I forgot to include the aep and sureware vendor header files.
authorRichard Levitte <levitte@openssl.org>
Thu, 7 Feb 2002 21:43:05 +0000 (21:43 +0000)
committerRichard Levitte <levitte@openssl.org>
Thu, 7 Feb 2002 21:43:05 +0000 (21:43 +0000)
crypto/engine/vendor_defns/aep.h [new file with mode: 0644]
crypto/engine/vendor_defns/sureware.h [new file with mode: 0644]

diff --git a/crypto/engine/vendor_defns/aep.h b/crypto/engine/vendor_defns/aep.h
new file mode 100644 (file)
index 0000000..2b2792d
--- /dev/null
@@ -0,0 +1,178 @@
+/* This header declares the necessary definitions for using the exponentiation
+ * acceleration capabilities, and rnd number generation of the AEP card. 
+ *
+ */
+
+/*
+ *
+ * Some AEP defines
+ *
+ */
+
+/*Successful return value*/
+#define AEP_R_OK                                0x00000000
+
+/*Miscelleanous unsuccessful return value*/
+#define AEP_R_GENERAL_ERROR                     0x10000001
+
+/*Insufficient host memory*/
+#define AEP_R_HOST_MEMORY                       0x10000002
+
+#define AEP_R_FUNCTION_FAILED                   0x10000006
+
+/*Invalid arguments in function call*/
+#define AEP_R_ARGUMENTS_BAD                     0x10020000
+
+#define AEP_R_NO_TARGET_RESOURCES                              0x10030000
+
+/*Error occuring on socket operation*/
+#define AEP_R_SOCKERROR                                                        0x10000010
+
+/*Socket has been closed from the other end*/
+#define AEP_R_SOCKEOF                                                  0x10000011
+
+/*Invalid handles*/
+#define AEP_R_CONNECTION_HANDLE_INVALID         0x100000B3
+
+#define AEP_R_TRANSACTION_HANDLE_INVALID               0x10040000
+
+/*Transaction has not yet returned from accelerator*/
+#define AEP_R_TRANSACTION_NOT_READY                            0x00010000
+
+/*There is already a thread waiting on this transaction*/
+#define AEP_R_TRANSACTION_CLAIMED                              0x10050000
+
+/*The transaction timed out*/
+#define AEP_R_TIMED_OUT                                                        0x10060000
+
+#define AEP_R_FXN_NOT_IMPLEMENTED                              0x10070000
+
+#define AEP_R_TARGET_ERROR                                             0x10080000
+
+/*Error in the AEP daemon process*/
+#define AEP_R_DAEMON_ERROR                                             0x10090000
+
+/*Invalid ctx id*/
+#define AEP_R_INVALID_CTX_ID                                   0x10009000
+
+#define AEP_R_NO_KEY_MANAGER                                   0x1000a000
+
+/*Error obtaining a mutex*/
+#define AEP_R_MUTEX_BAD                         0x000001A0
+
+/*Fxn call before AEP_Initialise ot after AEP_Finialise*/
+#define AEP_R_AEPAPI_NOT_INITIALIZED                   0x10000190
+
+/*AEP_Initialise has already been called*/
+#define AEP_R_AEPAPI_ALREADY_INITIALIZED               0x10000191
+
+/*Maximum number of connections to daemon reached*/
+#define AEP_R_NO_MORE_CONNECTION_HNDLS                 0x10000200
+
+/*
+ *
+ * Some AEP Type definitions
+ *
+ */
+
+/* an unsigned 8-bit value */
+typedef unsigned char                          AEP_U8;
+
+/* an unsigned 8-bit character */
+typedef char                                   AEP_CHAR;
+
+/* a BYTE-sized Boolean flag */
+typedef AEP_U8                                 AEP_BBOOL;
+
+/*Unsigned value, at least 16 bits long*/
+typedef unsigned short                         AEP_U16;
+
+/* an unsigned value, at least 32 bits long */
+#ifdef SIXTY_FOUR_BIT_LONG
+typedef unsigned int                           AEP_U32;
+#else
+typedef unsigned long                          AEP_U32;
+#endif
+
+#ifdef SIXTY_FOUR_BIT_LONG
+typedef unsigned long                          AEP_U64;
+#else
+typedef struct { unsigned long l1, l2; }       AEP_U64;
+#endif
+
+/* at least 32 bits; each bit is a Boolean flag */
+typedef AEP_U32                        AEP_FLAGS;
+
+typedef AEP_U8         *AEP_U8_PTR;
+typedef AEP_CHAR       *AEP_CHAR_PTR;
+typedef AEP_U32                        *AEP_U32_PTR;
+typedef AEP_U64                        *AEP_U64_PTR;
+typedef void           *AEP_VOID_PTR;
+
+/* Pointer to a AEP_VOID_PTR-- i.e., pointer to pointer to void */
+typedef AEP_VOID_PTR   *AEP_VOID_PTR_PTR;
+
+/*Used to identify an AEP connection handle*/
+typedef AEP_U32                                        AEP_CONNECTION_HNDL;
+
+/*Pointer to an AEP connection handle*/
+typedef AEP_CONNECTION_HNDL    *AEP_CONNECTION_HNDL_PTR;
+
+/*Used by an application (in conjunction with the apps process id) to 
+identify an individual transaction*/
+typedef AEP_U32                                        AEP_TRANSACTION_ID;
+
+/*Pointer to an applications transaction identifier*/
+typedef AEP_TRANSACTION_ID             *AEP_TRANSACTION_ID_PTR;
+
+/*Return value type*/
+typedef AEP_U32                                        AEP_RV;
+
+#define MAX_PROCESS_CONNECTIONS 256
+
+#define RAND_BLK_SIZE 1024
+
+typedef enum{
+        NotConnected=   0,
+        Connected=              1,
+        InUse=                  2
+} AEP_CONNECTION_STATE;
+
+
+typedef struct AEP_CONNECTION_ENTRY{
+        AEP_CONNECTION_STATE    conn_state;
+        AEP_CONNECTION_HNDL     conn_hndl;
+} AEP_CONNECTION_ENTRY;
+
+
+typedef AEP_RV t_AEP_OpenConnection(AEP_CONNECTION_HNDL_PTR phConnection);
+typedef AEP_RV t_AEP_CloseConnection(AEP_CONNECTION_HNDL hConnection);
+
+typedef AEP_RV t_AEP_ModExp(AEP_CONNECTION_HNDL hConnection,
+                           AEP_VOID_PTR pA, AEP_VOID_PTR pP,
+                           AEP_VOID_PTR pN,
+                           AEP_VOID_PTR pResult,
+                           AEP_TRANSACTION_ID* pidTransID);
+
+typedef AEP_RV t_AEP_ModExpCrt(AEP_CONNECTION_HNDL hConnection,
+                              AEP_VOID_PTR pA, AEP_VOID_PTR pP,
+                              AEP_VOID_PTR pQ,
+                              AEP_VOID_PTR pDmp1, AEP_VOID_PTR pDmq1,
+                              AEP_VOID_PTR pIqmp,
+                              AEP_VOID_PTR pResult,
+                              AEP_TRANSACTION_ID* pidTransID);
+
+#ifdef AEPRAND
+typedef AEP_RV t_AEP_GenRandom(AEP_CONNECTION_HNDL hConnection,
+                              AEP_U32 Len,
+                              AEP_U32 Type,
+                              AEP_VOID_PTR pResult,
+                              AEP_TRANSACTION_ID* pidTransID);
+#endif
+
+typedef AEP_RV t_AEP_Initialize(AEP_VOID_PTR pInitArgs);
+typedef AEP_RV t_AEP_Finalize();
+typedef AEP_RV t_AEP_SetBNCallBacks(AEP_RV (*GetBigNumSizeFunc)(),
+                                   AEP_RV (*MakeAEPBigNumFunc)(),
+                                   AEP_RV (*ConverAEPBigNumFunc)());
+
diff --git a/crypto/engine/vendor_defns/sureware.h b/crypto/engine/vendor_defns/sureware.h
new file mode 100644 (file)
index 0000000..1d37892
--- /dev/null
@@ -0,0 +1,239 @@
+/*
+* Written by Corinne Dive-Reclus(cdive@baltimore.com)
+*
+* Copyright@2001 Baltimore Technologies Ltd.
+*                                                                                                                                                                                              *       
+*              THIS FILE IS PROVIDED BY BALTIMORE TECHNOLOGIES ``AS IS'' AND                                                                                                                                                   *
+*              ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE                                   * 
+*              IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE                              *
+*              ARE DISCLAIMED.  IN NO EVENT SHALL BALTIMORE TECHNOLOGIES BE LIABLE                                             *
+*              FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL                              *
+*              DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS                                 *
+*              OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)                                   *
+*              HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT                              *
+*              LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY                               *
+*              OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF                                  *
+*              SUCH DAMAGE.                                                                                                                                                    *
+*
+* 
+*/
+#ifdef WIN32
+#define SW_EXPORT      __declspec ( dllexport )
+#else
+#define SW_EXPORT
+#endif
+
+/*
+*      List of exposed SureWare errors
+*/
+#define SUREWAREHOOK_ERROR_FAILED              -1
+#define SUREWAREHOOK_ERROR_FALLBACK            -2
+#define SUREWAREHOOK_ERROR_UNIT_FAILURE -3
+#define SUREWAREHOOK_ERROR_DATA_SIZE -4
+#define SUREWAREHOOK_ERROR_INVALID_PAD -5
+/*
+* -----------------WARNING-----------------------------------
+* In all the following functions:
+* msg is a string with at least 24 bytes free.
+* A 24 bytes string will be concatenated to the existing content of msg. 
+*/
+/*
+*      SureWare Initialisation function
+*      in param threadsafe, if !=0, thread safe enabled
+*      return SureWareHOOK_ERROR_UNIT_FAILURE if failure, 1 if success
+*/
+typedef int SureWareHook_Init_t(char*const msg,int threadsafe);
+extern SW_EXPORT SureWareHook_Init_t SureWareHook_Init;
+/*
+*      SureWare Finish function
+*/
+typedef void SureWareHook_Finish_t();
+extern SW_EXPORT SureWareHook_Finish_t SureWareHook_Finish;
+/*
+*       PRE_CONDITION:
+*              DO NOT CALL ANY OF THE FOLLOWING FUNCTIONS IN CASE OF INIT FAILURE
+*/
+/*
+*      SureWare RAND Bytes function
+*      In case of failure, the content of buf is unpredictable.
+*      return 1 if success
+*                      SureWareHOOK_ERROR_FALLBACK if function not available in hardware
+*                      SureWareHOOK_ERROR_FAILED if error while processing
+*                      SureWareHOOK_ERROR_UNIT_FAILURE if hardware failure
+*                      SUREWAREHOOK_ERROR_DATA_SIZE wrong size for buf
+*
+*      in/out param buf : a num bytes long buffer where random bytes will be put
+*      in param num : the number of bytes into buf
+*/
+typedef int SureWareHook_Rand_Bytes_t(char*const msg,unsigned char *buf, int num);
+extern SW_EXPORT SureWareHook_Rand_Bytes_t SureWareHook_Rand_Bytes;
+
+/*
+*      SureWare RAND Seed function
+*      Adds some seed to the Hardware Random Number Generator
+*      return 1 if success
+*                      SureWareHOOK_ERROR_FALLBACK if function not available in hardware
+*                      SureWareHOOK_ERROR_FAILED if error while processing
+*                      SureWareHOOK_ERROR_UNIT_FAILURE if hardware failure
+*                      SUREWAREHOOK_ERROR_DATA_SIZE wrong size for buf
+*
+*      in param buf : the seed to add into the HRNG
+*      in param num : the number of bytes into buf
+*/
+typedef int SureWareHook_Rand_Seed_t(char*const msg,const void *buf, int num);
+extern SW_EXPORT SureWareHook_Rand_Seed_t SureWareHook_Rand_Seed;
+
+/*
+*      SureWare Load Private Key function
+*      return 1 if success
+*                      SureWareHOOK_ERROR_FAILED if error while processing
+*      No hardware is contact for this function.
+*
+*      in param key_id :the name of the private protected key file without the extension
+                                               ".sws"
+*      out param hptr : a pointer to a buffer allocated by SureWare_Hook
+*      out param num: the effective key length in bytes
+*      out param keytype: 1 if RSA 2 if DSA
+*/
+typedef int SureWareHook_Load_Privkey_t(char*const msg,const char *key_id,char **hptr,unsigned long *num,char *keytype);
+extern SW_EXPORT SureWareHook_Load_Privkey_t SureWareHook_Load_Privkey;
+
+/*
+*      SureWare Info Public Key function
+*      return 1 if success
+*                      SureWareHOOK_ERROR_FAILED if error while processing
+*      No hardware is contact for this function.
+*
+*      in param key_id :the name of the private protected key file without the extension
+                                               ".swp"
+*      out param hptr : a pointer to a buffer allocated by SureWare_Hook
+*      out param num: the effective key length in bytes
+*      out param keytype: 1 if RSA 2 if DSA
+*/
+typedef int SureWareHook_Info_Pubkey_t(char*const msg,const char *key_id,unsigned long *num,
+                                                                               char *keytype);
+extern SW_EXPORT SureWareHook_Info_Pubkey_t SureWareHook_Info_Pubkey;
+
+/*
+*      SureWare Load Public Key function
+*      return 1 if success
+*                      SureWareHOOK_ERROR_FAILED if error while processing
+*      No hardware is contact for this function.
+*
+*      in param key_id :the name of the public protected key file without the extension
+                                               ".swp"
+*      in param num : the bytes size of n and e
+*      out param n: where to write modulus in bn format
+*      out param e: where to write exponent in bn format
+*/
+typedef int SureWareHook_Load_Rsa_Pubkey_t(char*const msg,const char *key_id,unsigned long num,
+                                                                               unsigned long *n, unsigned long *e);
+extern SW_EXPORT SureWareHook_Load_Rsa_Pubkey_t SureWareHook_Load_Rsa_Pubkey;
+
+/*
+*      SureWare Load DSA Public Key function
+*      return 1 if success
+*                      SureWareHOOK_ERROR_FAILED if error while processing
+*      No hardware is contact for this function.
+*
+*      in param key_id :the name of the public protected key file without the extension
+                                               ".swp"
+*      in param num : the bytes size of n and e
+*      out param pub: where to write pub key in bn format
+*      out param p: where to write prime in bn format
+*      out param q: where to write sunprime (length 20 bytes) in bn format
+*      out param g: where to write base in bn format
+*/
+typedef int SureWareHook_Load_Dsa_Pubkey_t(char*const msg,const char *key_id,unsigned long num,
+                                                                               unsigned long *pub, unsigned long *p,unsigned long*q,
+                                                                               unsigned long *g);
+extern SW_EXPORT SureWareHook_Load_Dsa_Pubkey_t SureWareHook_Load_Dsa_Pubkey;
+
+/*
+*      SureWare Free function
+*      Destroy the key into the hardware if destroy==1
+*/
+typedef void SureWareHook_Free_t(char *p,int destroy);
+extern SW_EXPORT SureWareHook_Free_t SureWareHook_Free;
+
+#define SUREWARE_PKCS1_PAD 1
+#define SUREWARE_ISO9796_PAD 2
+#define SUREWARE_NO_PAD 0
+/*
+* SureWare RSA Private Decryption
+* return 1 if success
+*                      SureWareHOOK_ERROR_FAILED if error while processing
+*                      SureWareHOOK_ERROR_UNIT_FAILURE if hardware failure
+*                      SUREWAREHOOK_ERROR_DATA_SIZE wrong size for buf
+*
+*      in param flen : byte size of from and to
+*      in param from : encrypted data buffer, should be a not-null valid pointer
+*      out param tlen: byte size of decrypted data, if error, unexpected value
+*      out param to : decrypted data buffer, should be a not-null valid pointer
+*   in param prsa: a protected key pointer, should be a not-null valid pointer
+*   int padding: padding id as follow
+*                                      SUREWARE_PKCS1_PAD
+*                                      SUREWARE_NO_PAD
+*
+*/
+typedef int SureWareHook_Rsa_Priv_Dec_t(char*const msg,int flen,unsigned char *from,
+                                                                               int *tlen,unsigned char *to,
+                                                                               char *prsa,int padding);
+extern SW_EXPORT SureWareHook_Rsa_Priv_Dec_t SureWareHook_Rsa_Priv_Dec;
+/*
+* SureWare RSA Signature
+* return 1 if success
+*                      SureWareHOOK_ERROR_FAILED if error while processing
+*                      SureWareHOOK_ERROR_UNIT_FAILURE if hardware failure
+*                      SUREWAREHOOK_ERROR_DATA_SIZE wrong size for buf
+*
+*      in param flen : byte size of from and to
+*      in param from : encrypted data buffer, should be a not-null valid pointer
+*      out param tlen: byte size of decrypted data, if error, unexpected value
+*      out param to : decrypted data buffer, should be a not-null valid pointer
+*   in param prsa: a protected key pointer, should be a not-null valid pointer
+*   int padding: padding id as follow
+*                                      SUREWARE_PKCS1_PAD
+*                                      SUREWARE_ISO9796_PAD
+*
+*/
+typedef int SureWareHook_Rsa_Sign_t(char*const msg,int flen,unsigned char *from,
+                                                                               int *tlen,unsigned char *to,
+                                                                               char *prsa,int padding);
+extern SW_EXPORT SureWareHook_Rsa_Sign_t SureWareHook_Rsa_Sign;
+/*
+* SureWare DSA Signature
+* return 1 if success
+*                      SureWareHOOK_ERROR_FAILED if error while processing
+*                      SureWareHOOK_ERROR_UNIT_FAILURE if hardware failure
+*                      SUREWAREHOOK_ERROR_DATA_SIZE wrong size for buf
+*
+*      in param flen : byte size of from and to
+*      in param from : encrypted data buffer, should be a not-null valid pointer
+*      out param to : decrypted data buffer, should be a 40bytes valid pointer
+*   in param pdsa: a protected key pointer, should be a not-null valid pointer
+*
+*/
+typedef int SureWareHook_Dsa_Sign_t(char*const msg,int flen,const unsigned char *from,
+                                                                               unsigned long *r,unsigned long *s,char *pdsa);
+extern SW_EXPORT SureWareHook_Dsa_Sign_t SureWareHook_Dsa_Sign;
+
+
+/*
+* SureWare Mod Exp
+* return 1 if success
+*                      SureWareHOOK_ERROR_FAILED if error while processing
+*                      SureWareHOOK_ERROR_UNIT_FAILURE if hardware failure
+*                      SUREWAREHOOK_ERROR_DATA_SIZE wrong size for buf
+*
+*      mod and res are mlen bytes long.
+*      exp is elen bytes long
+*      data is dlen bytes long
+*      mlen,elen and dlen are all multiple of sizeof(unsigned long)
+*/
+typedef int SureWareHook_Mod_Exp_t(char*const msg,int mlen,const unsigned long *mod,
+                                                                       int elen,const unsigned long *exp,
+                                                                       int dlen,unsigned long *data,
+                                                                       unsigned long *res);
+extern SW_EXPORT SureWareHook_Mod_Exp_t SureWareHook_Mod_Exp;
+