📄 context.h
字号:
const KEYFORMAT_TYPE formatType );
CHECK_RETVAL STDC_NONNULL_ARG( ( 1, 2, 4 ) ) \
int ( *writePublicKeyFunction )( INOUT STREAM *stream,
const struct CI *contextInfoPtr,
IN_ENUM( KEYFORMAT ) \
const KEYFORMAT_TYPE formatType,
IN_BUFFER( accessKeyLen ) \
const char *accessKey,
IN_LENGTH_SHORT_MIN( 4 ) \
const int accessKeyLen );
CHECK_RETVAL STDC_NONNULL_ARG( ( 1, 2, 4 ) ) \
int ( *writePrivateKeyFunction )( INOUT STREAM *stream,
const struct CI *contextInfoPtr,
IN_ENUM( KEYFORMAT ) \
const KEYFORMAT_TYPE formatType,
IN_BUFFER( accessKeyLen ) \
const char *accessKey,
IN_LENGTH_SHORT_MIN( 4 ) \
const int accessKeyLen );
CHECK_RETVAL STDC_NONNULL_ARG( ( 1, 3, 4, 5 ) ) \
int ( *encodeDLValuesFunction )( OUT_BUFFER( bufMaxSize, \
*bufSize ) BYTE *buffer,
IN_LENGTH_SHORT_MIN( 20 + 20 ) \
const int bufMaxSize,
OUT_LENGTH_SHORT_Z int *bufSize,
const BIGNUM *value1,
const BIGNUM *value2,
IN_ENUM( CRYPT_FORMAT ) \
const CRYPT_FORMAT_TYPE formatType );
CHECK_RETVAL STDC_NONNULL_ARG( ( 1, 3, 4, 5 ) ) \
int ( *decodeDLValuesFunction )( IN_BUFFER( bufSize ) const BYTE *buffer,
IN_LENGTH_SHORT_MIN( 32 ) const int bufSize,
OUT BIGNUM *value1,
OUT BIGNUM *value2,
const BIGNUM *maxRange,
IN_ENUM( CRYPT_FORMAT_TYPE ) \
const CRYPT_FORMAT_TYPE formatType );
/* State information needed to allow background key generation */
#ifdef USE_THREADS
THREAD_STATE threadState;
#endif /* OS's with threads */
} PKC_INFO;
#endif /* PKC_CONTEXT */
typedef struct {
/* The current state of the hashing and the result from the last
completed hash operation */
void *hashInfo; /* Current hash state */
BUFFER_FIXED( CRYPT_MAX_HASHSIZE ) \
BYTE hash[ CRYPT_MAX_HASHSIZE + 8 ];/* Last hash result */
} HASH_INFO;
typedef struct {
/* User keying information. The user key is the unprocessed key as
entered by the user rather than the key in the form used by the
algorithm. We keep a copy of the unprocessed key because we usually
need to wrap it up in a KEK at some point after it's loaded */
BUFFER( CRYPT_MAX_KEYSIZE, userKeyLength ) \
BYTE userKey[ CRYPT_MAX_KEYSIZE + 8 ]; /* User MAC key */
int userKeyLength;
/* The current state of the MAC'ing and the result from the last
completed MAC operation */
void *macInfo; /* Current MAC state */
BUFFER_FIXED( CRYPT_MAX_HASHSIZE ) \
BYTE mac[ CRYPT_MAX_HASHSIZE + 8 ]; /* Last MAC result */
/* Information required when a key suitable for use by this algorithm
is derived from a longer user key */
BUFFER( CRYPT_MAX_HASHSIZE, saltLength ) \
BYTE salt[ CRYPT_MAX_HASHSIZE + 8 ];/* Salt */
int saltLength;
int keySetupIterations; /* Number of times setup was iterated */
CRYPT_ALGO_TYPE keySetupAlgorithm; /* Algorithm used for key setup */
} MAC_INFO;
/* Defines to make access to the union fields less messy */
#define ctxConv keyingInfo.convInfo
#define ctxPKC keyingInfo.pkcInfo
#define ctxHash keyingInfo.hashInfo
#define ctxMAC keyingInfo.macInfo
/* An encryption context */
typedef struct CI {
/* Control and status information */
CONTEXT_TYPE type; /* The context type */
const CAPABILITY_INFO *capabilityInfo; /* Encryption capability info */
int flags; /* Context information flags */
/* Context type-specific information */
union {
CONV_INFO *convInfo;
#ifdef PKC_CONTEXT
PKC_INFO *pkcInfo;
#endif /* PKC_CONTEXT */
HASH_INFO *hashInfo;
MAC_INFO *macInfo;
} keyingInfo;
#ifdef USE_DEVICES
/* If implemented using a crypto device, the object information is
usually stored inside the device. The following value contains the
reference to the crypto object inside the device. In addition some
objects (specifically, DH) that aren't really public- or private-key
objects but a mixture of both require a second handle to the other
part of the object in the device */
long deviceObject, altDeviceObject;
#endif /* USE_DEVICES */
/* The label for this object, typically used to identify stored keys */
BUFFER( CRYPT_MAX_TEXTSIZE, labelSize ) \
char label[ CRYPT_MAX_TEXTSIZE + 8 ];/* Text string identifying key */
int labelSize;
/* Pointers to context access methods. These are somewhat higher-level
than the capability info methods and apply to entire classes of
context rather than at a per-algorithm level */
CHECK_RETVAL STDC_NONNULL_ARG( ( 1 ) ) \
int ( *loadKeyFunction )( INOUT struct CI *contextInfoPtr,
IN_BUFFER_OPT( keyLength ) const void *key,
IN_LENGTH_SHORT_MIN( MIN_KEYSIZE ) \
const int keyLength );
CHECK_RETVAL STDC_NONNULL_ARG( ( 1 ) ) \
int ( *generateKeyFunction )( INOUT struct CI *contextInfoPtr );
CHECK_RETVAL STDC_NONNULL_ARG( ( 1, 2 ) ) \
int ( *encryptFunction )( INOUT struct CI *contextInfoPtr,
INOUT_BUFFER_FIXED( length ) BYTE *buffer,
IN_LENGTH_Z int length );
CHECK_RETVAL STDC_NONNULL_ARG( ( 1, 2 ) ) \
int ( *decryptFunction )( INOUT struct CI *contextInfoPtr,
INOUT_BUFFER_FIXED( length ) BYTE *buffer,
IN_LENGTH_Z int length );
/* Error information */
CRYPT_ATTRIBUTE_TYPE errorLocus;/* Error locus */
CRYPT_ERRTYPE_TYPE errorType; /* Error type */
/* The object's handle and the handle of the user who owns this object.
The former is used when sending messages to the object when only the
xxx_INFO is available, the latter is used to avoid having to fetch the
same information from the system object table */
CRYPT_HANDLE objectHandle;
CRYPT_USER ownerHandle;
/* Variable-length storage for the type-specific data */
DECLARE_VARSTRUCT_VARS;
} CONTEXT_INFO;
/* Symbolic defines for the various PKC components for different PKC
algorithms. All of the DLP algorithms actually use the same parameters,
so we define generic DLP names for them */
#define dlpParam_p param1
#define dlpParam_g param2
#define dlpParam_q param3
#define dlpParam_y param4
#define dlpParam_x param5
#define dlpTmp1 param6
#define dlpTmp2 param7
#define dlpTmp3 param8 /* More temp.values for DLP PKCs */
#define dhParam_yPrime param8 /* Special value for DH */
#define dlpParam_mont_p montCTX1
#define rsaParam_n param1
#define rsaParam_e param2
#define rsaParam_d param3
#define rsaParam_p param4
#define rsaParam_q param5
#define rsaParam_u param6
#define rsaParam_exponent1 param7
#define rsaParam_exponent2 param8
#define rsaParam_blind_k blind1
#define rsaParam_blind_kInv blind2
#define rsaParam_mont_n montCTX1
#define rsaParam_mont_p montCTX2
#define rsaParam_mont_q montCTX3
#define eccParam_p param1
#define eccParam_a param2
#define eccParam_b param3
#define eccParam_gx param4
#define eccParam_gy param5
#define eccParam_r param6
#define eccParam_h param7
#define eccParam_qx param8
#define eccParam_qy param9
#define eccParam_d param10
#define eccParam_mont_p montCTX1
#define eccParam_mont_r montCTX2
/* Minimum and maximum permitted lengths for various PKC components. These
can be loaded in various ways (read from ASN.1 data, read from
PGP/SSH/SSL data, loaded by the user, and so on) so we define permitted
length values in a central location for use in the different read
routines */
#define RSAPARAM_MIN_N MIN_PKCSIZE
#define RSAPARAM_MAX_N CRYPT_MAX_PKCSIZE
#define RSAPARAM_MIN_E 1
#define RSAPARAM_MAX_E 4
#define RSAPARAM_MIN_D MIN_PKCSIZE
#define RSAPARAM_MAX_D CRYPT_MAX_PKCSIZE
#define RSAPARAM_MIN_P MIN_PKCSIZE / 2
#define RSAPARAM_MAX_P CRYPT_MAX_PKCSIZE
#define RSAPARAM_MIN_Q MIN_PKCSIZE / 2
#define RSAPARAM_MAX_Q CRYPT_MAX_PKCSIZE
#define RSAPARAM_MIN_U MIN_PKCSIZE / 2
#define RSAPARAM_MAX_U CRYPT_MAX_PKCSIZE
#define RSAPARAM_MIN_EXP1 MIN_PKCSIZE / 2
#define RSAPARAM_MAX_EXP1 CRYPT_MAX_PKCSIZE
#define RSAPARAM_MIN_EXP2 MIN_PKCSIZE / 2
#define RSAPARAM_MAX_EXP2 CRYPT_MAX_PKCSIZE
#define DLPPARAM_MIN_P MIN_PKCSIZE
#define DLPPARAM_MAX_P CRYPT_MAX_PKCSIZE
#define DLPPARAM_MIN_G 1
#define DLPPARAM_MAX_G CRYPT_MAX_PKCSIZE
#define DLPPARAM_MIN_Q bitsToBytes( 128 )
#define DLPPARAM_MAX_Q CRYPT_MAX_PKCSIZE
#define DLPPARAM_MIN_Y MIN_PKCSIZE
#define DLPPARAM_MAX_Y CRYPT_MAX_PKCSIZE
#define DLPPARAM_MIN_X bitsToBytes( 128 )
#define DLPPARAM_MAX_X CRYPT_MAX_PKCSIZE
#define DLPPARAM_MIN_R DLPPARAM_MIN_Q /* For DSA sigs */
#define DLPPARAM_MIN_S DLPPARAM_MIN_Q /* For DSA sigs */
#define ECCPARAM_MIN_P MIN_PKCSIZE_ECC
#define ECCPARAM_MAX_P CRYPT_MAX_PKCSIZE_ECC
#define ECCPARAM_MIN_A 1 /* Need to set to actual values */
#define ECCPARAM_MAX_A 4 /* when implemented */
#define ECCPARAM_MIN_B 1
#define ECCPARAM_MAX_B 4
#define ECCPARAM_MIN_GX 1
#define ECCPARAM_MAX_GX 4
#define ECCPARAM_MIN_GY 1
#define ECCPARAM_MAX_GY 4
#define ECCPARAM_MIN_R 1
#define ECCPARAM_MAX_R 4
#define ECCPARAM_MIN_H 1
#define ECCPARAM_MAX_H 4
#define ECCPARAM_MIN_QX 1
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -