Encrypt.h 21 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581
  1. // SoftEther VPN Source Code
  2. // Mayaqua Kernel
  3. //
  4. // SoftEther VPN Server, Client and Bridge are free software under GPLv2.
  5. //
  6. // Copyright (c) 2012-2016 Daiyuu Nobori.
  7. // Copyright (c) 2012-2016 SoftEther VPN Project, University of Tsukuba, Japan.
  8. // Copyright (c) 2012-2016 SoftEther Corporation.
  9. //
  10. // All Rights Reserved.
  11. //
  12. // http://www.softether.org/
  13. //
  14. // Author: Daiyuu Nobori
  15. // Comments: Tetsuo Sugiyama, Ph.D.
  16. //
  17. // This program is free software; you can redistribute it and/or
  18. // modify it under the terms of the GNU General Public License
  19. // version 2 as published by the Free Software Foundation.
  20. //
  21. // This program is distributed in the hope that it will be useful,
  22. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  23. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  24. // GNU General Public License for more details.
  25. //
  26. // You should have received a copy of the GNU General Public License version 2
  27. // along with this program; if not, write to the Free Software
  28. // Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
  29. //
  30. // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
  31. // EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
  32. // MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
  33. // IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
  34. // CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
  35. // TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
  36. // SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
  37. //
  38. // THE LICENSE AGREEMENT IS ATTACHED ON THE SOURCE-CODE PACKAGE
  39. // AS "LICENSE.TXT" FILE. READ THE TEXT FILE IN ADVANCE TO USE THE SOFTWARE.
  40. //
  41. //
  42. // THIS SOFTWARE IS DEVELOPED IN JAPAN, AND DISTRIBUTED FROM JAPAN,
  43. // UNDER JAPANESE LAWS. YOU MUST AGREE IN ADVANCE TO USE, COPY, MODIFY,
  44. // MERGE, PUBLISH, DISTRIBUTE, SUBLICENSE, AND/OR SELL COPIES OF THIS
  45. // SOFTWARE, THAT ANY JURIDICAL DISPUTES WHICH ARE CONCERNED TO THIS
  46. // SOFTWARE OR ITS CONTENTS, AGAINST US (SOFTETHER PROJECT, SOFTETHER
  47. // CORPORATION, DAIYUU NOBORI OR OTHER SUPPLIERS), OR ANY JURIDICAL
  48. // DISPUTES AGAINST US WHICH ARE CAUSED BY ANY KIND OF USING, COPYING,
  49. // MODIFYING, MERGING, PUBLISHING, DISTRIBUTING, SUBLICENSING, AND/OR
  50. // SELLING COPIES OF THIS SOFTWARE SHALL BE REGARDED AS BE CONSTRUED AND
  51. // CONTROLLED BY JAPANESE LAWS, AND YOU MUST FURTHER CONSENT TO
  52. // EXCLUSIVE JURISDICTION AND VENUE IN THE COURTS SITTING IN TOKYO,
  53. // JAPAN. YOU MUST WAIVE ALL DEFENSES OF LACK OF PERSONAL JURISDICTION
  54. // AND FORUM NON CONVENIENS. PROCESS MAY BE SERVED ON EITHER PARTY IN
  55. // THE MANNER AUTHORIZED BY APPLICABLE LAW OR COURT RULE.
  56. //
  57. // USE ONLY IN JAPAN. DO NOT USE THIS SOFTWARE IN ANOTHER COUNTRY UNLESS
  58. // YOU HAVE A CONFIRMATION THAT THIS SOFTWARE DOES NOT VIOLATE ANY
  59. // CRIMINAL LAWS OR CIVIL RIGHTS IN THAT PARTICULAR COUNTRY. USING THIS
  60. // SOFTWARE IN OTHER COUNTRIES IS COMPLETELY AT YOUR OWN RISK. THE
  61. // SOFTETHER VPN PROJECT HAS DEVELOPED AND DISTRIBUTED THIS SOFTWARE TO
  62. // COMPLY ONLY WITH THE JAPANESE LAWS AND EXISTING CIVIL RIGHTS INCLUDING
  63. // PATENTS WHICH ARE SUBJECTS APPLY IN JAPAN. OTHER COUNTRIES' LAWS OR
  64. // CIVIL RIGHTS ARE NONE OF OUR CONCERNS NOR RESPONSIBILITIES. WE HAVE
  65. // NEVER INVESTIGATED ANY CRIMINAL REGULATIONS, CIVIL LAWS OR
  66. // INTELLECTUAL PROPERTY RIGHTS INCLUDING PATENTS IN ANY OF OTHER 200+
  67. // COUNTRIES AND TERRITORIES. BY NATURE, THERE ARE 200+ REGIONS IN THE
  68. // WORLD, WITH DIFFERENT LAWS. IT IS IMPOSSIBLE TO VERIFY EVERY
  69. // COUNTRIES' LAWS, REGULATIONS AND CIVIL RIGHTS TO MAKE THE SOFTWARE
  70. // COMPLY WITH ALL COUNTRIES' LAWS BY THE PROJECT. EVEN IF YOU WILL BE
  71. // SUED BY A PRIVATE ENTITY OR BE DAMAGED BY A PUBLIC SERVANT IN YOUR
  72. // COUNTRY, THE DEVELOPERS OF THIS SOFTWARE WILL NEVER BE LIABLE TO
  73. // RECOVER OR COMPENSATE SUCH DAMAGES, CRIMINAL OR CIVIL
  74. // RESPONSIBILITIES. NOTE THAT THIS LINE IS NOT LICENSE RESTRICTION BUT
  75. // JUST A STATEMENT FOR WARNING AND DISCLAIMER.
  76. //
  77. //
  78. // SOURCE CODE CONTRIBUTION
  79. // ------------------------
  80. //
  81. // Your contribution to SoftEther VPN Project is much appreciated.
  82. // Please send patches to us through GitHub.
  83. // Read the SoftEther VPN Patch Acceptance Policy in advance:
  84. // http://www.softether.org/5-download/src/9.patch
  85. //
  86. //
  87. // DEAR SECURITY EXPERTS
  88. // ---------------------
  89. //
  90. // If you find a bug or a security vulnerability please kindly inform us
  91. // about the problem immediately so that we can fix the security problem
  92. // to protect a lot of users around the world as soon as possible.
  93. //
  94. // Our e-mail address for security reports is:
  95. // softether-vpn-security [at] softether.org
  96. //
  97. // Please note that the above e-mail address is not a technical support
  98. // inquiry address. If you need technical assistance, please visit
  99. // http://www.softether.org/ and ask your question on the users forum.
  100. //
  101. // Thank you for your cooperation.
  102. //
  103. //
  104. // NO MEMORY OR RESOURCE LEAKS
  105. // ---------------------------
  106. //
  107. // The memory-leaks and resource-leaks verification under the stress
  108. // test has been passed before release this source code.
  109. // Encrypt.h
  110. // Header of Encrypt.c
  111. #ifndef ENCRYPT_H
  112. #define ENCRYPT_H
  113. // Function of OpenSSL
  114. void RAND_Init_For_SoftEther();
  115. void RAND_Free_For_SoftEther();
  116. // Constant
  117. #define MIN_SIGN_HASH_SIZE (15 + SHA1_SIZE)
  118. #define SIGN_HASH_SIZE (MIN_SIGN_HASH_SIZE)
  119. #define DES_KEY_SIZE 8 // DES key size
  120. #define DES_IV_SIZE 8 // DES IV size
  121. #define DES_BLOCK_SIZE 8 // DES block size
  122. #define DES3_KEY_SIZE (8 * 3) // 3DES key size
  123. #define RSA_KEY_SIZE 128 // RSA key size
  124. #define DH_KEY_SIZE 128 // DH key size
  125. #define RSA_MIN_SIGN_HASH_SIZE (15 + SHA1_HASH_SIZE) // Minimum RSA hash size
  126. #define RSA_SIGN_HASH_SIZE (RSA_MIN_SIGN_HASH_SIZE) // RSA hash size
  127. #define MD5_HASH_SIZE 16 // MD5 hash size
  128. #define SHA1_HASH_SIZE 20 // SHA-1 hash size
  129. #define SHA1_BLOCK_SIZE 64 // SHA-1 block size
  130. #define HMAC_SHA1_96_KEY_SIZE 20 // HMAC-SHA-1-96 key size
  131. #define HMAC_SHA1_96_HASH_SIZE 12 // HMAC-SHA-1-96 hash size
  132. #define HMAC_SHA1_SIZE (SHA1_HASH_SIZE) // HMAC-SHA-1 hash size
  133. #define AES_IV_SIZE 16 // AES IV size
  134. #define AES_MAX_KEY_SIZE 32 // Maximum AES key size
  135. // HMAC block size
  136. #define HMAC_BLOCK_SIZE 64
  137. #define DH_GROUP1_PRIME_768 \
  138. "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD1" \
  139. "29024E088A67CC74020BBEA63B139B22514A08798E3404DD" \
  140. "EF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245" \
  141. "E485B576625E7EC6F44C42E9A63A3620FFFFFFFFFFFFFFFF"
  142. #define DH_GROUP2_PRIME_1024 \
  143. "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD1" \
  144. "29024E088A67CC74020BBEA63B139B22514A08798E3404DD" \
  145. "EF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245" \
  146. "E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED" \
  147. "EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE65381" \
  148. "FFFFFFFFFFFFFFFF"
  149. #define DH_GROUP5_PRIME_1536 \
  150. "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD1" \
  151. "29024E088A67CC74020BBEA63B139B22514A08798E3404DD" \
  152. "EF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245" \
  153. "E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED" \
  154. "EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3D" \
  155. "C2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F" \
  156. "83655D23DCA3AD961C62F356208552BB9ED529077096966D" \
  157. "670C354E4ABC9804F1746C08CA237327FFFFFFFFFFFFFFFF"
  158. #define DH_SIMPLE_160 "AEE7561459353C95DDA966AE1FD25D95CD46E935"
  159. #define DH_SET_2048 \
  160. "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD1" \
  161. "29024E088A67CC74020BBEA63B139B22514A08798E3404DD" \
  162. "EF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245" \
  163. "E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED" \
  164. "EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3D" \
  165. "C2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F" \
  166. "83655D23DCA3AD961C62F356208552BB9ED529077096966D" \
  167. "670C354E4ABC9804F1746C08CA18217C32905E462E36CE3B" \
  168. "E39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9" \
  169. "DE2BCBF6955817183995497CEA956AE515D2261898FA0510" \
  170. "15728E5A8AACAA68FFFFFFFFFFFFFFFF"
  171. #define DH_SET_3072 \
  172. "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD1"\
  173. "29024E088A67CC74020BBEA63B139B22514A08798E3404DD"\
  174. "EF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245"\
  175. "E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED"\
  176. "EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3D"\
  177. "C2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F"\
  178. "83655D23DCA3AD961C62F356208552BB9ED529077096966D"\
  179. "670C354E4ABC9804F1746C08CA18217C32905E462E36CE3B"\
  180. "E39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9"\
  181. "DE2BCBF6955817183995497CEA956AE515D2261898FA0510"\
  182. "15728E5A8AAAC42DAD33170D04507A33A85521ABDF1CBA64"\
  183. "ECFB850458DBEF0A8AEA71575D060C7DB3970F85A6E1E4C7"\
  184. "ABF5AE8CDB0933D71E8C94E04A25619DCEE3D2261AD2EE6B"\
  185. "F12FFA06D98A0864D87602733EC86A64521F2B18177B200C"\
  186. "BBE117577A615D6C770988C0BAD946E208E24FA074E5AB31"\
  187. "43DB5BFCE0FD108E4B82D120A93AD2CAFFFFFFFFFFFFFFFF"
  188. #define DH_SET_4096 \
  189. "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD1" \
  190. "29024E088A67CC74020BBEA63B139B22514A08798E3404DD" \
  191. "EF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245" \
  192. "E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED" \
  193. "EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3D" \
  194. "C2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F" \
  195. "83655D23DCA3AD961C62F356208552BB9ED529077096966D" \
  196. "670C354E4ABC9804F1746C08CA18217C32905E462E36CE3B" \
  197. "E39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9" \
  198. "DE2BCBF6955817183995497CEA956AE515D2261898FA0510" \
  199. "15728E5A8AAAC42DAD33170D04507A33A85521ABDF1CBA64" \
  200. "ECFB850458DBEF0A8AEA71575D060C7DB3970F85A6E1E4C7" \
  201. "ABF5AE8CDB0933D71E8C94E04A25619DCEE3D2261AD2EE6B" \
  202. "F12FFA06D98A0864D87602733EC86A64521F2B18177B200C" \
  203. "BBE117577A615D6C770988C0BAD946E208E24FA074E5AB31" \
  204. "43DB5BFCE0FD108E4B82D120A92108011A723C12A787E6D7" \
  205. "88719A10BDBA5B2699C327186AF4E23C1A946834B6150BDA" \
  206. "2583E9CA2AD44CE8DBBBC2DB04DE8EF92E8EFC141FBECAA6" \
  207. "287C59474E6BC05D99B2964FA090C3A2233BA186515BE7ED" \
  208. "1F612970CEE2D7AFB81BDD762170481CD0069127D5B05AA9" \
  209. "93B4EA988D8FDDC186FFB7DC90A6C08F4DF435C934063199" \
  210. "FFFFFFFFFFFFFFFF"
  211. // Macro
  212. #define HASHED_DATA(p) (((UCHAR *)p) + 15)
  213. // Crypt context
  214. struct CRYPT
  215. {
  216. struct rc4_key_st *Rc4Key;
  217. };
  218. // Name in the certificate
  219. struct NAME
  220. {
  221. wchar_t *CommonName; // CN
  222. wchar_t *Organization; // O
  223. wchar_t *Unit; // OU
  224. wchar_t *Country; // C
  225. wchar_t *State; // ST
  226. wchar_t *Local; // L
  227. };
  228. // Serial number
  229. struct X_SERIAL
  230. {
  231. UINT size;
  232. UCHAR *data;
  233. };
  234. // Certificate
  235. struct X
  236. {
  237. X509 *x509;
  238. NAME *issuer_name;
  239. NAME *subject_name;
  240. bool root_cert;
  241. UINT64 notBefore;
  242. UINT64 notAfter;
  243. X_SERIAL *serial;
  244. bool do_not_free;
  245. bool is_compatible_bit;
  246. UINT bits;
  247. bool has_basic_constraints;
  248. char issuer_url[256];
  249. };
  250. // Key
  251. struct K
  252. {
  253. EVP_PKEY *pkey;
  254. bool private_key;
  255. };
  256. // PKCS#12
  257. struct P12
  258. {
  259. PKCS12 *pkcs12;
  260. };
  261. // CEL
  262. struct X_CRL
  263. {
  264. X509_CRL *Crl;
  265. };
  266. // Constant
  267. #define MD5_SIZE 16
  268. #define SHA1_SIZE 20
  269. #define SHA256_SIZE 32
  270. // Key element of DES
  271. struct DES_KEY_VALUE
  272. {
  273. struct DES_ks *KeySchedule;
  274. UCHAR KeyValue[DES_KEY_SIZE];
  275. };
  276. // DES key
  277. struct DES_KEY
  278. {
  279. DES_KEY_VALUE *k1, *k2, *k3;
  280. };
  281. // AES key
  282. struct AES_KEY_VALUE
  283. {
  284. struct aes_key_st *EncryptKey;
  285. struct aes_key_st *DecryptKey;
  286. UCHAR KeyValue[AES_MAX_KEY_SIZE];
  287. UINT KeySize;
  288. };
  289. // DH
  290. struct DH_CTX
  291. {
  292. struct dh_st *dh;
  293. BUF *MyPublicKey;
  294. BUF *MyPrivateKey;
  295. UINT Size;
  296. };
  297. // Cipher object
  298. struct CIPHER
  299. {
  300. char Name[MAX_PATH];
  301. bool IsNullCipher;
  302. const struct evp_cipher_st *Cipher;
  303. struct evp_cipher_ctx_st *Ctx;
  304. bool Encrypt;
  305. UINT BlockSize, IvSize, KeySize;
  306. };
  307. // Message digest object
  308. struct MD
  309. {
  310. char Name[MAX_PATH];
  311. const struct env_md_st *Md;
  312. struct hmac_ctx_st *Ctx;
  313. UINT Size;
  314. };
  315. // Lock of the OpenSSL
  316. extern LOCK **ssl_lock_obj;
  317. // Function prototype
  318. CRYPT *NewCrypt(void *key, UINT size);
  319. void FreeCrypt(CRYPT *c);
  320. void Encrypt(CRYPT *c, void *dst, void *src, UINT size);
  321. void Hash(void *dst, void *src, UINT size, bool sha);
  322. void HashSha1(void *dst, void *src, UINT size);
  323. void HashSha256(void *dst, void *src, UINT size);
  324. void HashMd4(void *dst, void *src, UINT size);
  325. void HashMd4(void *dst, void *src, UINT size);
  326. void InitCryptLibrary();
  327. void Rand(void *buf, UINT size);
  328. void Rand128(void *buf);
  329. UINT HashToUINT(void *data, UINT size);
  330. UINT64 Rand64();
  331. UINT Rand32();
  332. USHORT Rand16();
  333. UCHAR Rand8();
  334. bool Rand1();
  335. UINT HashPtrToUINT(void *p);
  336. void CertTest();
  337. BIO *BufToBio(BUF *b);
  338. BUF *BioToBuf(BIO *bio);
  339. BIO *NewBio();
  340. void FreeBio(BIO *bio);
  341. X *BioToX(BIO *bio, bool text);
  342. X *BufToX(BUF *b, bool text);
  343. BUF *SkipBufBeforeString(BUF *b, char *str);
  344. void FreeX509(X509 *x509);
  345. void FreeX(X *x);
  346. BIO *XToBio(X *x, bool text);
  347. BUF *XToBuf(X *x, bool text);
  348. K *BioToK(BIO *bio, bool private_key, bool text, char *password);
  349. int PKeyPasswordCallbackFunction(char *buf, int bufsize, int verify, void *param);
  350. void FreePKey(EVP_PKEY *pkey);
  351. void FreeK(K *k);
  352. K *BufToK(BUF *b, bool private_key, bool text, char *password);
  353. bool IsEncryptedK(BUF *b, bool private_key);
  354. bool IsBase64(BUF *b);
  355. BIO *KToBio(K *k, bool text, char *password);
  356. BUF *KToBuf(K *k, bool text, char *password);
  357. X *FileToX(char *filename);
  358. X *FileToXW(wchar_t *filename);
  359. bool XToFile(X *x, char *filename, bool text);
  360. bool XToFileW(X *x, wchar_t *filename, bool text);
  361. K *FileToK(char *filename, bool private_key, char *password);
  362. K *FileToKW(wchar_t *filename, bool private_key, char *password);
  363. bool KToFile(K *k, char *filename, bool text, char *password);
  364. bool KToFileW(K *k, wchar_t *filename, bool text, char *password);
  365. bool CheckXandK(X *x, K *k);
  366. bool CompareX(X *x1, X *x2);
  367. NAME *X509NameToName(void *xn);
  368. wchar_t *GetUniStrFromX509Name(void *xn, int nid);
  369. void LoadXNames(X *x);
  370. void FreeXNames(X *x);
  371. void FreeName(NAME *n);
  372. bool CompareName(NAME *n1, NAME *n2);
  373. K *GetKFromX(X *x);
  374. bool CheckSignature(X *x, K *k);
  375. X *X509ToX(X509 *x509);
  376. bool CheckX(X *x, X *x_issuer);
  377. bool CheckXEx(X *x, X *x_issuer, bool check_name, bool check_date);
  378. bool Asn1TimeToSystem(SYSTEMTIME *s, void *asn1_time);
  379. bool StrToSystem(SYSTEMTIME *s, char *str);
  380. UINT64 Asn1TimeToUINT64(void *asn1_time);
  381. bool SystemToAsn1Time(void *asn1_time, SYSTEMTIME *s);
  382. bool UINT64ToAsn1Time(void *asn1_time, UINT64 t);
  383. bool SystemToStr(char *str, UINT size, SYSTEMTIME *s);
  384. void LoadXDates(X *x);
  385. bool CheckXDate(X *x, UINT64 current_system_time);
  386. bool CheckXDateNow(X *x);
  387. NAME *NewName(wchar_t *common_name, wchar_t *organization, wchar_t *unit,
  388. wchar_t *country, wchar_t *state, wchar_t *local);
  389. void *NameToX509Name(NAME *nm);
  390. void FreeX509Name(void *xn);
  391. bool AddX509Name(void *xn, int nid, wchar_t *str);
  392. X509 *NewRootX509(K *pub, K *priv, NAME *name, UINT days, X_SERIAL *serial);
  393. X *NewRootX(K *pub, K *priv, NAME *name, UINT days, X_SERIAL *serial);
  394. X509 *NewX509(K *pub, K *priv, X *ca, NAME *name, UINT days, X_SERIAL *serial);
  395. X *NewX(K *pub, K *priv, X *ca, NAME *name, UINT days, X_SERIAL *serial);
  396. UINT GetDaysUntil2038();
  397. UINT GetDaysUntil2038Ex();
  398. X_SERIAL *NewXSerial(void *data, UINT size);
  399. void FreeXSerial(X_SERIAL *serial);
  400. char *ByteToStr(BYTE *src, UINT src_size);
  401. P12 *BioToP12(BIO *bio);
  402. P12 *PKCS12ToP12(PKCS12 *pkcs12);
  403. P12 *BufToP12(BUF *b);
  404. BIO *P12ToBio(P12 *p12);
  405. BUF *P12ToBuf(P12 *p12);
  406. void FreePKCS12(PKCS12 *pkcs12);
  407. void FreeP12(P12 *p12);
  408. P12 *FileToP12(char *filename);
  409. P12 *FileToP12W(wchar_t *filename);
  410. bool P12ToFile(P12 *p12, char *filename);
  411. bool P12ToFileW(P12 *p12, wchar_t *filename);
  412. bool ParseP12(P12 *p12, X **x, K **k, char *password);
  413. bool IsEncryptedP12(P12 *p12);
  414. P12 *NewP12(X *x, K *k, char *password);
  415. X *CloneX(X *x);
  416. K *CloneK(K *k);
  417. void FreeCryptLibrary();
  418. void GetPrintNameFromX(wchar_t *str, UINT size, X *x);
  419. void GetPrintNameFromXA(char *str, UINT size, X *x);
  420. void GetPrintNameFromName(wchar_t *str, UINT size, NAME *name);
  421. void GetAllNameFromX(wchar_t *str, UINT size, X *x);
  422. void GetAllNameFromA(char *str, UINT size, X *x);
  423. void GetAllNameFromName(wchar_t *str, UINT size, NAME *name);
  424. void GetAllNameFromNameEx(wchar_t *str, UINT size, NAME *name);
  425. void GetAllNameFromXEx(wchar_t *str, UINT size, X *x);
  426. void GetAllNameFromXExA(char *str, UINT size, X *x);
  427. BUF *BigNumToBuf(BIGNUM *bn);
  428. BIGNUM *BinToBigNum(void *data, UINT size);
  429. BIGNUM *BufToBigNum(BUF *b);
  430. char *BigNumToStr(BIGNUM *bn);
  431. X_SERIAL *CloneXSerial(X_SERIAL *src);
  432. bool CompareXSerial(X_SERIAL *s1, X_SERIAL *s2);
  433. void GetXDigest(X *x, UCHAR *buf, bool sha1);
  434. NAME *CopyName(NAME *n);
  435. bool RsaGen(K **priv, K **pub, UINT bit);
  436. bool RsaCheck();
  437. bool RsaCheckEx();
  438. bool RsaPublicEncrypt(void *dst, void *src, UINT size, K *k);
  439. bool RsaPrivateDecrypt(void *dst, void *src, UINT size, K *k);
  440. bool RsaPrivateEncrypt(void *dst, void *src, UINT size, K *k);
  441. bool RsaPublicDecrypt(void *dst, void *src, UINT size, K *k);
  442. bool RsaSign(void *dst, void *src, UINT size, K *k);
  443. bool RsaSignEx(void *dst, void *src, UINT size, K *k, UINT bits);
  444. bool HashForSign(void *dst, UINT dst_size, void *src, UINT src_size);
  445. bool RsaVerify(void *data, UINT data_size, void *sign, K *k);
  446. bool RsaVerifyEx(void *data, UINT data_size, void *sign, K *k, UINT bits);
  447. UINT RsaPublicSize(K *k);
  448. void RsaPublicToBin(K *k, void *data);
  449. BUF *RsaPublicToBuf(K *k);
  450. K *RsaBinToPublic(void *data, UINT size);
  451. X_CRL *FileToXCrl(char *filename);
  452. X_CRL *FileToXCrlW(wchar_t *filename);
  453. X_CRL *BufToXCrl(BUF *b);
  454. void FreeXCrl(X_CRL *r);
  455. bool IsXRevokedByXCrl(X *x, X_CRL *r);
  456. bool IsXRevoked(X *x);
  457. DES_KEY_VALUE *DesNewKeyValue(void *value);
  458. DES_KEY_VALUE *DesRandKeyValue();
  459. void DesFreeKeyValue(DES_KEY_VALUE *v);
  460. DES_KEY *Des3NewKey(void *k1, void *k2, void *k3);
  461. void Des3FreeKey(DES_KEY *k);
  462. DES_KEY *DesNewKey(void *k1);
  463. void DesFreeKey(DES_KEY *k);
  464. DES_KEY *Des3RandKey();
  465. DES_KEY *DesRandKey();
  466. void Des3Encrypt(void *dest, void *src, UINT size, DES_KEY *key, void *ivec);
  467. void Des3Encrypt2(void *dest, void *src, UINT size, DES_KEY_VALUE *k1, DES_KEY_VALUE *k2, DES_KEY_VALUE *k3, void *ivec);
  468. void Des3Decrypt(void *dest, void *src, UINT size, DES_KEY *key, void *ivec);
  469. void Des3Decrypt2(void *dest, void *src, UINT size, DES_KEY_VALUE *k1, DES_KEY_VALUE *k2, DES_KEY_VALUE *k3, void *ivec);
  470. void Sha1(void *dst, void *src, UINT size);
  471. void Md5(void *dst, void *src, UINT size);
  472. void MacSha1(void *dst, void *key, UINT key_size, void *data, UINT data_size);
  473. void MacSha196(void *dst, void *key, void *data, UINT data_size);
  474. void DesEncrypt(void *dest, void *src, UINT size, DES_KEY_VALUE *k, void *ivec);
  475. void DesDecrypt(void *dest, void *src, UINT size, DES_KEY_VALUE *k, void *ivec);
  476. void DesEcbEncrypt(void *dst, void *src, void *key_7bytes);
  477. bool DhCompute(DH_CTX *dh, void *dst_priv_key, void *src_pub_key, UINT key_size);
  478. DH_CTX *DhNewGroup1();
  479. DH_CTX *DhNewGroup2();
  480. DH_CTX *DhNewGroup5();
  481. DH_CTX *DhNewSimple160();
  482. DH_CTX *DhNew2048();
  483. DH_CTX *DhNew3072();
  484. DH_CTX *DhNew4096();
  485. DH_CTX *DhNew(char *prime, UINT g);
  486. void DhFree(DH_CTX *dh);
  487. BUF *DhToBuf(DH_CTX *dh);
  488. AES_KEY_VALUE *AesNewKey(void *data, UINT size);
  489. void AesFreeKey(AES_KEY_VALUE *k);
  490. void AesEncrypt(void *dest, void *src, UINT size, AES_KEY_VALUE *k, void *ivec);
  491. void AesDecrypt(void *dest, void *src, UINT size, AES_KEY_VALUE *k, void *ivec);
  492. bool IsIntelAesNiSupported();
  493. void CheckIfIntelAesNiSupportedInit();
  494. #ifdef USE_INTEL_AESNI_LIBRARY
  495. void AesEncryptWithIntel(void *dest, void *src, UINT size, AES_KEY_VALUE *k, void *ivec);
  496. void AesDecryptWithIntel(void *dest, void *src, UINT size, AES_KEY_VALUE *k, void *ivec);
  497. #endif // USE_INTEL_AESNI_LIBRARY
  498. void OpenSSL_InitLock();
  499. void OpenSSL_FreeLock();
  500. void OpenSSL_Lock(int mode, int n, const char *file, int line);
  501. unsigned long OpenSSL_Id(void);
  502. void FreeOpenSSLThreadState();
  503. CIPHER *NewCipher(char *name);
  504. void FreeCipher(CIPHER *c);
  505. void SetCipherKey(CIPHER *c, void *key, bool enc);
  506. UINT CipherProcess(CIPHER *c, void *iv, void *dest, void *src, UINT size);
  507. MD *NewMd(char *name);
  508. void FreeMd(MD *md);
  509. void SetMdKey(MD *md, void *key, UINT key_size);
  510. void MdProcess(MD *md, void *dest, void *src, UINT size);
  511. void Enc_tls1_PRF(unsigned char *label, int label_len, const unsigned char *sec,
  512. int slen, unsigned char *out1, int olen);
  513. void HMacSha1(void *dst, void *key, UINT key_size, void *data, UINT data_size);
  514. void HMacMd5(void *dst, void *key, UINT key_size, void *data, UINT data_size);
  515. BUF *EasyEncrypt(BUF *src_buf);
  516. BUF *EasyDecrypt(BUF *src_buf);
  517. void DisableIntelAesAccel();
  518. #ifdef ENCRYPT_C
  519. // Inner function
  520. #endif // ENCRYPT_C
  521. #endif // ENCRYPT_H
  522. // Developed by SoftEther VPN Project at University of Tsukuba in Japan.
  523. // Department of Computer Science has dozens of overly-enthusiastic geeks.
  524. // Join us: http://www.tsukuba.ac.jp/english/admission/