| 1 | /*
 | 
|---|
| 2 |  * Copyright (c) 2009 Kungliga Tekniska Högskolan
 | 
|---|
| 3 |  * (Royal Institute of Technology, Stockholm, Sweden).
 | 
|---|
| 4 |  * All rights reserved.
 | 
|---|
| 5 |  *
 | 
|---|
| 6 |  * Redistribution and use in source and binary forms, with or without
 | 
|---|
| 7 |  * modification, are permitted provided that the following conditions
 | 
|---|
| 8 |  * are met:
 | 
|---|
| 9 |  *
 | 
|---|
| 10 |  * 1. Redistributions of source code must retain the above copyright
 | 
|---|
| 11 |  *    notice, this list of conditions and the following disclaimer.
 | 
|---|
| 12 |  *
 | 
|---|
| 13 |  * 2. Redistributions in binary form must reproduce the above copyright
 | 
|---|
| 14 |  *    notice, this list of conditions and the following disclaimer in the
 | 
|---|
| 15 |  *    documentation and/or other materials provided with the distribution.
 | 
|---|
| 16 |  *
 | 
|---|
| 17 |  * 3. Neither the name of the Institute nor the names of its contributors
 | 
|---|
| 18 |  *    may be used to endorse or promote products derived from this software
 | 
|---|
| 19 |  *    without specific prior written permission.
 | 
|---|
| 20 |  *
 | 
|---|
| 21 |  * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
 | 
|---|
| 22 |  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 | 
|---|
| 23 |  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
 | 
|---|
| 24 |  * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
 | 
|---|
| 25 |  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
 | 
|---|
| 26 |  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
 | 
|---|
| 27 |  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 | 
|---|
| 28 |  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
 | 
|---|
| 29 |  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
 | 
|---|
| 30 |  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
 | 
|---|
| 31 |  * SUCH DAMAGE.
 | 
|---|
| 32 |  */
 | 
|---|
| 33 | 
 | 
|---|
| 34 | /* $Id$ */
 | 
|---|
| 35 | 
 | 
|---|
| 36 | #ifndef HEIM_EVP_HCRYPTO_H
 | 
|---|
| 37 | #define HEIM_EVP_HCRYPTO_H 1
 | 
|---|
| 38 | 
 | 
|---|
| 39 | /* symbol renaming */
 | 
|---|
| 40 | #define EVP_hcrypto_md2 hc_EVP_hcrypto_md2
 | 
|---|
| 41 | #define EVP_hcrypto_md4 hc_EVP_hcrypto_md4
 | 
|---|
| 42 | #define EVP_hcrypto_md5 hc_EVP_hcrypto_md5
 | 
|---|
| 43 | #define EVP_hcrypto_sha1 hc_EVP_hcrypto_sha1
 | 
|---|
| 44 | #define EVP_hcrypto_sha256 hc_EVP_hcrypto_sha256
 | 
|---|
| 45 | #define EVP_hcrypto_sha384 hc_EVP_hcrypto_sha384
 | 
|---|
| 46 | #define EVP_hcrypto_sha512 hc_EVP_hcrypto_sha512
 | 
|---|
| 47 | #define EVP_hcrypto_des_cbc hc_EVP_hcrypto_des_cbc
 | 
|---|
| 48 | #define EVP_hcrypto_des_ede3_cbc hc_EVP_hcrypto_des_ede3_cbc
 | 
|---|
| 49 | #define EVP_hcrypto_aes_128_cbc hc_EVP_hcrypto_aes_128_cbc
 | 
|---|
| 50 | #define EVP_hcrypto_aes_192_cbc hc_EVP_hcrypto_aes_192_cbc
 | 
|---|
| 51 | #define EVP_hcrypto_aes_256_cbc hc_EVP_hcrypto_aes_256_cbc
 | 
|---|
| 52 | #define EVP_hcrypto_aes_128_cfb8 hc_EVP_hcrypto_aes_128_cfb8
 | 
|---|
| 53 | #define EVP_hcrypto_aes_192_cfb8 hc_EVP_hcrypto_aes_192_cfb8
 | 
|---|
| 54 | #define EVP_hcrypto_aes_256_cfb8 hc_EVP_hcrypto_aes_256_cfb8
 | 
|---|
| 55 | #define EVP_hcrypto_rc4 hc_EVP_hcrypto_rc4
 | 
|---|
| 56 | #define EVP_hcrypto_rc4_40 hc_EVP_hcrypto_rc4_40
 | 
|---|
| 57 | #define EVP_hcrypto_rc2_40_cbc hc_EVP_hcrypto_rc2_40_cbc
 | 
|---|
| 58 | #define EVP_hcrypto_rc2_64_cbc hc_EVP_hcrypto_rc2_64_cbc
 | 
|---|
| 59 | #define EVP_hcrypto_rc2_cbc hc_EVP_hcrypto_rc2_cbc
 | 
|---|
| 60 | #define EVP_hcrypto_camellia_128_cbc hc_EVP_hcrypto_camellia_128_cbc
 | 
|---|
| 61 | #define EVP_hcrypto_camellia_192_cbc hc_EVP_hcrypto_camellia_192_cbc
 | 
|---|
| 62 | #define EVP_hcrypto_camellia_256_cbc hc_EVP_hcrypto_camellia_256_cbc
 | 
|---|
| 63 | 
 | 
|---|
| 64 | /*
 | 
|---|
| 65 |  *
 | 
|---|
| 66 |  */
 | 
|---|
| 67 | 
 | 
|---|
| 68 | HC_CPP_BEGIN
 | 
|---|
| 69 | 
 | 
|---|
| 70 | const EVP_MD * EVP_hcrypto_md2(void);
 | 
|---|
| 71 | const EVP_MD * EVP_hcrypto_md4(void);
 | 
|---|
| 72 | const EVP_MD * EVP_hcrypto_md5(void);
 | 
|---|
| 73 | const EVP_MD * EVP_hcrypto_sha1(void);
 | 
|---|
| 74 | const EVP_MD * EVP_hcrypto_sha256(void);
 | 
|---|
| 75 | const EVP_MD * EVP_hcrypto_sha384(void);
 | 
|---|
| 76 | const EVP_MD * EVP_hcrypto_sha512(void);
 | 
|---|
| 77 | 
 | 
|---|
| 78 | const EVP_CIPHER * EVP_hcrypto_rc4(void);
 | 
|---|
| 79 | const EVP_CIPHER * EVP_hcrypto_rc4_40(void);
 | 
|---|
| 80 | 
 | 
|---|
| 81 | const EVP_CIPHER * EVP_hcrypto_rc2_cbc(void);
 | 
|---|
| 82 | const EVP_CIPHER * EVP_hcrypto_rc2_40_cbc(void);
 | 
|---|
| 83 | const EVP_CIPHER * EVP_hcrypto_rc2_64_cbc(void);
 | 
|---|
| 84 | 
 | 
|---|
| 85 | const EVP_CIPHER * EVP_hcrypto_des_cbc(void);
 | 
|---|
| 86 | const EVP_CIPHER * EVP_hcrypto_des_ede3_cbc(void);
 | 
|---|
| 87 | 
 | 
|---|
| 88 | const EVP_CIPHER * EVP_hcrypto_aes_128_cbc(void);
 | 
|---|
| 89 | const EVP_CIPHER * EVP_hcrypto_aes_192_cbc(void);
 | 
|---|
| 90 | const EVP_CIPHER * EVP_hcrypto_aes_256_cbc(void);
 | 
|---|
| 91 | 
 | 
|---|
| 92 | const EVP_CIPHER * EVP_hcrypto_aes_128_cfb8(void);
 | 
|---|
| 93 | const EVP_CIPHER * EVP_hcrypto_aes_192_cfb8(void);
 | 
|---|
| 94 | const EVP_CIPHER * EVP_hcrypto_aes_256_cfb8(void);
 | 
|---|
| 95 | 
 | 
|---|
| 96 | const EVP_CIPHER * EVP_hcrypto_camellia_128_cbc(void);
 | 
|---|
| 97 | const EVP_CIPHER * EVP_hcrypto_camellia_192_cbc(void);
 | 
|---|
| 98 | const EVP_CIPHER * EVP_hcrypto_camellia_256_cbc(void);
 | 
|---|
| 99 | 
 | 
|---|
| 100 | 
 | 
|---|
| 101 | HC_CPP_END
 | 
|---|
| 102 | 
 | 
|---|
| 103 | #endif /* HEIM_EVP_HCRYPTO_H */
 | 
|---|