|
|
||||||
|
|
||||||
// Get the all name strings from NAME
|
// Get the all name strings from NAME
|
||||||
void GetAllNameFromName(wchar_t *str, UINT size, NAME *name)
|
void GetAllNameFromName(wchar_t *str, UINT size, NAME *name)
|
||||||
@ -1321,13 +1151,6 @@ bool ParseP12(P12 *p12, X **x, K **k, char *password)
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Write the P12 to a file
|
// Write the P12 to a file
|
||||||
bool P12ToFile(P12 *p12, char *filename)
|
|
||||||
{
|
|
||||||
wchar_t *filename_w = CopyStrToUni(filename);
|
|
||||||
bool ret = P12ToFileW(p12, filename_w);
|
|
||||||
|
|
||||||
return ret;
|
|
||||||
}
|
|
||||||
bool P12ToFileW(P12 *p12, wchar_t *filename)
|
bool P12ToFileW(P12 *p12, wchar_t *filename)
|
||||||
{
|
{
|
||||||
BUF *b;
|
BUF *b;
|
||||||
@ -1355,15 +1178,6 @@ bool P12ToFileW(P12 *p12, wchar_t *filename)
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Read a P12 from the file
|
// Read a P12 from the file
|
||||||
P12 *FileToP12(char *filename)
|
|
||||||
{
|
|
||||||
wchar_t *filename_w = CopyStrToUni(filename);
|
|
||||||
P12 *ret = FileToP12W(filename_w);
|
|
||||||
|
|
||||||
Free(filename_w);
|
|
||||||
|
|
||||||
return ret;
|
|
||||||
}
|
|
||||||
P12 *FileToP12W(wchar_t *filename)
|
P12 *FileToP12W(wchar_t *filename)
|
||||||
{
|
{
|
||||||
BUF *b;
|
BUF *b;
|
||||||
@ -1520,33 +1334,6 @@ P12 *PKCS12ToP12(PKCS12 *pkcs12)
|
|||||||
return p12;
|
return p12;
|
||||||
}
|
}
|
||||||
|
|
||||||
// Convert a binary to a string
|
|
||||||
char *ByteToStr(BYTE *src, UINT src_size)
|
|
||||||
{
|
|
||||||
UINT size;
|
|
||||||
char *dst;
|
|
||||||
UINT i;
|
|
||||||
// Validate arguments
|
|
||||||
if (src == NULL)
|
|
||||||
{
|
|
||||||
return NULL;
|
|
||||||
}
|
|
||||||
|
|
||||||
size = MAX(src_size * 3, 1);
|
|
||||||
dst = Malloc(size);
|
|
||||||
dst[size - 1] = 0;
|
|
||||||
for (i = 0;i < src_size;i++)
|
|
||||||
{
|
|
||||||
char tmp[3];
|
|
||||||
Format(tmp, sizeof(tmp), "%02x", src[i]);
|
|
||||||
dst[i * 3 + 0] = tmp[0];
|
|
||||||
dst[i * 3 + 1] = tmp[1];
|
|
||||||
dst[i * 3 + 2] = ((i == (src_size - 1) ? 0 : ' '));
|
|
||||||
}
|
|
||||||
|
|
||||||
return dst;
|
|
||||||
}
|
|
||||||
|
|
||||||
// Release of X_SERIAL
|
// Release of X_SERIAL
|
||||||
void FreeXSerial(X_SERIAL *serial)
|
void FreeXSerial(X_SERIAL *serial)
|
||||||
{
|
{
|
||||||
@ -2490,124 +2277,6 @@ bool HashForSign(void *dst, UINT dst_size, void *src, UINT src_size)
|
|||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
|
|
||||||
// Decrypt with the RSA public key
|
|
||||||
bool RsaPublicDecrypt(void *dst, void *src, UINT size, K *k)
|
|
||||||
{
|
|
||||||
void *tmp;
|
|
||||||
int ret;
|
|
||||||
// Validate arguments
|
|
||||||
if (src == NULL || size == 0 || k == NULL)
|
|
||||||
{
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
tmp = ZeroMalloc(size);
|
|
||||||
Lock(openssl_lock);
|
|
||||||
{
|
|
||||||
ret = RSA_public_decrypt(size, src, tmp, EVP_PKEY_get0_RSA(k->pkey), RSA_NO_PADDING);
|
|
||||||
}
|
|
||||||
Unlock(openssl_lock);
|
|
||||||
if (ret <= 0)
|
|
||||||
{
|
|
||||||
/* Debug("RSA Error: 0x%x\n",
|
|
||||||
ERR_get_error());
|
|
||||||
*/ Free(tmp);
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
Copy(dst, tmp, size);
|
|
||||||
Free(tmp);
|
|
||||||
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
// Encrypt with the RSA private key
|
|
||||||
bool RsaPrivateEncrypt(void *dst, void *src, UINT size, K *k)
|
|
||||||
{
|
|
||||||
void *tmp;
|
|
||||||
int ret;
|
|
||||||
// Validate arguments
|
|
||||||
if (src == NULL || size == 0 || k == NULL)
|
|
||||||
{
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
tmp = ZeroMalloc(size);
|
|
||||||
Lock(openssl_lock);
|
|
||||||
{
|
|
||||||
ret = RSA_private_encrypt(size, src, tmp, EVP_PKEY_get0_RSA(k->pkey), RSA_NO_PADDING);
|
|
||||||
}
|
|
||||||
Unlock(openssl_lock);
|
|
||||||
if (ret <= 0)
|
|
||||||
{
|
|
||||||
/* Debug("RSA Error: %u\n",
|
|
||||||
ERR_GET_REASON(ERR_get_error()));
|
|
||||||
*/ Free(tmp);
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
Copy(dst, tmp, size);
|
|
||||||
Free(tmp);
|
|
||||||
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
// Decrypt with the RSA private key
|
|
||||||
bool RsaPrivateDecrypt(void *dst, void *src, UINT size, K *k)
|
|
||||||
{
|
|
||||||
void *tmp;
|
|
||||||
int ret;
|
|
||||||
// Validate arguments
|
|
||||||
if (src == NULL || size == 0 || k == NULL)
|
|
||||||
{
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
tmp = ZeroMalloc(size);
|
|
||||||
Lock(openssl_lock);
|
|
||||||
{
|
|
||||||
ret = RSA_private_decrypt(size, src, tmp, EVP_PKEY_get0_RSA(k->pkey), RSA_NO_PADDING);
|
|
||||||
}
|
|
||||||
Unlock(openssl_lock);
|
|
||||||
if (ret <= 0)
|
|
||||||
{
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
Copy(dst, tmp, size);
|
|
||||||
Free(tmp);
|
|
||||||
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
// Encrypt with the RSA public key
|
|
||||||
bool RsaPublicEncrypt(void *dst, void *src, UINT size, K *k)
|
|
||||||
{
|
|
||||||
void *tmp;
|
|
||||||
int ret;
|
|
||||||
// Validate arguments
|
|
||||||
if (src == NULL || size == 0 || k == NULL)
|
|
||||||
{
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
tmp = ZeroMalloc(size);
|
|
||||||
Lock(openssl_lock);
|
|
||||||
{
|
|
||||||
ret = RSA_public_encrypt(size, src, tmp, EVP_PKEY_get0_RSA(k->pkey), RSA_NO_PADDING);
|
|
||||||
}
|
|
||||||
Unlock(openssl_lock);
|
|
||||||
if (ret <= 0)
|
|
||||||
{
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
Copy(dst, tmp, size);
|
|
||||||
Free(tmp);
|
|
||||||
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
// RSA operating environment check
|
// RSA operating environment check
|
||||||
bool RsaCheckEx()
|
bool RsaCheckEx()
|
||||||
{
|
{
|
||||||
@ -2759,10 +2428,6 @@ bool RsaGen(K **priv, K **pub, UINT bit)
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Confirm whether the certificate X is signed by the issuer of the certificate x_issuer
|
// Confirm whether the certificate X is signed by the issuer of the certificate x_issuer
|
||||||
bool CheckX(X *x, X *x_issuer)
|
|
||||||
{
|
|
||||||
return CheckXEx(x, x_issuer, false, false);
|
|
||||||
}
|
|
||||||
bool CheckXEx(X *x, X *x_issuer, bool check_name, bool check_date)
|
bool CheckXEx(X *x, X *x_issuer, bool check_name, bool check_date)
|
||||||
{
|
{
|
||||||
K *k;
|
K *k;
|
||||||
@ -3141,17 +2806,6 @@ bool XToFileW(X *x, wchar_t *filename, bool text)
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Read a K from the file
|
// Read a K from the file
|
||||||
K *FileToK(char *filename, bool private_key, char *password)
|
|
||||||
{
|
|
||||||
wchar_t *filename_w = CopyStrToUni(filename);
|
|
||||||
K *ret;
|
|
||||||
|
|
||||||
ret = FileToKW(filename_w, private_key, password);
|
|
||||||
|
|
||||||
Free(filename_w);
|
|
||||||
|
|
||||||
return ret;
|
|
||||||
}
|
|
||||||
K *FileToKW(wchar_t *filename, bool private_key, char *password)
|
K *FileToKW(wchar_t *filename, bool private_key, char *password)
|
||||||
{
|
{
|
||||||
bool text;
|
bool text;
|
||||||
@ -3189,15 +2843,6 @@ K *FileToKW(wchar_t *filename, bool private_key, char *password)
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Save the K to a file
|
// Save the K to a file
|
||||||
bool KToFile(K *k, char *filename, bool text, char *password)
|
|
||||||
{
|
|
||||||
wchar_t *filename_w = CopyStrToUni(filename);
|
|
||||||
bool ret = KToFileW(k, filename_w, text, password);
|
|
||||||
|
|
||||||
Free(filename_w);
|
|
||||||
|
|
||||||
return ret;
|
|
||||||
}
|
|
||||||
bool KToFileW(K *k, wchar_t *filename, bool text, char *password)
|
bool KToFileW(K *k, wchar_t *filename, bool text, char *password)
|
||||||
{
|
{
|
||||||
BUF *b;
|
BUF *b;
|
||||||
@ -3668,39 +3313,6 @@ X *BufToX(BUF *b, bool text)
|
|||||||
return x;
|
return x;
|
||||||
}
|
}
|
||||||
|
|
||||||
// Create a new buffer by skipping the contents of the buffer to the specified string
|
|
||||||
BUF *SkipBufBeforeString(BUF *b, char *str)
|
|
||||||
{
|
|
||||||
char *tmp;
|
|
||||||
UINT tmp_size;
|
|
||||||
BUF *ret;
|
|
||||||
UINT i;
|
|
||||||
UINT offset = 0;
|
|
||||||
// Validate arguments
|
|
||||||
if (b == NULL || str == NULL)
|
|
||||||
{
|
|
||||||
return NULL;
|
|
||||||
}
|
|
||||||
|
|
||||||
tmp_size = b->Size + 1;
|
|
||||||
tmp = ZeroMalloc(tmp_size);
|
|
||||||
Copy(tmp, b->Buf, b->Size);
|
|
||||||
|
|
||||||
i = SearchStrEx(tmp, str, 0, false);
|
|
||||||
if (i != INFINITE)
|
|
||||||
{
|
|
||||||
offset = i;
|
|
||||||
}
|
|
||||||
|
|
||||||
ret = NewBuf();
|
|
||||||
WriteBuf(ret, ((UCHAR *)b->Buf) + offset, b->Size - offset);
|
|
||||||
SeekBuf(ret, 0, 0);
|
|
||||||
|
|
||||||
Free(tmp);
|
|
||||||
|
|
||||||
return ret;
|
|
||||||
}
|
|
||||||
|
|
||||||
// Get a digest of the X
|
// Get a digest of the X
|
||||||
void GetXDigest(X *x, UCHAR *buf, bool sha1)
|
void GetXDigest(X *x, UCHAR *buf, bool sha1)
|
||||||
{
|
{
|
||||||
@ -3979,12 +3591,6 @@ BIO *BufToBio(BUF *b)
|
|||||||
return bio;
|
return bio;
|
||||||
}
|
}
|
||||||
|
|
||||||
// 128-bit random number generation
|
|
||||||
void Rand128(void *buf)
|
|
||||||
{
|
|
||||||
Rand(buf, 16);
|
|
||||||
}
|
|
||||||
|
|
||||||
// 64-bit random number generation
|
// 64-bit random number generation
|
||||||
UINT64 Rand64()
|
UINT64 Rand64()
|
||||||
{
|
{
|
||||||
@ -4178,17 +3784,6 @@ void HashSha1(void *dst, void *src, UINT size)
|
|||||||
SHA1(src, size, dst);
|
SHA1(src, size, dst);
|
||||||
}
|
}
|
||||||
|
|
||||||
// SHA-256 specific hash function
|
|
||||||
void HashSha256(void *dst, void *src, UINT size)
|
|
||||||
{
|
|
||||||
// Validate arguments
|
|
||||||
if (dst == NULL || (size != 0 && src == NULL))
|
|
||||||
{
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
SHA256(src, size, dst);
|
|
||||||
}
|
|
||||||
|
|
||||||
// Creating a new CRYPT object
|
// Creating a new CRYPT object
|
||||||
CRYPT *NewCrypt(void *key, UINT size)
|
CRYPT *NewCrypt(void *key, UINT size)
|
||||||
{
|
{
|
||||||
@ -4260,10 +3855,6 @@ void Sha1(void *dst, void *src, UINT size)
|
|||||||
SHA1(src, size, dst);
|
SHA1(src, size, dst);
|
||||||
}
|
}
|
||||||
|
|
||||||
void Sha1__(void *dst, void *src, UINT size) {
|
|
||||||
Sha(SHA1_160, dst, src, size);
|
|
||||||
}
|
|
||||||
|
|
||||||
void Sha2_256(void *dst, void *src, UINT size) {
|
void Sha2_256(void *dst, void *src, UINT size) {
|
||||||
Sha(SHA2_256, dst, src, size);
|
Sha(SHA2_256, dst, src, size);
|
||||||
}
|
}
|
||||||
@ -4287,24 +3878,6 @@ void Md5(void *dst, void *src, UINT size)
|
|||||||
}
|
}
|
||||||
|
|
||||||
// 3DES encryption
|
// 3DES encryption
|
||||||
void Des3Encrypt(void *dest, void *src, UINT size, DES_KEY *key, void *ivec)
|
|
||||||
{
|
|
||||||
UCHAR ivec_copy[DES_IV_SIZE];
|
|
||||||
// Validate arguments
|
|
||||||
if (dest == NULL || src == NULL || size == 0 || key == NULL || ivec == NULL)
|
|
||||||
{
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
Copy(ivec_copy, ivec, DES_IV_SIZE);
|
|
||||||
|
|
||||||
DES_ede3_cbc_encrypt(src, dest, size,
|
|
||||||
key->k1->KeySchedule,
|
|
||||||
key->k2->KeySchedule,
|
|
||||||
key->k3->KeySchedule,
|
|
||||||
(DES_cblock *)ivec_copy,
|
|
||||||
1);
|
|
||||||
}
|
|
||||||
void Des3Encrypt2(void *dest, void *src, UINT size, DES_KEY_VALUE *k1, DES_KEY_VALUE *k2, DES_KEY_VALUE *k3, void *ivec)
|
void Des3Encrypt2(void *dest, void *src, UINT size, DES_KEY_VALUE *k1, DES_KEY_VALUE *k2, DES_KEY_VALUE *k3, void *ivec)
|
||||||
{
|
{
|
||||||
UCHAR ivec_copy[DES_IV_SIZE];
|
UCHAR ivec_copy[DES_IV_SIZE];
|
||||||
@ -4343,24 +3916,6 @@ void DesEncrypt(void *dest, void *src, UINT size, DES_KEY_VALUE *k, void *ivec)
|
|||||||
}
|
}
|
||||||
|
|
||||||
// 3DES decryption
|
// 3DES decryption
|
||||||
void Des3Decrypt(void *dest, void *src, UINT size, DES_KEY *key, void *ivec)
|
|
||||||
{
|
|
||||||
UCHAR ivec_copy[DES_IV_SIZE];
|
|
||||||
// Validate arguments
|
|
||||||
if (dest == NULL || src == NULL || size == 0 || key == NULL || ivec == NULL)
|
|
||||||
{
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
Copy(ivec_copy, ivec, DES_IV_SIZE);
|
|
||||||
|
|
||||||
DES_ede3_cbc_encrypt(src, dest, size,
|
|
||||||
key->k1->KeySchedule,
|
|
||||||
key->k2->KeySchedule,
|
|
||||||
key->k3->KeySchedule,
|
|
||||||
(DES_cblock *)ivec_copy,
|
|
||||||
0);
|
|
||||||
}
|
|
||||||
void Des3Decrypt2(void *dest, void *src, UINT size, DES_KEY_VALUE *k1, DES_KEY_VALUE *k2, DES_KEY_VALUE *k3, void *ivec)
|
void Des3Decrypt2(void *dest, void *src, UINT size, DES_KEY_VALUE *k1, DES_KEY_VALUE *k2, DES_KEY_VALUE *k3, void *ivec)
|
||||||
{
|
{
|
||||||
UCHAR ivec_copy[DES_IV_SIZE];
|
UCHAR ivec_copy[DES_IV_SIZE];
|
||||||
@ -4430,30 +3985,6 @@ void DesDecrypt(void *dest, void *src, UINT size, DES_KEY_VALUE *k, void *ivec)
|
|||||||
0);
|
0);
|
||||||
}
|
}
|
||||||
|
|
||||||
// Generate a random 3DES key
|
|
||||||
DES_KEY *Des3RandKey()
|
|
||||||
{
|
|
||||||
DES_KEY *k = ZeroMalloc(sizeof(DES_KEY));
|
|
||||||
|
|
||||||
k->k1 = DesRandKeyValue();
|
|
||||||
k->k2 = DesRandKeyValue();
|
|
||||||
k->k3 = DesRandKeyValue();
|
|
||||||
|
|
||||||
return k;
|
|
||||||
}
|
|
||||||
|
|
||||||
// Generate a random DES key
|
|
||||||
DES_KEY *DesRandKey()
|
|
||||||
{
|
|
||||||
DES_KEY *k = ZeroMalloc(sizeof(DES_KEY));
|
|
||||||
|
|
||||||
k->k1 = DesRandKeyValue();
|
|
||||||
k->k2 = DesNewKeyValue(k->k1->KeyValue);
|
|
||||||
k->k3 = DesNewKeyValue(k->k1->KeyValue);
|
|
||||||
|
|
||||||
return k;
|
|
||||||
}
|
|
||||||
|
|
||||||
// Release the 3DES key
|
// Release the 3DES key
|
||||||
void Des3FreeKey(DES_KEY *k)
|
void Des3FreeKey(DES_KEY *k)
|
||||||
{
|
{
|
||||||
@ -4470,12 +4001,6 @@ void Des3FreeKey(DES_KEY *k)
|
|||||||
Free(k);
|
Free(k);
|
||||||
}
|
}
|
||||||
|
|
||||||
// Release the DES key
|
|
||||||
void DesFreeKey(DES_KEY *k)
|
|
||||||
{
|
|
||||||
Des3FreeKey(k);
|
|
||||||
}
|
|
||||||
|
|
||||||
// Create a 3DES key
|
// Create a 3DES key
|
||||||
DES_KEY *Des3NewKey(void *k1, void *k2, void *k3)
|
DES_KEY *Des3NewKey(void *k1, void *k2, void *k3)
|
||||||
{
|
{
|
||||||
@ -4495,12 +4020,6 @@ DES_KEY *Des3NewKey(void *k1, void *k2, void *k3)
|
|||||||
return k;
|
return k;
|
||||||
}
|
}
|
||||||
|
|
||||||
// Create a DES key
|
|
||||||
DES_KEY *DesNewKey(void *k1)
|
|
||||||
{
|
|
||||||
return Des3NewKey(k1, k1, k1);
|
|
||||||
}
|
|
||||||
|
|
||||||
// Create a new DES key element
|
// Create a new DES key element
|
||||||
DES_KEY_VALUE *DesNewKeyValue(void *value)
|
DES_KEY_VALUE *DesNewKeyValue(void *value)
|
||||||
{
|
{
|
||||||
@ -4717,21 +4236,6 @@ void AesDecryptWithIntel(void *dest, void *src, UINT size, AES_KEY_VALUE *k, voi
|
|||||||
}
|
}
|
||||||
#endif // USE_INTEL_AESNI_LIBRARY
|
#endif // USE_INTEL_AESNI_LIBRARY
|
||||||
|
|
||||||
// Calculation of HMAC-SHA-1-96
|
|
||||||
void MacSha196(void *dst, void *key, void *data, UINT data_size)
|
|
||||||
{
|
|
||||||
UCHAR tmp[HMAC_SHA1_SIZE];
|
|
||||||
// Validate arguments
|
|
||||||
if (dst == NULL || key == NULL || data == NULL)
|
|
||||||
{
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
MacSha1(tmp, key, HMAC_SHA1_96_KEY_SIZE, data, data_size);
|
|
||||||
|
|
||||||
Copy(dst, tmp, HMAC_SHA1_96_HASH_SIZE);
|
|
||||||
}
|
|
||||||
|
|
||||||
// Calculation of HMAC-SHA-1
|
// Calculation of HMAC-SHA-1
|
||||||
void MacSha1(void *dst, void *key, UINT key_size, void *data, UINT data_size)
|
void MacSha1(void *dst, void *key, UINT key_size, void *data, UINT data_size)
|
||||||
{
|
{
|
||||||
@ -4888,31 +4392,6 @@ DH_CTX *DhNewFromBits(UINT bits)
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// Convert the DH parameters to file
|
|
||||||
BUF *DhToBuf(DH_CTX *dh)
|
|
||||||
{
|
|
||||||
BIO *bio;
|
|
||||||
BUF *buf = NULL;
|
|
||||||
int r;
|
|
||||||
// Validate arguments
|
|
||||||
if (dh == NULL)
|
|
||||||
{
|
|
||||||
return NULL;
|
|
||||||
}
|
|
||||||
|
|
||||||
bio = NewBio();
|
|
||||||
|
|
||||||
r = i2d_DHparams_bio(bio, dh->dh);
|
|
||||||
if (r > 1)
|
|
||||||
{
|
|
||||||
buf = BioToBuf(bio);
|
|
||||||
}
|
|
||||||
|
|
||||||
FreeBio(bio);
|
|
||||||
|
|
||||||
return buf;
|
|
||||||
}
|
|
||||||
|
|
||||||
// Creating a new DH
|
// Creating a new DH
|
||||||
DH_CTX *DhNew(char *prime, UINT g)
|
DH_CTX *DhNew(char *prime, UINT g)
|
||||||
{
|
{
|
||||||
|
@ -374,12 +374,10 @@ void FreeCrypt(CRYPT *c);
|
|||||||
void Encrypt(CRYPT *c, void *dst, void *src, UINT size);
|
void Encrypt(CRYPT *c, void *dst, void *src, UINT size);
|
||||||
void Hash(void *dst, void *src, UINT size, bool sha);
|
void Hash(void *dst, void *src, UINT size, bool sha);
|
||||||
void HashSha1(void *dst, void *src, UINT size);
|
void HashSha1(void *dst, void *src, UINT size);
|
||||||
void HashSha256(void *dst, void *src, UINT size);
|
|
||||||
void HashMd4(void *dst, void *src, UINT size);
|
void HashMd4(void *dst, void *src, UINT size);
|
||||||
void HashMd4(void *dst, void *src, UINT size);
|
void HashMd4(void *dst, void *src, UINT size);
|
||||||
void InitCryptLibrary();
|
void InitCryptLibrary();
|
||||||
void Rand(void *buf, UINT size);
|
void Rand(void *buf, UINT size);
|
||||||
void Rand128(void *buf);
|
|
||||||
UINT HashToUINT(void *data, UINT size);
|
UINT HashToUINT(void *data, UINT size);
|
||||||
UINT64 Rand64();
|
UINT64 Rand64();
|
||||||
UINT Rand32();
|
UINT Rand32();
|
||||||
@ -394,7 +392,6 @@ BIO *NewBio();
|
|||||||
void FreeBio(BIO *bio);
|
void FreeBio(BIO *bio);
|
||||||
X *BioToX(BIO *bio, bool text);
|
X *BioToX(BIO *bio, bool text);
|
||||||
X *BufToX(BUF *b, bool text);
|
X *BufToX(BUF *b, bool text);
|
||||||
BUF *SkipBufBeforeString(BUF *b, char *str);
|
|
||||||
void FreeX509(X509 *x509);
|
void FreeX509(X509 *x509);
|
||||||
void FreeX(X *x);
|
void FreeX(X *x);
|
||||||
BIO *XToBio(X *x, bool text);
|
BIO *XToBio(X *x, bool text);
|
||||||
@ -412,9 +409,7 @@ X *FileToX(char *filename);
|
|||||||
X *FileToXW(wchar_t *filename);
|
X *FileToXW(wchar_t *filename);
|
||||||
bool XToFile(X *x, char *filename, bool text);
|
bool XToFile(X *x, char *filename, bool text);
|
||||||
bool XToFileW(X *x, wchar_t *filename, bool text);
|
bool XToFileW(X *x, wchar_t *filename, bool text);
|
||||||
K *FileToK(char *filename, bool private_key, char *password);
|
|
||||||
K *FileToKW(wchar_t *filename, bool private_key, char *password);
|
K *FileToKW(wchar_t *filename, bool private_key, char *password);
|
||||||
bool KToFile(K *k, char *filename, bool text, char *password);
|
|
||||||
bool KToFileW(K *k, wchar_t *filename, bool text, char *password);
|
bool KToFileW(K *k, wchar_t *filename, bool text, char *password);
|
||||||
bool CheckXandK(X *x, K *k);
|
bool CheckXandK(X *x, K *k);
|
||||||
bool CompareX(X *x1, X *x2);
|
bool CompareX(X *x1, X *x2);
|
||||||
@ -427,7 +422,6 @@ bool CompareName(NAME *n1, NAME *n2);
|
|||||||
K *GetKFromX(X *x);
|
K *GetKFromX(X *x);
|
||||||
bool CheckSignature(X *x, K *k);
|
bool CheckSignature(X *x, K *k);
|
||||||
X *X509ToX(X509 *x509);
|
X *X509ToX(X509 *x509);
|
||||||
bool CheckX(X *x, X *x_issuer);
|
|
||||||
bool CheckXEx(X *x, X *x_issuer, bool check_name, bool check_date);
|
bool CheckXEx(X *x, X *x_issuer, bool check_name, bool check_date);
|
||||||
bool Asn1TimeToSystem(SYSTEMTIME *s, void *asn1_time);
|
bool Asn1TimeToSystem(SYSTEMTIME *s, void *asn1_time);
|
||||||
bool StrToSystem(SYSTEMTIME *s, char *str);
|
bool StrToSystem(SYSTEMTIME *s, char *str);
|
||||||
@ -451,7 +445,6 @@ UINT GetDaysUntil2038();
|
|||||||
UINT GetDaysUntil2038Ex();
|
UINT GetDaysUntil2038Ex();
|
||||||
X_SERIAL *NewXSerial(void *data, UINT size);
|
X_SERIAL *NewXSerial(void *data, UINT size);
|
||||||
void FreeXSerial(X_SERIAL *serial);
|
void FreeXSerial(X_SERIAL *serial);
|
||||||
char *ByteToStr(BYTE *src, UINT src_size);
|
|
||||||
P12 *BioToP12(BIO *bio);
|
P12 *BioToP12(BIO *bio);
|
||||||
P12 *PKCS12ToP12(PKCS12 *pkcs12);
|
P12 *PKCS12ToP12(PKCS12 *pkcs12);
|
||||||
P12 *BufToP12(BUF *b);
|
P12 *BufToP12(BUF *b);
|
||||||
@ -459,9 +452,7 @@ BIO *P12ToBio(P12 *p12);
|
|||||||
BUF *P12ToBuf(P12 *p12);
|
BUF *P12ToBuf(P12 *p12);
|
||||||
void FreePKCS12(PKCS12 *pkcs12);
|
void FreePKCS12(PKCS12 *pkcs12);
|
||||||
void FreeP12(P12 *p12);
|
void FreeP12(P12 *p12);
|
||||||
P12 *FileToP12(char *filename);
|
|
||||||
P12 *FileToP12W(wchar_t *filename);
|
P12 *FileToP12W(wchar_t *filename);
|
||||||
bool P12ToFile(P12 *p12, char *filename);
|
|
||||||
bool P12ToFileW(P12 *p12, wchar_t *filename);
|
bool P12ToFileW(P12 *p12, wchar_t *filename);
|
||||||
bool ParseP12(P12 *p12, X **x, K **k, char *password);
|
bool ParseP12(P12 *p12, X **x, K **k, char *password);
|
||||||
bool IsEncryptedP12(P12 *p12);
|
bool IsEncryptedP12(P12 *p12);
|
||||||
@ -473,11 +464,9 @@ void GetPrintNameFromX(wchar_t *str, UINT size, X *x);
|
|||||||
void GetPrintNameFromXA(char *str, UINT size, X *x);
|
void GetPrintNameFromXA(char *str, UINT size, X *x);
|
||||||
void GetPrintNameFromName(wchar_t *str, UINT size, NAME *name);
|
void GetPrintNameFromName(wchar_t *str, UINT size, NAME *name);
|
||||||
void GetAllNameFromX(wchar_t *str, UINT size, X *x);
|
void GetAllNameFromX(wchar_t *str, UINT size, X *x);
|
||||||
void GetAllNameFromA(char *str, UINT size, X *x);
|
|
||||||
void GetAllNameFromName(wchar_t *str, UINT size, NAME *name);
|
void GetAllNameFromName(wchar_t *str, UINT size, NAME *name);
|
||||||
void GetAllNameFromNameEx(wchar_t *str, UINT size, NAME *name);
|
void GetAllNameFromNameEx(wchar_t *str, UINT size, NAME *name);
|
||||||
void GetAllNameFromXEx(wchar_t *str, UINT size, X *x);
|
void GetAllNameFromXEx(wchar_t *str, UINT size, X *x);
|
||||||
void GetAllNameFromXExA(char *str, UINT size, X *x);
|
|
||||||
BUF *BigNumToBuf(const BIGNUM *bn);
|
BUF *BigNumToBuf(const BIGNUM *bn);
|
||||||
BIGNUM *BinToBigNum(void *data, UINT size);
|
BIGNUM *BinToBigNum(void *data, UINT size);
|
||||||
X_SERIAL *CloneXSerial(X_SERIAL *src);
|
X_SERIAL *CloneXSerial(X_SERIAL *src);
|
||||||
@ -489,32 +478,20 @@ NAME *CopyName(NAME *n);
|
|||||||
bool RsaGen(K **priv, K **pub, UINT bit);
|
bool RsaGen(K **priv, K **pub, UINT bit);
|
||||||
bool RsaCheck();
|
bool RsaCheck();
|
||||||
bool RsaCheckEx();
|
bool RsaCheckEx();
|
||||||
bool RsaPublicEncrypt(void *dst, void *src, UINT size, K *k);
|
|
||||||
bool RsaPrivateDecrypt(void *dst, void *src, UINT size, K *k);
|
|
||||||
bool RsaPrivateEncrypt(void *dst, void *src, UINT size, K *k);
|
|
||||||
bool RsaPublicDecrypt(void *dst, void *src, UINT size, K *k);
|
|
||||||
bool RsaSign(void *dst, void *src, UINT size, K *k);
|
bool RsaSign(void *dst, void *src, UINT size, K *k);
|
||||||
bool RsaSignEx(void *dst, void *src, UINT size, K *k, UINT bits);
|
bool RsaSignEx(void *dst, void *src, UINT size, K *k, UINT bits);
|
||||||
bool HashForSign(void *dst, UINT dst_size, void *src, UINT src_size);
|
bool HashForSign(void *dst, UINT dst_size, void *src, UINT src_size);
|
||||||
bool RsaVerify(void *data, UINT data_size, void *sign, K *k);
|
bool RsaVerify(void *data, UINT data_size, void *sign, K *k);
|
||||||
bool RsaVerifyEx(void *data, UINT data_size, void *sign, K *k, UINT bits);
|
bool RsaVerifyEx(void *data, UINT data_size, void *sign, K *k, UINT bits);
|
||||||
UINT RsaPublicSize(K *k);
|
UINT RsaPublicSize(K *k);
|
||||||
void RsaPublicToBin(K *k, void *data);
|
|
||||||
BUF *RsaPublicToBuf(K *k);
|
BUF *RsaPublicToBuf(K *k);
|
||||||
K *RsaBinToPublic(void *data, UINT size);
|
|
||||||
|
|
||||||
DES_KEY_VALUE *DesNewKeyValue(void *value);
|
DES_KEY_VALUE *DesNewKeyValue(void *value);
|
||||||
DES_KEY_VALUE *DesRandKeyValue();
|
DES_KEY_VALUE *DesRandKeyValue();
|
||||||
void DesFreeKeyValue(DES_KEY_VALUE *v);
|
void DesFreeKeyValue(DES_KEY_VALUE *v);
|
||||||
DES_KEY *Des3NewKey(void *k1, void *k2, void *k3);
|
DES_KEY *Des3NewKey(void *k1, void *k2, void *k3);
|
||||||
void Des3FreeKey(DES_KEY *k);
|
void Des3FreeKey(DES_KEY *k);
|
||||||
DES_KEY *DesNewKey(void *k1);
|
|
||||||
void DesFreeKey(DES_KEY *k);
|
|
||||||
DES_KEY *Des3RandKey();
|
|
||||||
DES_KEY *DesRandKey();
|
|
||||||
void Des3Encrypt(void *dest, void *src, UINT size, DES_KEY *key, void *ivec);
|
|
||||||
void Des3Encrypt2(void *dest, void *src, UINT size, DES_KEY_VALUE *k1, DES_KEY_VALUE *k2, DES_KEY_VALUE *k3, void *ivec);
|
void Des3Encrypt2(void *dest, void *src, UINT size, DES_KEY_VALUE *k1, DES_KEY_VALUE *k2, DES_KEY_VALUE *k3, void *ivec);
|
||||||
void Des3Decrypt(void *dest, void *src, UINT size, DES_KEY *key, void *ivec);
|
|
||||||
void Des3Decrypt2(void *dest, void *src, UINT size, DES_KEY_VALUE *k1, DES_KEY_VALUE *k2, DES_KEY_VALUE *k3, void *ivec);
|
void Des3Decrypt2(void *dest, void *src, UINT size, DES_KEY_VALUE *k1, DES_KEY_VALUE *k2, DES_KEY_VALUE *k3, void *ivec);
|
||||||
void Sha(UINT sha_type, void *dst, void *src, UINT size);
|
void Sha(UINT sha_type, void *dst, void *src, UINT size);
|
||||||
void Sha1(void *dst, void *src, UINT size);
|
void Sha1(void *dst, void *src, UINT size);
|
||||||
@ -524,7 +501,6 @@ void Sha2_512(void *dst, void *src, UINT size);
|
|||||||
|
|
||||||
void Md5(void *dst, void *src, UINT size);
|
void Md5(void *dst, void *src, UINT size);
|
||||||
void MacSha1(void *dst, void *key, UINT key_size, void *data, UINT data_size);
|
void MacSha1(void *dst, void *key, UINT key_size, void *data, UINT data_size);
|
||||||
void MacSha196(void *dst, void *key, void *data, UINT data_size);
|
|
||||||
void DesEncrypt(void *dest, void *src, UINT size, DES_KEY_VALUE *k, void *ivec);
|
void DesEncrypt(void *dest, void *src, UINT size, DES_KEY_VALUE *k, void *ivec);
|
||||||
void DesDecrypt(void *dest, void *src, UINT size, DES_KEY_VALUE *k, void *ivec);
|
void DesDecrypt(void *dest, void *src, UINT size, DES_KEY_VALUE *k, void *ivec);
|
||||||
void DesEcbEncrypt(void *dst, void *src, void *key_7bytes);
|
void DesEcbEncrypt(void *dst, void *src, void *key_7bytes);
|
||||||
@ -540,7 +516,6 @@ DH_CTX *DhNew4096();
|
|||||||
DH_CTX *DhNewFromBits(UINT bits);
|
DH_CTX *DhNewFromBits(UINT bits);
|
||||||
DH_CTX *DhNew(char *prime, UINT g);
|
DH_CTX *DhNew(char *prime, UINT g);
|
||||||
void DhFree(DH_CTX *dh);
|
void DhFree(DH_CTX *dh);
|
||||||
BUF *DhToBuf(DH_CTX *dh);
|
|
||||||
|
|
||||||
AES_KEY_VALUE *AesNewKey(void *data, UINT size);
|
AES_KEY_VALUE *AesNewKey(void *data, UINT size);
|
||||||
void AesFreeKey(AES_KEY_VALUE *k);
|
void AesFreeKey(AES_KEY_VALUE *k);
|
||||||
@ -576,9 +551,6 @@ void Enc_tls1_PRF(unsigned char *label, int label_len, const unsigned char *sec,
|
|||||||
void HMacSha1(void *dst, void *key, UINT key_size, void *data, UINT data_size);
|
void HMacSha1(void *dst, void *key, UINT key_size, void *data, UINT data_size);
|
||||||
void HMacMd5(void *dst, void *key, UINT key_size, void *data, UINT data_size);
|
void HMacMd5(void *dst, void *key, UINT key_size, void *data, UINT data_size);
|
||||||
|
|
||||||
BUF *EasyEncrypt(BUF *src_buf);
|
|
||||||
BUF *EasyDecrypt(BUF *src_buf);
|
|
||||||
|
|
||||||
void DisableIntelAesAccel();
|
void DisableIntelAesAccel();
|
||||||
|
|
||||||
int GetSslClientCertIndex();
|
int GetSslClientCertIndex();
|
||||||
|
Loading…
Reference in New Issue
Block a user