libsec.h 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429
  1. /*
  2. * This file is part of the UCB release of Plan 9. It is subject to the license
  3. * terms in the LICENSE file found in the top-level directory of this
  4. * distribution and at http://akaros.cs.berkeley.edu/files/Plan9License. No
  5. * part of the UCB release of Plan 9, including this file, may be copied,
  6. * modified, propagated, or distributed except according to the terms contained
  7. * in the LICENSE file.
  8. */
  9. #ifndef _MPINT
  10. typedef struct mpint mpint;
  11. #endif
  12. /*
  13. * AES definitions
  14. */
  15. enum
  16. {
  17. AESbsize= 16,
  18. AESmaxkey= 32,
  19. AESmaxrounds= 14
  20. };
  21. typedef struct AESstate AESstate;
  22. struct AESstate
  23. {
  24. uint32_t setup;
  25. int rounds;
  26. int keybytes;
  27. uint ctrsz;
  28. uint8_t key[AESmaxkey]; /* unexpanded key */
  29. uint32_t ekey[4*(AESmaxrounds + 1)]; /* encryption key */
  30. uint32_t dkey[4*(AESmaxrounds + 1)]; /* decryption key */
  31. uint8_t ivec[AESbsize]; /* initialization vector */
  32. uint8_t mackey[3 * AESbsize]; /* 3 XCBC mac 96 keys */
  33. };
  34. /* block ciphers */
  35. void aes_encrypt(uint32_t rk[], int Nr, uint8_t pt[16],
  36. uint8_t ct[16]);
  37. void aes_decrypt(uint32_t rk[], int Nr, uint8_t ct[16],
  38. uint8_t pt[16]);
  39. void setupAESstate(AESstate *s, uint8_t key[], int keybytes,
  40. uint8_t *ivec);
  41. void aesCBCencrypt(uint8_t *p, int len, AESstate *s);
  42. void aesCBCdecrypt(uint8_t *p, int len, AESstate *s);
  43. void aesCTRdecrypt(uint8_t *p, int len, AESstate *s);
  44. void aesCTRencrypt(uint8_t *p, int len, AESstate *s);
  45. void setupAESXCBCstate(AESstate *s);
  46. uint8_t* aesXCBCmac(uint8_t *p, int len, AESstate *s);
  47. /*
  48. * Blowfish Definitions
  49. */
  50. enum
  51. {
  52. BFbsize = 8,
  53. BFrounds= 16
  54. };
  55. /* 16-round Blowfish */
  56. typedef struct BFstate BFstate;
  57. struct BFstate
  58. {
  59. uint32_t setup;
  60. uint8_t key[56];
  61. uint8_t ivec[8];
  62. uint32_t pbox[BFrounds+2];
  63. uint32_t sbox[1024];
  64. };
  65. void setupBFstate(BFstate *s, uint8_t key[], int keybytes,
  66. uint8_t *ivec);
  67. void bfCBCencrypt(uint8_t*, int, BFstate*);
  68. void bfCBCdecrypt(uint8_t*, int, BFstate*);
  69. void bfECBencrypt(uint8_t*, int, BFstate*);
  70. void bfECBdecrypt(uint8_t*, int, BFstate*);
  71. /*
  72. * DES definitions
  73. */
  74. enum
  75. {
  76. DESbsize= 8
  77. };
  78. /* single des */
  79. typedef struct DESstate DESstate;
  80. struct DESstate
  81. {
  82. uint32_t setup;
  83. uint8_t key[8]; /* unexpanded key */
  84. uint32_t expanded[32]; /* expanded key */
  85. uint8_t ivec[8]; /* initialization vector */
  86. };
  87. void setupDESstate(DESstate *s, uint8_t key[8], uint8_t *ivec);
  88. void des_key_setup(uint8_t[8], uint32_t[32]);
  89. void block_cipher(uint32_t*, uint8_t*, int);
  90. void desCBCencrypt(uint8_t*, int, DESstate*);
  91. void desCBCdecrypt(uint8_t*, int, DESstate*);
  92. void desECBencrypt(uint8_t*, int, DESstate*);
  93. void desECBdecrypt(uint8_t*, int, DESstate*);
  94. /* for backward compatibility with 7-byte DES key format */
  95. void des56to64(uint8_t *k56, uint8_t *k64);
  96. void des64to56(uint8_t *k64, uint8_t *k56);
  97. void key_setup(uint8_t[7], uint32_t[32]);
  98. /* triple des encrypt/decrypt orderings */
  99. enum {
  100. DES3E= 0,
  101. DES3D= 1,
  102. DES3EEE= 0,
  103. DES3EDE= 2,
  104. DES3DED= 5,
  105. DES3DDD= 7
  106. };
  107. typedef struct DES3state DES3state;
  108. struct DES3state
  109. {
  110. uint32_t setup;
  111. uint8_t key[3][8]; /* unexpanded key */
  112. uint32_t expanded[3][32]; /* expanded key */
  113. uint8_t ivec[8]; /* initialization vector */
  114. };
  115. void setupDES3state(DES3state *s, uint8_t key[3][8], uint8_t *ivec);
  116. void triple_block_cipher(uint32_t keys[3][32], uint8_t*, int);
  117. void des3CBCencrypt(uint8_t*, int, DES3state*);
  118. void des3CBCdecrypt(uint8_t*, int, DES3state*);
  119. void des3ECBencrypt(uint8_t*, int, DES3state*);
  120. void des3ECBdecrypt(uint8_t*, int, DES3state*);
  121. /*
  122. * digests
  123. */
  124. enum
  125. {
  126. SHA1dlen= 20, /* SHA digest length */
  127. SHA2_224dlen= 28, /* SHA-224 digest length */
  128. SHA2_256dlen= 32, /* SHA-256 digest length */
  129. SHA2_384dlen= 48, /* SHA-384 digest length */
  130. SHA2_512dlen= 64, /* SHA-512 digest length */
  131. MD4dlen= 16, /* MD4 digest length */
  132. MD5dlen= 16, /* MD5 digest length */
  133. AESdlen= 16, /* TODO: see rfc */
  134. Hmacblksz = 64, /* in bytes; from rfc2104 */
  135. };
  136. typedef struct DigestState DigestState;
  137. struct DigestState
  138. {
  139. uint64_t len;
  140. union {
  141. uint32_t state[8];
  142. uint64_t bstate[8];
  143. };
  144. uint8_t buf[256];
  145. int blen;
  146. char malloced;
  147. char seeded;
  148. };
  149. typedef struct DigestState SHAstate; /* obsolete name */
  150. typedef struct DigestState SHA1state;
  151. typedef struct DigestState SHA2_224state;
  152. typedef struct DigestState SHA2_256state;
  153. typedef struct DigestState SHA2_384state;
  154. typedef struct DigestState SHA2_512state;
  155. typedef struct DigestState MD5state;
  156. typedef struct DigestState MD4state;
  157. typedef struct DigestState AEShstate;
  158. DigestState* md4(uint8_t*, uint32_t, uint8_t*, DigestState*);
  159. DigestState* md5(uint8_t*, uint32_t, uint8_t*, DigestState*);
  160. DigestState* sha1(uint8_t*, uint32_t, uint8_t*, DigestState*);
  161. DigestState* sha2_224(uint8_t*, uint32_t, uint8_t*, DigestState*);
  162. DigestState* sha2_256(uint8_t*, uint32_t, uint8_t*, DigestState*);
  163. DigestState* sha2_384(uint8_t*, uint32_t, uint8_t*, DigestState*);
  164. DigestState* sha2_512(uint8_t*, uint32_t, uint8_t*, DigestState*);
  165. DigestState* aes(uint8_t*, uint32_t, uint8_t*, DigestState*);
  166. DigestState* hmac_x(uint8_t *p, uint32_t len, uint8_t *key,
  167. uint32_t klen,
  168. uint8_t *digest, DigestState *s,
  169. DigestState*(*x)(uint8_t*, uint32_t, uint8_t*, DigestState*),
  170. int xlen);
  171. DigestState* hmac_md5(uint8_t*, uint32_t, uint8_t*, uint32_t,
  172. uint8_t*,
  173. DigestState*);
  174. DigestState* hmac_sha1(uint8_t*, uint32_t, uint8_t*, uint32_t,
  175. uint8_t*,
  176. DigestState*);
  177. DigestState* hmac_sha2_224(uint8_t*, uint32_t, uint8_t*, uint32_t,
  178. uint8_t*, DigestState*);
  179. DigestState* hmac_sha2_256(uint8_t*, uint32_t, uint8_t*, uint32_t,
  180. uint8_t*, DigestState*);
  181. DigestState* hmac_sha2_384(uint8_t*, uint32_t, uint8_t*, uint32_t,
  182. uint8_t*, DigestState*);
  183. DigestState* hmac_sha2_512(uint8_t*, uint32_t, uint8_t*, uint32_t,
  184. uint8_t*, DigestState*);
  185. DigestState* hmac_aes(uint8_t*, uint32_t, uint8_t*, uint32_t,
  186. uint8_t*,
  187. DigestState*);
  188. char* md5pickle(MD5state*);
  189. MD5state* md5unpickle(char*);
  190. char* sha1pickle(SHA1state*);
  191. SHA1state* sha1unpickle(char*);
  192. /*
  193. * random number generation
  194. */
  195. void genrandom(uint8_t *buf, int nbytes);
  196. void prng(uint8_t *buf, int nbytes);
  197. uint32_t fastrand(void);
  198. uint32_t nfastrand(uint32_t);
  199. /*
  200. * primes
  201. */
  202. void genprime(mpint *p, int n, int accuracy); /* generate n-bit probable prime */
  203. void gensafeprime(mpint *p, mpint *alpha, int n, int accuracy); /* prime & generator */
  204. void genstrongprime(mpint *p, int n, int accuracy); /* generate n-bit strong prime */
  205. void DSAprimes(mpint *q, mpint *p, uint8_t seed[SHA1dlen]);
  206. int probably_prime(mpint *n, int nrep); /* miller-rabin test */
  207. int smallprimetest(mpint *p); /* returns -1 if not prime, 0 otherwise */
  208. /*
  209. * rc4
  210. */
  211. typedef struct RC4state RC4state;
  212. struct RC4state
  213. {
  214. uint8_t state[256];
  215. uint8_t x;
  216. uint8_t y;
  217. };
  218. void setupRC4state(RC4state*, uint8_t*, int);
  219. void rc4(RC4state*, uint8_t*, int);
  220. void rc4skip(RC4state*, int);
  221. void rc4back(RC4state*, int);
  222. /*
  223. * rsa
  224. */
  225. typedef struct RSApub RSApub;
  226. typedef struct RSApriv RSApriv;
  227. typedef struct PEMChain PEMChain;
  228. /* public/encryption key */
  229. struct RSApub
  230. {
  231. mpint *n; /* modulus */
  232. mpint *ek; /* exp (encryption key) */
  233. };
  234. /* private/decryption key */
  235. struct RSApriv
  236. {
  237. RSApub pub;
  238. mpint *dk; /* exp (decryption key) */
  239. /* precomputed values to help with chinese remainder theorem calc */
  240. mpint *p;
  241. mpint *q;
  242. mpint *kp; /* dk mod p-1 */
  243. mpint *kq; /* dk mod q-1 */
  244. mpint *c2; /* (inv p) mod q */
  245. };
  246. struct PEMChain{
  247. PEMChain*next;
  248. uint8_t *pem;
  249. int pemlen;
  250. };
  251. RSApriv* rsagen(int nlen, int elen, int rounds);
  252. RSApriv* rsafill(mpint *n, mpint *e, mpint *d, mpint *p, mpint *q);
  253. mpint* rsaencrypt(RSApub *k, mpint *in, mpint *out);
  254. mpint* rsadecrypt(RSApriv *k, mpint *in, mpint *out);
  255. RSApub* rsapuballoc(void);
  256. void rsapubfree(RSApub*);
  257. RSApriv* rsaprivalloc(void);
  258. void rsaprivfree(RSApriv*);
  259. RSApub* rsaprivtopub(RSApriv*);
  260. RSApub* X509toRSApub(uint8_t*, int, char*, int);
  261. uint8_t* RSApubtoasn1(RSApub*, int*);
  262. RSApub* asn1toRSApub(uint8_t*, int);
  263. RSApriv* asn1toRSApriv(uint8_t*, int);
  264. void asn1dump(uint8_t *der, int len);
  265. uint8_t* decodePEM(char *s, char *type, int *len,
  266. char **new_s);
  267. PEMChain* decodepemchain(char *s, char *type);
  268. uint8_t* X509gen(RSApriv *priv, char *subj,
  269. uint32_t valid[2],
  270. int *certlen);
  271. uint8_t* X509req(RSApriv *priv, char *subj, int *certlen);
  272. char* X509verify(uint8_t *cert, int ncert, RSApub *pk);
  273. void X509dump(uint8_t *cert, int ncert);
  274. /*
  275. * elgamal
  276. */
  277. typedef struct EGpub EGpub;
  278. typedef struct EGpriv EGpriv;
  279. typedef struct EGsig EGsig;
  280. /* public/encryption key */
  281. struct EGpub
  282. {
  283. mpint *p; /* modulus */
  284. mpint *alpha; /* generator */
  285. mpint *key; /* (encryption key) alpha**secret mod p */
  286. };
  287. /* private/decryption key */
  288. struct EGpriv
  289. {
  290. EGpub pub;
  291. mpint *secret; /* (decryption key) */
  292. };
  293. /* signature */
  294. struct EGsig
  295. {
  296. mpint *r, *s;
  297. };
  298. EGpriv* eggen(int nlen, int rounds);
  299. mpint* egencrypt(EGpub *k, mpint *in, mpint *out); /* deprecated */
  300. mpint* egdecrypt(EGpriv *k, mpint *in, mpint *out);
  301. EGsig* egsign(EGpriv *k, mpint *m);
  302. int egverify(EGpub *k, EGsig *sig, mpint *m);
  303. EGpub* egpuballoc(void);
  304. void egpubfree(EGpub*);
  305. EGpriv* egprivalloc(void);
  306. void egprivfree(EGpriv*);
  307. EGsig* egsigalloc(void);
  308. void egsigfree(EGsig*);
  309. EGpub* egprivtopub(EGpriv*);
  310. /*
  311. * dsa
  312. */
  313. typedef struct DSApub DSApub;
  314. typedef struct DSApriv DSApriv;
  315. typedef struct DSAsig DSAsig;
  316. /* public/encryption key */
  317. struct DSApub
  318. {
  319. mpint *p; /* modulus */
  320. mpint *q; /* group order, q divides p-1 */
  321. mpint *alpha; /* group generator */
  322. mpint *key; /* (encryption key) alpha**secret mod p */
  323. };
  324. /* private/decryption key */
  325. struct DSApriv
  326. {
  327. DSApub pub;
  328. mpint *secret; /* (decryption key) */
  329. };
  330. /* signature */
  331. struct DSAsig
  332. {
  333. mpint *r, *s;
  334. };
  335. DSApriv* dsagen(DSApub *opub); /* opub not checked for consistency! */
  336. DSAsig* dsasign(DSApriv *k, mpint *m);
  337. int dsaverify(DSApub *k, DSAsig *sig, mpint *m);
  338. DSApub* dsapuballoc(void);
  339. void dsapubfree(DSApub*);
  340. DSApriv* dsaprivalloc(void);
  341. void dsaprivfree(DSApriv*);
  342. DSAsig* dsasigalloc(void);
  343. void dsasigfree(DSAsig*);
  344. DSApub* dsaprivtopub(DSApriv*);
  345. DSApriv* asn1toDSApriv(uint8_t*, int);
  346. /*
  347. * TLS
  348. */
  349. typedef struct Thumbprint{
  350. struct Thumbprint *next;
  351. uint8_t sha1[SHA1dlen];
  352. } Thumbprint;
  353. typedef struct TLSconn{
  354. char dir[40]; /* connection directory */
  355. uint8_t *cert; /* certificate (local on input, remote on output) */
  356. uint8_t *sessionID;
  357. int certlen;
  358. int sessionIDlen;
  359. int (*trace)(char*fmt, ...);
  360. PEMChain*chain; /* optional extra certificate evidence for servers to present */
  361. char *sessionType;
  362. uint8_t *sessionKey;
  363. int sessionKeylen;
  364. char *sessionConst;
  365. } TLSconn;
  366. /* tlshand.c */
  367. int tlsClient(int fd, TLSconn *c);
  368. int tlsServer(int fd, TLSconn *c);
  369. /* thumb.c */
  370. Thumbprint* initThumbprints(char *ok, char *crl);
  371. void freeThumbprints(Thumbprint *ok);
  372. int okThumbprint(uint8_t *sha1, Thumbprint *ok);
  373. /* readcert.c */
  374. uint8_t *readcert(char *filename, int *pcertlen);
  375. PEMChain*readcertchain(char *filename);