Daiki Kato / mbed-os-lychee

Dependents:   mbed-os-example-blinky-gr-lychee GR-Boads_Camera_sample GR-Boards_Audio_Recoder GR-Boads_Camera_DisplayApp ... more

Committer:
dkato
Date:
Fri Feb 02 05:42:23 2018 +0000
Revision:
0:f782d9c66c49
mbed-os for GR-LYCHEE

Who changed what in which revision?

UserRevisionLine numberNew contents of line
dkato 0:f782d9c66c49 1 /**
dkato 0:f782d9c66c49 2 * \file pkcs12.h
dkato 0:f782d9c66c49 3 *
dkato 0:f782d9c66c49 4 * \brief PKCS#12 Personal Information Exchange Syntax
dkato 0:f782d9c66c49 5 *
dkato 0:f782d9c66c49 6 * Copyright (C) 2006-2015, ARM Limited, All Rights Reserved
dkato 0:f782d9c66c49 7 * SPDX-License-Identifier: Apache-2.0
dkato 0:f782d9c66c49 8 *
dkato 0:f782d9c66c49 9 * Licensed under the Apache License, Version 2.0 (the "License"); you may
dkato 0:f782d9c66c49 10 * not use this file except in compliance with the License.
dkato 0:f782d9c66c49 11 * You may obtain a copy of the License at
dkato 0:f782d9c66c49 12 *
dkato 0:f782d9c66c49 13 * http://www.apache.org/licenses/LICENSE-2.0
dkato 0:f782d9c66c49 14 *
dkato 0:f782d9c66c49 15 * Unless required by applicable law or agreed to in writing, software
dkato 0:f782d9c66c49 16 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
dkato 0:f782d9c66c49 17 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
dkato 0:f782d9c66c49 18 * See the License for the specific language governing permissions and
dkato 0:f782d9c66c49 19 * limitations under the License.
dkato 0:f782d9c66c49 20 *
dkato 0:f782d9c66c49 21 * This file is part of mbed TLS (https://tls.mbed.org)
dkato 0:f782d9c66c49 22 */
dkato 0:f782d9c66c49 23 #ifndef MBEDTLS_PKCS12_H
dkato 0:f782d9c66c49 24 #define MBEDTLS_PKCS12_H
dkato 0:f782d9c66c49 25
dkato 0:f782d9c66c49 26 #include "md.h"
dkato 0:f782d9c66c49 27 #include "cipher.h"
dkato 0:f782d9c66c49 28 #include "asn1.h"
dkato 0:f782d9c66c49 29
dkato 0:f782d9c66c49 30 #include <stddef.h>
dkato 0:f782d9c66c49 31
dkato 0:f782d9c66c49 32 #define MBEDTLS_ERR_PKCS12_BAD_INPUT_DATA -0x1F80 /**< Bad input parameters to function. */
dkato 0:f782d9c66c49 33 #define MBEDTLS_ERR_PKCS12_FEATURE_UNAVAILABLE -0x1F00 /**< Feature not available, e.g. unsupported encryption scheme. */
dkato 0:f782d9c66c49 34 #define MBEDTLS_ERR_PKCS12_PBE_INVALID_FORMAT -0x1E80 /**< PBE ASN.1 data not as expected. */
dkato 0:f782d9c66c49 35 #define MBEDTLS_ERR_PKCS12_PASSWORD_MISMATCH -0x1E00 /**< Given private key password does not allow for correct decryption. */
dkato 0:f782d9c66c49 36
dkato 0:f782d9c66c49 37 #define MBEDTLS_PKCS12_DERIVE_KEY 1 /**< encryption/decryption key */
dkato 0:f782d9c66c49 38 #define MBEDTLS_PKCS12_DERIVE_IV 2 /**< initialization vector */
dkato 0:f782d9c66c49 39 #define MBEDTLS_PKCS12_DERIVE_MAC_KEY 3 /**< integrity / MAC key */
dkato 0:f782d9c66c49 40
dkato 0:f782d9c66c49 41 #define MBEDTLS_PKCS12_PBE_DECRYPT 0
dkato 0:f782d9c66c49 42 #define MBEDTLS_PKCS12_PBE_ENCRYPT 1
dkato 0:f782d9c66c49 43
dkato 0:f782d9c66c49 44 #ifdef __cplusplus
dkato 0:f782d9c66c49 45 extern "C" {
dkato 0:f782d9c66c49 46 #endif
dkato 0:f782d9c66c49 47
dkato 0:f782d9c66c49 48 /**
dkato 0:f782d9c66c49 49 * \brief PKCS12 Password Based function (encryption / decryption)
dkato 0:f782d9c66c49 50 * for pbeWithSHAAnd128BitRC4
dkato 0:f782d9c66c49 51 *
dkato 0:f782d9c66c49 52 * \param pbe_params an ASN1 buffer containing the pkcs-12PbeParams structure
dkato 0:f782d9c66c49 53 * \param mode either MBEDTLS_PKCS12_PBE_ENCRYPT or MBEDTLS_PKCS12_PBE_DECRYPT
dkato 0:f782d9c66c49 54 * \param pwd the password used (may be NULL if no password is used)
dkato 0:f782d9c66c49 55 * \param pwdlen length of the password (may be 0)
dkato 0:f782d9c66c49 56 * \param input the input data
dkato 0:f782d9c66c49 57 * \param len data length
dkato 0:f782d9c66c49 58 * \param output the output buffer
dkato 0:f782d9c66c49 59 *
dkato 0:f782d9c66c49 60 * \return 0 if successful, or a MBEDTLS_ERR_XXX code
dkato 0:f782d9c66c49 61 */
dkato 0:f782d9c66c49 62 int mbedtls_pkcs12_pbe_sha1_rc4_128( mbedtls_asn1_buf *pbe_params, int mode,
dkato 0:f782d9c66c49 63 const unsigned char *pwd, size_t pwdlen,
dkato 0:f782d9c66c49 64 const unsigned char *input, size_t len,
dkato 0:f782d9c66c49 65 unsigned char *output );
dkato 0:f782d9c66c49 66
dkato 0:f782d9c66c49 67 /**
dkato 0:f782d9c66c49 68 * \brief PKCS12 Password Based function (encryption / decryption)
dkato 0:f782d9c66c49 69 * for cipher-based and mbedtls_md-based PBE's
dkato 0:f782d9c66c49 70 *
dkato 0:f782d9c66c49 71 * \param pbe_params an ASN1 buffer containing the pkcs-12PbeParams structure
dkato 0:f782d9c66c49 72 * \param mode either MBEDTLS_PKCS12_PBE_ENCRYPT or MBEDTLS_PKCS12_PBE_DECRYPT
dkato 0:f782d9c66c49 73 * \param cipher_type the cipher used
dkato 0:f782d9c66c49 74 * \param md_type the mbedtls_md used
dkato 0:f782d9c66c49 75 * \param pwd the password used (may be NULL if no password is used)
dkato 0:f782d9c66c49 76 * \param pwdlen length of the password (may be 0)
dkato 0:f782d9c66c49 77 * \param input the input data
dkato 0:f782d9c66c49 78 * \param len data length
dkato 0:f782d9c66c49 79 * \param output the output buffer
dkato 0:f782d9c66c49 80 *
dkato 0:f782d9c66c49 81 * \return 0 if successful, or a MBEDTLS_ERR_XXX code
dkato 0:f782d9c66c49 82 */
dkato 0:f782d9c66c49 83 int mbedtls_pkcs12_pbe( mbedtls_asn1_buf *pbe_params, int mode,
dkato 0:f782d9c66c49 84 mbedtls_cipher_type_t cipher_type, mbedtls_md_type_t md_type,
dkato 0:f782d9c66c49 85 const unsigned char *pwd, size_t pwdlen,
dkato 0:f782d9c66c49 86 const unsigned char *input, size_t len,
dkato 0:f782d9c66c49 87 unsigned char *output );
dkato 0:f782d9c66c49 88
dkato 0:f782d9c66c49 89 /**
dkato 0:f782d9c66c49 90 * \brief The PKCS#12 derivation function uses a password and a salt
dkato 0:f782d9c66c49 91 * to produce pseudo-random bits for a particular "purpose".
dkato 0:f782d9c66c49 92 *
dkato 0:f782d9c66c49 93 * Depending on the given id, this function can produce an
dkato 0:f782d9c66c49 94 * encryption/decryption key, an nitialization vector or an
dkato 0:f782d9c66c49 95 * integrity key.
dkato 0:f782d9c66c49 96 *
dkato 0:f782d9c66c49 97 * \param data buffer to store the derived data in
dkato 0:f782d9c66c49 98 * \param datalen length to fill
dkato 0:f782d9c66c49 99 * \param pwd password to use (may be NULL if no password is used)
dkato 0:f782d9c66c49 100 * \param pwdlen length of the password (may be 0)
dkato 0:f782d9c66c49 101 * \param salt salt buffer to use
dkato 0:f782d9c66c49 102 * \param saltlen length of the salt
dkato 0:f782d9c66c49 103 * \param mbedtls_md mbedtls_md type to use during the derivation
dkato 0:f782d9c66c49 104 * \param id id that describes the purpose (can be MBEDTLS_PKCS12_DERIVE_KEY,
dkato 0:f782d9c66c49 105 * MBEDTLS_PKCS12_DERIVE_IV or MBEDTLS_PKCS12_DERIVE_MAC_KEY)
dkato 0:f782d9c66c49 106 * \param iterations number of iterations
dkato 0:f782d9c66c49 107 *
dkato 0:f782d9c66c49 108 * \return 0 if successful, or a MD, BIGNUM type error.
dkato 0:f782d9c66c49 109 */
dkato 0:f782d9c66c49 110 int mbedtls_pkcs12_derivation( unsigned char *data, size_t datalen,
dkato 0:f782d9c66c49 111 const unsigned char *pwd, size_t pwdlen,
dkato 0:f782d9c66c49 112 const unsigned char *salt, size_t saltlen,
dkato 0:f782d9c66c49 113 mbedtls_md_type_t mbedtls_md, int id, int iterations );
dkato 0:f782d9c66c49 114
dkato 0:f782d9c66c49 115 #ifdef __cplusplus
dkato 0:f782d9c66c49 116 }
dkato 0:f782d9c66c49 117 #endif
dkato 0:f782d9c66c49 118
dkato 0:f782d9c66c49 119 #endif /* pkcs12.h */