/* vim: set expandtab ts=4 sw=4: */
/*
* You may redistribute this program and/or modify it under the terms of
* the GNU General Public License as published by the Free Software Foundation,
* either version 3 of the License, or (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see .
*/
#ifndef CryptoAuth_H
#define CryptoAuth_H
#include "rust/cjdns_sys/RTypes.h"
#include "interface/Iface.h"
#include "crypto/random/Random.h"
#include "memory/Allocator.h"
#include "util/log/Log.h"
#include "util/events/EventBase.h"
#include "wire/Message.h"
#include "util/Linker.h"
Linker_require("crypto/CryptoAuth.c")
#include
#include
#define CryptoAuth_DEFAULT_RESET_AFTER_INACTIVITY_SECONDS 60
#define CryptoAuth_DEFAULT_SETUP_RESET_AFTER_INACTIVITY_SECONDS 10
struct CryptoAuth
{
int opaque;
};
struct CryptoAuth_Session
{
struct Iface plaintext;
struct Iface ciphertext;
};
/**
* Associate a password:authtype pair with a user object.
* Calling CryptoAuth_getUser() on any interface which has established a connection with
* the same password:authType pair will return the same user object.
*
* @param password This should be a key derived from the password using a good key derivation
* function, using a plaintext password here is NOT recommended.
* @param authType The method of authenticating the user, only option currently is 1 for sha256
* based authentication.
* @param user The thing to associate with this user, will be returned by CryptoAuth_getUser().
* If this is NULL and requireAuthentication is enabled, authentication will fail.
* Duplicate user entires are OK.
* @param ipv6 If not NULL, only allow connections to this CryptoAuth from the key which hashes
* to the given IPv6 address.
* @param context The CryptoAuth context.
* @return 0 if all goes well,
* CryptoAuth_addUser_DUPLICATE if the same *password* already exists.
*/
enum CryptoAuth_addUser_Res {
CryptoAuth_addUser_DUPLICATE = -3,
};
int CryptoAuth_addUser_ipv6(String* password,
String* login,
uint8_t ipv6[16],
struct CryptoAuth* ca);
static inline int CryptoAuth_addUser(String* password, String* login, struct CryptoAuth* ca)
{
return CryptoAuth_addUser_ipv6(password, login, NULL, ca);
}
/**
* Remove all users registered with this CryptoAuth.
*
* @param context the context to remove users for.
* @param user the identifier which was passed to addUser(), all users with this id will be removed.
* @return the number of users removed.
*/
int CryptoAuth_removeUsers(struct CryptoAuth* context, String* user);
/**
* Get a list of all the users added via addUser.
*
* @param context the context used to call addUser.
* @param alloc the Allocator to use to create the usersOut array.
* @returns List* containing the user String's
*/
RTypes_StrList_t* CryptoAuth_getUsers(const struct CryptoAuth* context, struct Allocator* alloc);
/**
* Create a new crypto authenticator.
*
* @param allocator the means of aquiring memory.
* @param privateKey the private key to use for this CryptoAuth or null if one should be generated.
* @param eventBase the libevent context for handling timeouts.
* @param logger the mechanism for logging output from the CryptoAuth.
* if NULL then no logging will be done.
* @param rand random number generator.
* @return a new CryptoAuth context.
*/
struct CryptoAuth* CryptoAuth_new(struct Allocator* allocator,
const uint8_t* privateKey,
EventBase_t* eventBase,
struct Log* logger,
struct Random* rand);
/**
* Wrap an interface with crypto authentication.
*
* NOTE2: Every received packet is prefixed by the 4 byte *nonce* for that packet
* in host endian order.
*
* @param toWarp the interface to wrap
* @param herPublicKey the public key of the other party or NULL if unknown.
* @param requireAuth if the remote end of this interface begins the connection, require
* them to present valid authentication credentials to connect.
* If this end begins the connection, this parameter has no effect.
* @param name a name for this CA which will appear in logs.
* @param context the CryptoAuth context.
*/
struct CryptoAuth_Session* CryptoAuth_newSession(struct CryptoAuth* ca,
struct Allocator* alloc,
const uint8_t herPublicKey[32],
const bool requireAuth,
const char* name,
bool useNoise);
/** @return 0 on success, -1 otherwise. */ // Now only used in unit tests on Rust side
int CryptoAuth_encrypt(struct CryptoAuth_Session* session, Message_t* msg);
enum CryptoAuth_DecryptErr {
CryptoAuth_DecryptErr_NONE = 0,
// Packet too short
CryptoAuth_DecryptErr_RUNT = 1,
// Received a run message to an un-setup session
CryptoAuth_DecryptErr_NO_SESSION = 2,
CryptoAuth_DecryptErr_FINAL_SHAKE_FAIL = 3,
CryptoAuth_DecryptErr_FAILED_DECRYPT_RUN_MSG = 4,
CryptoAuth_DecryptErr_KEY_PKT_ESTABLISHED_SESSION = 5,
CryptoAuth_DecryptErr_WRONG_PERM_PUBKEY = 6,
// Only specific IPv6 can connect to this CA session and the request has the wrong one.
CryptoAuth_DecryptErr_IP_RESTRICTED = 7,
// Authentication is required and is missing.
CryptoAuth_DecryptErr_AUTH_REQUIRED = 8,
// Basically this means the login name doesn't exist, beware of giving this information up.
CryptoAuth_DecryptErr_UNRECOGNIZED_AUTH = 9,
// Key packet and we are not in a state to accept a key packet
CryptoAuth_DecryptErr_STRAY_KEY = 10,
CryptoAuth_DecryptErr_HANDSHAKE_DECRYPT_FAILED = 11,
// Set zero as the temporary public key
CryptoAuth_DecryptErr_WISEGUY = 12,
// Duplicate hello or key packet (same temp key and not a repeat-packet type)
// Or repeat key packet with different key than what is known
// Or a repeat hello packet for which we already know the temp key (meaning it is associated
// with an existing session) when we are not in a state to accept a repeat hello.
CryptoAuth_DecryptErr_INVALID_PACKET = 13,
// Replay checker could not validate this packet
CryptoAuth_DecryptErr_REPLAY = 14,
// Authenticated decryption failed
CryptoAuth_DecryptErr_DECRYPT = 15
};
// returns 0 if everything if ok, otherwise an encryption error.
// If there is an error, the content of the message MIGHT already be decrypted !
// Now only used in unit tests on Rust side
enum CryptoAuth_DecryptErr CryptoAuth_decrypt(struct CryptoAuth_Session* sess, Message_t* msg);
/**
* Choose the authentication credentials to use.
* WARNING: Even if the remote end begins the connection, these credentials will be presented which
* will cause the connection initiation to fail if the remote end does not know of them.
*
* @param password the password to use for authenticating, this must match the password given to
* CryptoAuth_addUser() at the other end of the connection.
* @param login the username to use for logging in with the other node.
* if null then the authtype will be type 1 (password only).
* @param wrappedInterface this MUST be the output from CryptoAuth_wrapInterface().
*/
void CryptoAuth_setAuth(const String* password,
const String* login,
struct CryptoAuth_Session* caSession);
/** Reset the session's state to CryptoAuth_NEW, a new connection will be negotiated. */
//void CryptoAuth_reset(struct CryptoAuth_Session* session);
void CryptoAuth_resetIfTimeout(struct CryptoAuth_Session* session);
void CryptoAuth_reset(struct CryptoAuth_Session* caSession);
#define CryptoAuth_State_INIT RTypes_CryptoAuth_State_t_Init
#define CryptoAuth_State_SENT_HELLO RTypes_CryptoAuth_State_t_SentHello
#define CryptoAuth_State_RECEIVED_HELLO RTypes_CryptoAuth_State_t_ReceivedHello
#define CryptoAuth_State_SENT_KEY RTypes_CryptoAuth_State_t_SentKey
#define CryptoAuth_State_RECEIVED_KEY RTypes_CryptoAuth_State_t_ReceivedKey
#define CryptoAuth_State_ESTABLISHED RTypes_CryptoAuth_State_t_Established
static inline char* CryptoAuth_stateString(RTypes_CryptoAuth_State_t state)
{
switch (state) {
case CryptoAuth_State_INIT: return "INIT";
case CryptoAuth_State_SENT_HELLO: return "SENT_HELLO";
case CryptoAuth_State_RECEIVED_HELLO: return "RECEIVED_HELLO";
case CryptoAuth_State_SENT_KEY: return "SENT_KEY";
case CryptoAuth_State_RECEIVED_KEY: return "RECEIVED_KEY";
case CryptoAuth_State_ESTABLISHED: return "ESTABLISHED";
default: return "INVALID";
}
}
RTypes_CryptoAuth_State_t CryptoAuth_getState(struct CryptoAuth_Session* session);
void CryptoAuth_getHerPubKey(const struct CryptoAuth_Session *session, uint8_t *pkOut);
void CryptoAuth_getHerIp6(const struct CryptoAuth_Session *session, uint8_t *ipOut);
void CryptoAuth_getPubKey(const struct CryptoAuth *ca, uint8_t *pkOut);
String_t *CryptoAuth_getName(const struct CryptoAuth_Session *session, Allocator_t *alloc);
void CryptoAuth_stats(const struct CryptoAuth_Session *session, RTypes_CryptoStats_t *statsOut);
#endif