1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
|
/*
* OpenVPN -- An application to securely tunnel IP networks
* over a single TCP/UDP port, with support for SSL/TLS-based
* session authentication and key exchange,
* packet encryption, packet authentication, and
* packet compression.
*
* Copyright (C) 2002-2010 OpenVPN Technologies, Inc. <sales@openvpn.net>
* Copyright (C) 2010 Fox Crypto B.V. <openvpn@fox-it.com>
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License version 2
* as published by the Free Software Foundation.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program (see the file COPYING included with this
* distribution); if not, write to the Free Software Foundation, Inc.,
* 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
*/
/**
* @file Data Channel Cryptography SSL library-specific backend interface
*/
#ifndef CRYPTO_BACKEND_H_
#define CRYPTO_BACKEND_H_
#include "config.h"
#ifdef USE_OPENSSL
#include "crypto_openssl.h"
#endif
#ifdef USE_POLARSSL
#include "crypto_polarssl.h"
#endif
#include "basic.h"
/*
* This routine should have additional OpenSSL crypto library initialisations
* used by both crypto and ssl components of OpenVPN.
*/
void crypto_init_lib (void);
void crypto_uninit_lib (void);
void crypto_clear_error (void);
/*
* Initialise the given named crypto engine.
*/
void crypto_init_lib_engine (const char *engine_name);
#ifdef DMALLOC
/*
* OpenSSL memory debugging. If dmalloc debugging is enabled, tell
* OpenSSL to use our private malloc/realloc/free functions so that
* we can dispatch them to dmalloc.
*/
void crypto_init_dmalloc (void);
#endif /* DMALLOC */
void show_available_ciphers (void);
void show_available_digests (void);
void show_available_engines (void);
/*
*
* Random number functions, used in cases where we want
* reasonably strong cryptographic random number generation
* without depleting our entropy pool. Used for random
* IV values and a number of other miscellaneous tasks.
*
*/
/**
* Wrapper for secure random number generator. Retrieves len bytes of random
* data, and places it in output.
*
* @param output Output buffer
* @param len Length of the output buffer, in bytes
*
* @return \c 1 on success, \c 0 on failure
*/
int rand_bytes (uint8_t *output, int len);
/*
*
* Key functions, allow manipulation of keys.
*
*/
/**
* Return number of DES cblocks (1 cblock = length of a single-DES key) for the
* current key type or 0 if not a DES cipher.
*
* @param kt Type of key
*
* @return Number of DES cblocks that the key consists of, or 0.
*/
int key_des_num_cblocks (const cipher_kt_t *kt);
/*
* Check the given DES key. Checks the given key's length, weakness and parity.
*
* @param key Key to check
* @param key_len Length of the key, in bytes
* @param ndc Number of DES cblocks that the key is made up of.
*
* @return \c true if the key is valid, \c false otherwise.
*/
bool key_des_check (uint8_t *key, int key_len, int ndc);
/*
* Fix the given DES key, setting its parity to odd.
*
* @param key Key to check
* @param key_len Length of the key, in bytes
* @param ndc Number of DES cblocks that the key is made up of.
*/
void key_des_fixup (uint8_t *key, int key_len, int ndc);
/**
* Encrypt the given block, using DES ECB mode
*
* @param key DES key to use.
* @param src Buffer containing the 8-byte source.
* @param dst Buffer containing the 8-byte destination
*/
void cipher_des_encrypt_ecb (const unsigned char key[8],
unsigned char src[8],
unsigned char dst[8]);
/*
*
* Generic cipher key type functions
*
*/
/*
* Max size in bytes of any cipher key that might conceivably be used.
*
* This value is checked at compile time in crypto.c to make sure
* it is always at least EVP_MAX_KEY_LENGTH.
*
* We define our own value, since this parameter
* is used to control the size of static key files.
* If the OpenSSL library increases EVP_MAX_KEY_LENGTH,
* we don't want our key files to be suddenly rendered
* unusable.
*/
#define MAX_CIPHER_KEY_LENGTH 64
/**
* Return cipher parameters, based on the given cipher name. The
* contents of these parameters are library-specific, and can be used to
* initialise encryption/decryption.
*
* @param ciphername Name of the cipher to retrieve parameters for (e.g.
* \c AES-128-CBC).
*
* @return A statically allocated structure containing parameters
* for the given cipher.
*/
const cipher_kt_t * cipher_kt_get (const char *ciphername);
/**
* Retrieve a string describing the cipher (e.g. \c AES-128-CBC).
*
* @param cipher_kt Static cipher parameters
*
* @return a statically allocated string describing the cipher.
*/
const char * cipher_kt_name (const cipher_kt_t *cipher_kt);
/**
* Returns the size of keys used by the cipher, in bytes. If the cipher has a
* variable key size, return the default key size.
*
* @param cipher_kt Static cipher parameters
*
* @return (Default) size of keys used by the cipher, in bytes.
*/
int cipher_kt_key_size (const cipher_kt_t *cipher_kt);
/**
* Returns the size of the IV used by the cipher, in bytes, or 0 if no IV is
* used.
*
* @param cipher_kt Static cipher parameters
*
* @return Size of the IV, in bytes, or 0 if the cipher does not
* use an IV.
*/
int cipher_kt_iv_size (const cipher_kt_t *cipher_kt);
/**
* Returns the block size of the cipher, in bytes.
*
* @param cipher_kt Static cipher parameters
*
* @return Block size, in bytes.
*/
int cipher_kt_block_size (const cipher_kt_t *cipher_kt);
/**
* Returns the mode that the cipher runs in.
*
* @param cipher_kt Static cipher parameters
*
* @return Cipher mode, either \c OPENVPN_MODE_CBC, \c
* OPENVPN_MODE_OFB or \c OPENVPN_MODE_CFB
*/
bool cipher_kt_mode (const cipher_kt_t *cipher_kt);
/**
*
* Generic cipher functions
*
*/
/**
* Initialise a cipher context, based on the given key and key type.
*
* @param ctx Cipher context. May not be NULL
* @param key Buffer containing the key to use
* @param key_len Length of the key, in bytes
* @param kt Static cipher parameters to use
* @param enc Whether to encrypt or decrypt (either
* \c POLARSSL_OP_ENCRYPT or \c POLARSSL_OP_DECRYPT).
*/
void cipher_ctx_init (cipher_ctx_t *ctx, uint8_t *key, int key_len,
const cipher_kt_t *kt, int enc);
/**
* Cleanup the specified context.
*
* @param ctx Cipher context to cleanup.
*/
void cipher_ctx_cleanup (cipher_ctx_t *ctx);
/**
* Returns the size of the IV used by the cipher, in bytes, or 0 if no IV is
* used.
*
* @param ctx The cipher's context
*
* @return Size of the IV, in bytes, or \c 0 if the cipher does not
* use an IV or ctx was NULL.
*/
int cipher_ctx_iv_length (const cipher_ctx_t *ctx);
/**
* Returns the block size of the cipher, in bytes.
*
* @param ctx The cipher's context
*
* @return Block size, in bytes, or 0 if ctx was NULL.
*/
int cipher_ctx_block_size (const cipher_ctx_t *ctx);
/**
* Returns the mode that the cipher runs in.
*
* @param ctx Cipher's context. May not be NULL.
*
* @return Cipher mode, either \c OPENVPN_MODE_CBC, \c
* OPENVPN_MODE_OFB or \c OPENVPN_MODE_CFB
*/
int cipher_ctx_mode (const cipher_ctx_t *ctx);
/**
* Resets the given cipher context, setting the IV to the specified value.
* Preserves the associated key information.
*
* @param ctx Cipher's context. May not be NULL.
* @param iv_buf The IV to use.
*
* @return \c 0 on failure, \c 1 on success.
*/
int cipher_ctx_reset (cipher_ctx_t *ctx, uint8_t *iv_buf);
/**
* Updates the given cipher context, encrypting data in the source buffer, and
* placing any complete blocks in the destination buffer.
*
* Note that if a complete block cannot be written, data is cached in the
* context, and emitted at a later call to \c cipher_ctx_update, or by a call
* to \c cipher_ctx_final(). This implies that dst should have enough room for
* src_len + \c cipher_ctx_block_size() - 1.
*
* @param ctx Cipher's context. May not be NULL.
* @param dst Destination buffer
* @param dst_len Length of the destination buffer, in bytes
* @param src Source buffer
* @param src_len Length of the source buffer, in bytes
*
* @return \c 0 on failure, \c 1 on success.
*/
int cipher_ctx_update (cipher_ctx_t *ctx, uint8_t *dst, int *dst_len,
uint8_t *src, int src_len);
/**
* Pads the final cipher block using PKCS padding, and output to the destination
* buffer.
*
* @param ctx Cipher's context. May not be NULL.
* @param dst Destination buffer
* @param dst_len Length of the destination buffer, in bytes
*
* @return \c 0 on failure, \c 1 on success.
*/
int cipher_ctx_final (cipher_ctx_t *ctx, uint8_t *dst, int *dst_len);
/*
*
* Generic message digest information functions
*
*/
/*
* Max size in bytes of any HMAC key that might conceivably be used.
*
* This value is checked at compile time in crypto.c to make sure
* it is always at least EVP_MAX_MD_SIZE. We define our own value
* for the same reason as above.
*/
#define MAX_HMAC_KEY_LENGTH 64
/**
* Return message digest parameters, based on the given digest name. The
* contents of these parameters are library-specific, and can be used to
* initialise HMAC or message digest operations.
*
* @param digest Name of the digest to retrieve parameters for (e.g.
* \c MD5).
*
* @return A statically allocated structure containing parameters
* for the given message digest.
*/
const md_kt_t * md_kt_get (const char *digest);
/**
* Retrieve a string describing the digest digest (e.g. \c SHA1).
*
* @param kt Static message digest parameters
*
* @return Statically allocated string describing the message
* digest.
*/
const char * md_kt_name (const md_kt_t *kt);
/**
* Returns the size of the message digest, in bytes.
*
* @param kt Static message digest parameters
*
* @return Message digest size, in bytes, or 0 if ctx was NULL.
*/
int md_kt_size (const md_kt_t *kt);
/*
*
* Generic message digest functions
*
*/
/*
* Calculates the message digest for the given buffer.
*
* @param kt Static message digest parameters
* @param src Buffer to digest. May not be NULL.
* @param src_len The length of the incoming buffer.
* @param dst Buffer to write the message digest to. May not be NULL.
*
* @return \c 1 on success, \c 0 on failure
*/
int md_full (const md_kt_t *kt, const uint8_t *src, int src_len, uint8_t *dst);
/*
* Initialises the given message digest context.
*
* @param ctx Message digest context
* @param kt Static message digest parameters
*/
void md_ctx_init (md_ctx_t *ctx, const md_kt_t *kt);
/*
* Free the given message digest context.
*
* @param ctx Message digest context
*/
void md_ctx_cleanup(md_ctx_t *ctx);
/*
* Returns the size of the message digest output by the given context
*
* @param ctx Message digest context.
*
* @return Size of the message digest, or \0 if ctx is NULL.
*/
int md_ctx_size (const md_ctx_t *ctx);
/*
* Process the given data for use in the message digest.
*
* @param ctx Message digest context. May not be NULL.
* @param src Buffer to digest. May not be NULL.
* @param src_len The length of the incoming buffer.
*/
void md_ctx_update (md_ctx_t *ctx, const uint8_t *src, int src_len);
/*
* Output the message digest to the given buffer.
*
* @param ctx Message digest context. May not be NULL.
* @param dst Buffer to write the message digest to. May not be NULL.
*/
void md_ctx_final (md_ctx_t *ctx, uint8_t *dst);
/*
*
* Generic HMAC functions
*
*/
/*
* Initialises the given HMAC context, using the given digest
* and key.
*
* @param ctx HMAC context to intialise
* @param key The key to use for the HMAC
* @param key_len The key length to use
* @param kt Static message digest parameters
*
*/
void hmac_ctx_init (hmac_ctx_t *ctx, const uint8_t *key, int key_length,
const md_kt_t *kt);
/*
* Free the given HMAC context.
*
* @param ctx HMAC context
*/
void hmac_ctx_cleanup(hmac_ctx_t *ctx);
/*
* Returns the size of the HMAC output by the given HMAC Context
*
* @param ctx HMAC context.
*
* @return Size of the HMAC, or \0 if ctx is NULL.
*/
int hmac_ctx_size (const hmac_ctx_t *ctx);
/*
* Resets the given HMAC context, preserving the associated key information
*
* @param ctx HMAC context. May not be NULL.
*/
void hmac_ctx_reset (hmac_ctx_t *ctx);
/*
* Process the given data for use in the HMAC.
*
* @param ctx HMAC context. May not be NULL.
* @param src The buffer to HMAC. May not be NULL.
* @param src_len The length of the incoming buffer.
*/
void hmac_ctx_update (hmac_ctx_t *ctx, const uint8_t *src, int src_len);
/*
* Output the HMAC to the given buffer.
*
* @param ctx HMAC context. May not be NULL.
* @param dst buffer to write the HMAC to. May not be NULL.
*/
void hmac_ctx_final (hmac_ctx_t *ctx, uint8_t *dst);
#endif /* CRYPTO_BACKEND_H_ */
|