2023-08-13 11:27:16 +00:00
|
|
|
#include "crypto.h"
|
|
|
|
#include "neatvnc.h"
|
2023-08-15 22:56:42 +00:00
|
|
|
#include "vec.h"
|
2023-08-13 11:27:16 +00:00
|
|
|
|
|
|
|
#include <gmp.h>
|
|
|
|
#include <nettle/base64.h>
|
|
|
|
#include <nettle/base16.h>
|
|
|
|
#include <nettle/aes.h>
|
2023-08-15 21:41:11 +00:00
|
|
|
#include <nettle/eax.h>
|
2023-08-13 11:27:16 +00:00
|
|
|
#include <nettle/md5.h>
|
2023-08-15 21:41:11 +00:00
|
|
|
#include <nettle/sha1.h>
|
|
|
|
#include <nettle/rsa.h>
|
2023-08-13 11:27:16 +00:00
|
|
|
|
|
|
|
#include <stdint.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <stdbool.h>
|
2023-08-15 21:41:11 +00:00
|
|
|
#include <string.h>
|
|
|
|
#include <sys/param.h>
|
2023-08-15 22:56:42 +00:00
|
|
|
#include <arpa/inet.h>
|
2023-08-13 11:27:16 +00:00
|
|
|
|
|
|
|
// TODO: This is linux specific
|
|
|
|
#include <sys/random.h>
|
|
|
|
|
2023-08-15 22:56:42 +00:00
|
|
|
#define UDIV_UP(a, b) (((a) + (b) - 1) / (b))
|
|
|
|
|
|
|
|
struct vec;
|
|
|
|
|
2023-08-13 11:27:16 +00:00
|
|
|
struct crypto_key {
|
|
|
|
int g;
|
|
|
|
mpz_t p;
|
|
|
|
mpz_t q;
|
|
|
|
};
|
|
|
|
|
2023-08-15 21:41:11 +00:00
|
|
|
struct crypto_aes_eax {
|
|
|
|
struct eax_aes128_ctx ctx;
|
|
|
|
uint64_t count[2];
|
|
|
|
};
|
|
|
|
|
2023-08-13 11:27:16 +00:00
|
|
|
struct crypto_cipher {
|
|
|
|
union {
|
|
|
|
struct aes128_ctx aes128_ecb;
|
2023-08-15 21:41:11 +00:00
|
|
|
struct crypto_aes_eax aes_eax;
|
2023-08-13 11:27:16 +00:00
|
|
|
} enc_ctx;
|
|
|
|
|
|
|
|
union {
|
|
|
|
struct aes128_ctx aes128_ecb;
|
2023-08-15 21:41:11 +00:00
|
|
|
struct crypto_aes_eax aes_eax;
|
2023-08-13 11:27:16 +00:00
|
|
|
} dec_ctx;
|
|
|
|
|
2023-08-15 21:41:11 +00:00
|
|
|
const uint8_t* ad;
|
|
|
|
size_t ad_len;
|
|
|
|
|
|
|
|
uint8_t mac[16];
|
|
|
|
|
2023-08-15 22:56:42 +00:00
|
|
|
uint8_t read_buffer[65536];
|
|
|
|
uint8_t read_buffer_len;
|
|
|
|
|
2023-09-03 22:30:10 +00:00
|
|
|
bool (*encrypt)(struct crypto_cipher*, struct vec* dst, uint8_t* mac,
|
|
|
|
const uint8_t* src, size_t src_len, const uint8_t* ad,
|
|
|
|
size_t ad_len);
|
|
|
|
ssize_t (*decrypt)(struct crypto_cipher*, uint8_t* dst, uint8_t* mac,
|
|
|
|
const uint8_t* src, size_t src_len, const uint8_t* ad,
|
|
|
|
size_t ad_len);
|
2023-08-13 11:27:16 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
struct crypto_hash {
|
|
|
|
union {
|
|
|
|
struct md5_ctx md5;
|
2023-08-15 21:41:11 +00:00
|
|
|
struct sha1_ctx sha1;
|
2023-08-13 11:27:16 +00:00
|
|
|
} ctx;
|
|
|
|
|
|
|
|
void (*update)(void* ctx, size_t len, const uint8_t* src);
|
|
|
|
void (*digest)(void* ctx, size_t len, uint8_t* dst);
|
|
|
|
};
|
|
|
|
|
2023-08-15 21:41:11 +00:00
|
|
|
struct crypto_rsa_pub_key {
|
|
|
|
struct rsa_public_key key;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct crypto_rsa_priv_key {
|
|
|
|
struct rsa_private_key key;
|
|
|
|
};
|
|
|
|
|
2023-08-13 11:27:16 +00:00
|
|
|
void crypto_dump_base64(const char* msg, const uint8_t* bytes, size_t len)
|
|
|
|
{
|
|
|
|
struct base64_encode_ctx ctx = {};
|
|
|
|
size_t buflen = BASE64_ENCODE_LENGTH(len);
|
2023-08-15 21:41:11 +00:00
|
|
|
char* buffer = malloc(buflen + BASE64_ENCODE_FINAL_LENGTH + 1);
|
2023-08-13 11:27:16 +00:00
|
|
|
assert(buffer);
|
|
|
|
nettle_base64_encode_init(&ctx);
|
2023-08-15 21:41:11 +00:00
|
|
|
size_t count = nettle_base64_encode_update(&ctx, buffer, len, bytes);
|
|
|
|
count += nettle_base64_encode_final(&ctx, buffer + count);
|
|
|
|
buffer[count] = '\0';
|
|
|
|
|
|
|
|
nvnc_log(NVNC_LOG_DEBUG, "%s: %s", msg, buffer);
|
|
|
|
free(buffer);
|
|
|
|
}
|
|
|
|
|
|
|
|
void crypto_dump_base16(const char* msg, const uint8_t* bytes, size_t len)
|
|
|
|
{
|
|
|
|
size_t buflen = BASE16_ENCODE_LENGTH(len);
|
|
|
|
char* buffer = calloc(1, buflen + 1);
|
|
|
|
assert(buffer);
|
|
|
|
nettle_base16_encode_update(buffer, len, bytes);
|
2023-08-13 11:27:16 +00:00
|
|
|
|
|
|
|
nvnc_log(NVNC_LOG_DEBUG, "%s: %s", msg, buffer);
|
|
|
|
free(buffer);
|
|
|
|
}
|
|
|
|
|
2023-08-15 21:41:11 +00:00
|
|
|
void crypto_random(uint8_t* dst, size_t len)
|
|
|
|
{
|
|
|
|
getrandom(dst, len, 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void crypto_import(mpz_t n, const uint8_t* src, size_t len)
|
|
|
|
{
|
|
|
|
int order = 1;
|
|
|
|
int unit_size = 1;
|
|
|
|
int endian = 1;
|
|
|
|
int skip_bits = 0;
|
|
|
|
|
|
|
|
mpz_import(n, len, order, unit_size, endian, skip_bits, src);
|
|
|
|
}
|
|
|
|
|
2023-08-13 11:27:16 +00:00
|
|
|
struct crypto_key *crypto_key_new(int g, const uint8_t* p, uint32_t p_len,
|
|
|
|
const uint8_t* q, uint32_t q_len)
|
|
|
|
{
|
|
|
|
struct crypto_key* self = calloc(1, sizeof(*self));
|
|
|
|
if (!self)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
self->g = g;
|
|
|
|
|
|
|
|
mpz_init(self->p);
|
2023-08-15 21:41:11 +00:00
|
|
|
crypto_import(self->p, p, p_len);
|
2023-08-13 11:27:16 +00:00
|
|
|
|
|
|
|
mpz_init(self->q);
|
2023-08-15 21:41:11 +00:00
|
|
|
crypto_import(self->q, q, q_len);
|
2023-08-13 11:27:16 +00:00
|
|
|
|
|
|
|
return self;
|
|
|
|
}
|
|
|
|
|
|
|
|
void crypto_key_del(struct crypto_key* key)
|
|
|
|
{
|
|
|
|
mpz_clear(key->q);
|
|
|
|
mpz_clear(key->p);
|
|
|
|
free(key);
|
|
|
|
}
|
|
|
|
|
|
|
|
int crypto_key_g(const struct crypto_key* key)
|
|
|
|
{
|
|
|
|
return key->g;
|
|
|
|
}
|
|
|
|
|
2023-08-15 21:41:11 +00:00
|
|
|
static size_t crypto_export(uint8_t* dst, size_t dst_size, const mpz_t n)
|
2023-08-13 11:27:16 +00:00
|
|
|
{
|
|
|
|
int order = 1; // msb first
|
|
|
|
int unit_size = 1; // byte
|
|
|
|
int endian = 1; // msb first
|
|
|
|
int skip_bits = 0;
|
|
|
|
|
2023-08-15 21:41:11 +00:00
|
|
|
size_t bitsize = mpz_sizeinbase(n, 2);
|
|
|
|
size_t bytesize = (bitsize + 7) / 8;
|
2023-08-13 11:27:16 +00:00
|
|
|
|
2023-08-15 21:41:11 +00:00
|
|
|
assert(bytesize <= dst_size);
|
|
|
|
|
2023-08-15 22:56:42 +00:00
|
|
|
memset(dst, 0, dst_size);
|
2023-08-15 21:41:11 +00:00
|
|
|
mpz_export(dst + dst_size - bytesize, &bytesize, order, unit_size,
|
|
|
|
endian, skip_bits, n);
|
|
|
|
|
|
|
|
return bytesize;
|
2023-08-13 11:27:16 +00:00
|
|
|
}
|
|
|
|
|
2023-08-15 21:41:11 +00:00
|
|
|
uint32_t crypto_key_p(const struct crypto_key* key, uint8_t* dst,
|
2023-08-13 11:27:16 +00:00
|
|
|
uint32_t dst_size)
|
|
|
|
{
|
2023-08-15 21:41:11 +00:00
|
|
|
return crypto_export(dst, dst_size, key->p);
|
|
|
|
}
|
2023-08-13 11:27:16 +00:00
|
|
|
|
2023-08-15 21:41:11 +00:00
|
|
|
uint32_t crypto_key_q(const struct crypto_key* key, uint8_t* dst,
|
|
|
|
uint32_t dst_size)
|
|
|
|
{
|
|
|
|
return crypto_export(dst, dst_size, key->q);
|
2023-08-13 11:27:16 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void initialise_p(mpz_t p)
|
|
|
|
{
|
|
|
|
// RFC 3526, section 3
|
|
|
|
static const char s[] =
|
|
|
|
"FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD1"
|
|
|
|
"29024E088A67CC74020BBEA63B139B22514A08798E3404DD"
|
|
|
|
"EF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245"
|
|
|
|
"E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED"
|
|
|
|
"EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3D"
|
|
|
|
"C2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F"
|
|
|
|
"83655D23DCA3AD961C62F356208552BB9ED529077096966D"
|
|
|
|
"670C354E4ABC9804F1746C08CA18217C32905E462E36CE3B"
|
|
|
|
"E39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9"
|
|
|
|
"DE2BCBF6955817183995497CEA956AE515D2261898FA0510"
|
|
|
|
"15728E5A8AACAA68FFFFFFFFFFFFFFFF";
|
|
|
|
|
|
|
|
char buf[256];
|
|
|
|
size_t len = 0;
|
|
|
|
struct base16_decode_ctx ctx;
|
|
|
|
nettle_base16_decode_init(&ctx);
|
|
|
|
nettle_base16_decode_update(&ctx, &len, (uint8_t*)buf, sizeof(s) - 1, s);
|
|
|
|
nettle_base16_decode_final(&ctx);
|
|
|
|
assert(len == sizeof(buf));
|
|
|
|
|
2023-08-15 21:41:11 +00:00
|
|
|
crypto_import(p, (const uint8_t*)buf, sizeof(buf));
|
2023-08-13 11:27:16 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void generate_random(mpz_t n)
|
|
|
|
{
|
|
|
|
uint8_t buf[256];
|
|
|
|
getrandom(buf, sizeof(buf), 0);
|
2023-08-15 21:41:11 +00:00
|
|
|
crypto_import(n, buf, sizeof(buf));
|
2023-08-13 11:27:16 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
struct crypto_key* crypto_keygen(void)
|
|
|
|
{
|
|
|
|
struct crypto_key* self = calloc(1, sizeof(*self));
|
|
|
|
if (!self)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
self->g = 2;
|
|
|
|
|
|
|
|
mpz_init(self->p);
|
|
|
|
initialise_p(self->p);
|
|
|
|
|
|
|
|
mpz_init(self->q);
|
|
|
|
generate_random(self->q);
|
|
|
|
|
|
|
|
return self;
|
|
|
|
}
|
|
|
|
|
|
|
|
struct crypto_key* crypto_derive_public_key(const struct crypto_key* priv)
|
|
|
|
{
|
|
|
|
struct crypto_key* pub = calloc(1, sizeof(*pub));
|
|
|
|
if (!pub)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
pub->g = priv->g;
|
|
|
|
mpz_set(pub->p, priv->p);
|
|
|
|
mpz_init(pub->q);
|
|
|
|
|
|
|
|
mpz_t g;
|
|
|
|
mpz_init(g);
|
|
|
|
mpz_set_ui(g, priv->g);
|
|
|
|
|
|
|
|
mpz_powm_sec(pub->q, g, priv->q, priv->p);
|
|
|
|
mpz_clear(g);
|
|
|
|
|
|
|
|
return pub;
|
|
|
|
}
|
|
|
|
|
|
|
|
struct crypto_key* crypto_derive_shared_secret(
|
|
|
|
const struct crypto_key* own_secret,
|
|
|
|
const struct crypto_key* remote_public_key)
|
|
|
|
{
|
|
|
|
if (own_secret->g != remote_public_key->g) {
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (mpz_cmp(own_secret->p, remote_public_key->p) != 0) {
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
struct crypto_key* shared = calloc(1, sizeof(*shared));
|
|
|
|
if (!shared)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
shared->g = own_secret->g;
|
|
|
|
mpz_set(shared->p, own_secret->p);
|
|
|
|
|
|
|
|
mpz_t g;
|
|
|
|
mpz_init(g);
|
|
|
|
mpz_set_ui(g, own_secret->g);
|
|
|
|
|
|
|
|
mpz_powm_sec(shared->q, remote_public_key->q, own_secret->q,
|
|
|
|
own_secret->p);
|
|
|
|
mpz_clear(g);
|
|
|
|
|
|
|
|
return shared;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool crypto_cipher_aes128_ecb_encrypt(struct crypto_cipher* self,
|
2023-09-03 22:30:10 +00:00
|
|
|
struct vec* dst, uint8_t* mac, const uint8_t* src,
|
|
|
|
size_t len, const uint8_t* ad, size_t ad_len)
|
2023-08-13 11:27:16 +00:00
|
|
|
{
|
2023-09-03 22:30:10 +00:00
|
|
|
vec_reserve(dst, dst->len + len);
|
2023-08-15 22:56:42 +00:00
|
|
|
aes128_encrypt(&self->enc_ctx.aes128_ecb, len, dst->data, src);
|
|
|
|
dst->len = len;
|
2023-08-13 11:27:16 +00:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2023-08-15 22:56:42 +00:00
|
|
|
static ssize_t crypto_cipher_aes128_ecb_decrypt(struct crypto_cipher* self,
|
2023-09-03 22:30:10 +00:00
|
|
|
uint8_t* dst, uint8_t* mac, const uint8_t* src, size_t len,
|
|
|
|
const uint8_t* ad, size_t ad_len)
|
2023-08-13 11:27:16 +00:00
|
|
|
{
|
|
|
|
aes128_decrypt(&self->dec_ctx.aes128_ecb, len, dst, src);
|
2023-08-15 22:56:42 +00:00
|
|
|
return len;
|
2023-08-13 11:27:16 +00:00
|
|
|
}
|
|
|
|
|
2023-08-15 21:41:11 +00:00
|
|
|
static struct crypto_cipher* crypto_cipher_new_aes128_ecb(
|
|
|
|
const uint8_t* enc_key, const uint8_t* dec_key)
|
2023-08-13 11:27:16 +00:00
|
|
|
{
|
|
|
|
struct crypto_cipher* self = calloc(1, sizeof(*self));
|
|
|
|
if (!self)
|
|
|
|
return NULL;
|
|
|
|
|
2023-08-15 21:41:11 +00:00
|
|
|
if (enc_key)
|
|
|
|
aes128_set_encrypt_key(&self->enc_ctx.aes128_ecb, enc_key);
|
|
|
|
|
|
|
|
if (dec_key)
|
|
|
|
aes128_set_decrypt_key(&self->enc_ctx.aes128_ecb, dec_key);
|
2023-08-13 11:27:16 +00:00
|
|
|
|
|
|
|
self->encrypt = crypto_cipher_aes128_ecb_encrypt;
|
|
|
|
self->decrypt = crypto_cipher_aes128_ecb_decrypt;
|
|
|
|
|
|
|
|
return self;
|
|
|
|
}
|
|
|
|
|
2023-08-15 21:41:11 +00:00
|
|
|
static void crypto_aes_eax_update_nonce(struct crypto_aes_eax* self)
|
|
|
|
{
|
|
|
|
#if __BYTE_ORDER__ == __ORDER_LITTLE_ENDIAN__
|
|
|
|
nettle_eax_aes128_set_nonce(&self->ctx, 16, (const uint8_t*)self->count);
|
|
|
|
#else
|
|
|
|
uint64_t c[2];
|
|
|
|
c[0] = __builtin_bswap64(self->count[0]);
|
|
|
|
c[1] = __builtin_bswap64(self->count[1]);
|
|
|
|
nettle_eax_aes128_set_nonce(&self->ctx, 16, (const uint8_t*)c);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
if (++self->count[0] == 0)
|
|
|
|
++self->count[1];
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool crypto_cipher_aes_eax_encrypt(struct crypto_cipher* self,
|
2023-09-03 22:30:10 +00:00
|
|
|
struct vec* dst, uint8_t* mac, const uint8_t* src,
|
|
|
|
size_t src_len, const uint8_t* ad, size_t ad_len)
|
2023-08-15 21:41:11 +00:00
|
|
|
{
|
2023-09-03 22:30:10 +00:00
|
|
|
vec_reserve(dst, dst->len + src_len);
|
|
|
|
|
|
|
|
crypto_aes_eax_update_nonce(&self->enc_ctx.aes_eax);
|
|
|
|
nettle_eax_aes128_update(&self->enc_ctx.aes_eax.ctx, ad_len,
|
|
|
|
(uint8_t*)ad);
|
|
|
|
nettle_eax_aes128_encrypt(&self->enc_ctx.aes_eax.ctx, src_len,
|
|
|
|
(uint8_t*)dst->data + dst->len, src);
|
|
|
|
dst->len += src_len;
|
2023-08-15 21:41:11 +00:00
|
|
|
|
2023-09-03 22:30:10 +00:00
|
|
|
nettle_eax_aes128_digest(&self->enc_ctx.aes_eax.ctx, 16, mac);
|
2023-08-15 22:56:42 +00:00
|
|
|
|
2023-08-15 21:41:11 +00:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2023-08-15 22:56:42 +00:00
|
|
|
static ssize_t crypto_cipher_aes_eax_decrypt(struct crypto_cipher* self,
|
2023-09-03 22:30:10 +00:00
|
|
|
uint8_t* dst, uint8_t* mac, const uint8_t* src, size_t len,
|
|
|
|
const uint8_t* ad, size_t ad_len)
|
2023-08-15 21:41:11 +00:00
|
|
|
{
|
2023-09-03 22:30:10 +00:00
|
|
|
crypto_aes_eax_update_nonce(&self->dec_ctx.aes_eax);
|
|
|
|
nettle_eax_aes128_update(&self->dec_ctx.aes_eax.ctx, ad_len, ad);
|
|
|
|
nettle_eax_aes128_decrypt(&self->dec_ctx.aes_eax.ctx, len, dst, src);
|
|
|
|
nettle_eax_aes128_digest(&self->dec_ctx.aes_eax.ctx, 16, mac);
|
|
|
|
return len;
|
2023-08-15 21:41:11 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static struct crypto_cipher* crypto_cipher_new_aes_eax(const uint8_t* enc_key,
|
|
|
|
const uint8_t* dec_key)
|
|
|
|
{
|
|
|
|
struct crypto_cipher* self = calloc(1, sizeof(*self));
|
|
|
|
if (!self)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
eax_aes128_set_key(&self->enc_ctx.aes_eax.ctx, enc_key);
|
|
|
|
eax_aes128_set_key(&self->dec_ctx.aes_eax.ctx, dec_key);
|
|
|
|
|
|
|
|
self->encrypt = crypto_cipher_aes_eax_encrypt;
|
|
|
|
self->decrypt = crypto_cipher_aes_eax_decrypt;
|
|
|
|
|
|
|
|
return self;
|
|
|
|
}
|
|
|
|
|
|
|
|
struct crypto_cipher* crypto_cipher_new(const uint8_t* enc_key,
|
|
|
|
const uint8_t* dec_key, enum crypto_cipher_type type)
|
2023-08-13 11:27:16 +00:00
|
|
|
{
|
|
|
|
switch (type) {
|
|
|
|
case CRYPTO_CIPHER_AES128_ECB:
|
2023-08-15 21:41:11 +00:00
|
|
|
return crypto_cipher_new_aes128_ecb(enc_key, dec_key);
|
|
|
|
case CRYPTO_CIPHER_AES_EAX:
|
|
|
|
return crypto_cipher_new_aes_eax(enc_key, dec_key);
|
2023-08-13 11:27:16 +00:00
|
|
|
case CRYPTO_CIPHER_INVALID:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
nvnc_log(NVNC_LOG_PANIC, "Invalid type: %d", type);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
void crypto_cipher_del(struct crypto_cipher* self)
|
|
|
|
{
|
|
|
|
free(self);
|
|
|
|
}
|
|
|
|
|
2023-08-15 22:56:42 +00:00
|
|
|
bool crypto_cipher_encrypt(struct crypto_cipher* self, struct vec* dst,
|
2023-09-03 22:30:10 +00:00
|
|
|
uint8_t* mac, const uint8_t* src, size_t src_len,
|
|
|
|
const uint8_t* ad, size_t ad_len)
|
2023-08-13 11:27:16 +00:00
|
|
|
{
|
2023-09-03 22:30:10 +00:00
|
|
|
return self->encrypt(self, dst, mac, src, src_len, ad, ad_len);
|
2023-08-13 11:27:16 +00:00
|
|
|
}
|
|
|
|
|
2023-08-15 22:56:42 +00:00
|
|
|
ssize_t crypto_cipher_decrypt(struct crypto_cipher* self, uint8_t* dst,
|
2023-09-03 22:30:10 +00:00
|
|
|
uint8_t* mac, const uint8_t* src, size_t src_len,
|
|
|
|
const uint8_t* ad, size_t ad_len)
|
2023-08-13 11:27:16 +00:00
|
|
|
{
|
2023-09-03 22:30:10 +00:00
|
|
|
return self->decrypt(self, dst, mac, src, src_len, ad, ad_len);
|
2023-08-13 11:27:16 +00:00
|
|
|
}
|
|
|
|
|
2023-08-15 21:41:11 +00:00
|
|
|
void crypto_cipher_set_ad(struct crypto_cipher* self, const uint8_t* ad,
|
|
|
|
size_t len)
|
|
|
|
{
|
|
|
|
self->ad = ad;
|
|
|
|
self->ad_len = len;
|
|
|
|
}
|
|
|
|
|
|
|
|
void crypto_cipher_get_mac(struct crypto_cipher* self, uint8_t* dst,
|
|
|
|
size_t size)
|
|
|
|
{
|
|
|
|
size_t common_size = MIN(sizeof(self->mac), size);
|
|
|
|
memcpy(dst, self->mac, common_size);
|
|
|
|
}
|
|
|
|
|
2023-08-13 11:27:16 +00:00
|
|
|
struct crypto_hash* crypto_hash_new(enum crypto_hash_type type)
|
|
|
|
{
|
|
|
|
struct crypto_hash* self = calloc(1, sizeof(*self));
|
|
|
|
if (!self)
|
|
|
|
return NULL;
|
|
|
|
|
2023-08-15 21:41:11 +00:00
|
|
|
switch (type) {
|
|
|
|
case CRYPTO_HASH_INVALID:
|
|
|
|
nvnc_log(NVNC_LOG_PANIC, "Invalid hash type");
|
|
|
|
break;
|
|
|
|
case CRYPTO_HASH_MD5:
|
|
|
|
md5_init(&self->ctx.md5);
|
|
|
|
self->update = (void*)nettle_md5_update;
|
|
|
|
self->digest = (void*)nettle_md5_digest;
|
|
|
|
break;
|
|
|
|
case CRYPTO_HASH_SHA1:
|
|
|
|
sha1_init(&self->ctx.sha1);
|
|
|
|
self->update = (void*)nettle_sha1_update;
|
|
|
|
self->digest = (void*)nettle_sha1_digest;
|
|
|
|
break;
|
|
|
|
}
|
2023-08-13 11:27:16 +00:00
|
|
|
|
|
|
|
return self;
|
|
|
|
}
|
|
|
|
|
|
|
|
void crypto_hash_del(struct crypto_hash* self)
|
|
|
|
{
|
|
|
|
free(self);
|
|
|
|
}
|
|
|
|
|
|
|
|
void crypto_hash_append(struct crypto_hash* self, const uint8_t* src,
|
|
|
|
size_t len)
|
|
|
|
{
|
|
|
|
self->update(&self->ctx, len, src);
|
|
|
|
}
|
|
|
|
|
|
|
|
void crypto_hash_digest(struct crypto_hash* self, uint8_t* dst, size_t len)
|
|
|
|
{
|
|
|
|
self->digest(&self->ctx, len, dst);
|
|
|
|
}
|
2023-08-15 21:41:11 +00:00
|
|
|
|
2023-09-04 21:40:02 +00:00
|
|
|
void crypto_hash_one(uint8_t* dst, size_t dst_len, enum crypto_hash_type type,
|
|
|
|
const uint8_t* src, size_t src_len)
|
|
|
|
{
|
|
|
|
struct crypto_hash *hash = crypto_hash_new(type);
|
|
|
|
crypto_hash_append(hash, src, src_len);
|
|
|
|
crypto_hash_digest(hash, dst, dst_len);
|
|
|
|
crypto_hash_del(hash);
|
|
|
|
}
|
|
|
|
|
|
|
|
void crypto_hash_many(uint8_t* dst, size_t dst_len, enum crypto_hash_type type,
|
|
|
|
const struct crypto_data_entry *src)
|
|
|
|
{
|
|
|
|
struct crypto_hash *hash = crypto_hash_new(type);
|
|
|
|
for (int i = 0; src[i].data && src[i].len; ++i)
|
|
|
|
crypto_hash_append(hash, src[i].data, src[i].len);
|
|
|
|
crypto_hash_digest(hash, dst, dst_len);
|
|
|
|
crypto_hash_del(hash);
|
|
|
|
}
|
|
|
|
|
2023-08-15 21:41:11 +00:00
|
|
|
struct crypto_rsa_pub_key *crypto_rsa_pub_key_new(void)
|
|
|
|
{
|
|
|
|
struct crypto_rsa_pub_key* self = calloc(1, sizeof(*self));
|
|
|
|
if (!self)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
rsa_public_key_init(&self->key);
|
|
|
|
return self;
|
|
|
|
}
|
|
|
|
|
|
|
|
void crypto_rsa_pub_key_del(struct crypto_rsa_pub_key* self)
|
|
|
|
{
|
|
|
|
rsa_public_key_clear(&self->key);
|
|
|
|
free(self);
|
|
|
|
}
|
|
|
|
|
|
|
|
struct crypto_rsa_pub_key* crypto_rsa_pub_key_import(const uint8_t* modulus,
|
|
|
|
const uint8_t* exponent, size_t size)
|
|
|
|
{
|
|
|
|
struct crypto_rsa_pub_key* self = crypto_rsa_pub_key_new();
|
|
|
|
if (!self)
|
|
|
|
return NULL;
|
|
|
|
|
2023-08-15 22:56:42 +00:00
|
|
|
rsa_public_key_init(&self->key);
|
|
|
|
mpz_init(self->key.n);
|
2023-08-15 21:41:11 +00:00
|
|
|
crypto_import(self->key.n, modulus, size);
|
2023-08-15 22:56:42 +00:00
|
|
|
mpz_init(self->key.e);
|
2023-08-15 21:41:11 +00:00
|
|
|
crypto_import(self->key.e, exponent, size);
|
2023-08-15 22:56:42 +00:00
|
|
|
rsa_public_key_prepare(&self->key);
|
2023-08-15 21:41:11 +00:00
|
|
|
|
|
|
|
return self;
|
|
|
|
}
|
|
|
|
|
|
|
|
void crypto_rsa_pub_key_modulus(const struct crypto_rsa_pub_key* key,
|
|
|
|
uint8_t* dst, size_t dst_size)
|
|
|
|
{
|
|
|
|
crypto_export(dst, dst_size, key->key.n);
|
|
|
|
}
|
|
|
|
|
|
|
|
void crypto_rsa_pub_key_exponent(const struct crypto_rsa_pub_key* key,
|
|
|
|
uint8_t* dst, size_t dst_size)
|
|
|
|
{
|
|
|
|
char* str = mpz_get_str(NULL, 16, key->key.e);
|
|
|
|
nvnc_trace("e: %s", str);
|
|
|
|
free(str);
|
|
|
|
|
|
|
|
crypto_export(dst, dst_size, key->key.e);
|
|
|
|
}
|
|
|
|
|
|
|
|
struct crypto_rsa_priv_key *crypto_rsa_priv_key_new(void)
|
|
|
|
{
|
|
|
|
struct crypto_rsa_priv_key* self = calloc(1, sizeof(*self));
|
|
|
|
if (!self)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
rsa_private_key_init(&self->key);
|
|
|
|
return self;
|
|
|
|
}
|
|
|
|
|
|
|
|
void crypto_rsa_priv_key_del(struct crypto_rsa_priv_key* self)
|
|
|
|
{
|
|
|
|
rsa_private_key_clear(&self->key);
|
|
|
|
free(self);
|
|
|
|
}
|
|
|
|
|
2023-08-15 22:56:42 +00:00
|
|
|
size_t crypto_rsa_pub_key_length(const struct crypto_rsa_pub_key* key)
|
|
|
|
{
|
|
|
|
return key->key.size;
|
|
|
|
}
|
|
|
|
|
2023-08-15 21:41:11 +00:00
|
|
|
static void generate_random_for_rsa(void* random_ctx, size_t len, uint8_t* dst)
|
|
|
|
{
|
|
|
|
getrandom(dst, len, 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool crypto_rsa_keygen(struct crypto_rsa_pub_key* pub,
|
|
|
|
struct crypto_rsa_priv_key* priv)
|
|
|
|
{
|
|
|
|
void* random_ctx = NULL;
|
|
|
|
nettle_random_func* random_func = generate_random_for_rsa;
|
|
|
|
void* progress_ctx = NULL;
|
|
|
|
nettle_progress_func* progress = NULL;
|
|
|
|
|
|
|
|
int rc = rsa_generate_keypair(&pub->key, &priv->key, random_ctx,
|
|
|
|
random_func, progress_ctx, progress, 2048, 30);
|
|
|
|
return rc != 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
ssize_t crypto_rsa_encrypt(struct crypto_rsa_pub_key* pub, uint8_t* dst,
|
|
|
|
size_t dst_size, const uint8_t* src, size_t src_size)
|
|
|
|
{
|
|
|
|
mpz_t ciphertext;
|
|
|
|
mpz_init(ciphertext);
|
|
|
|
int r = rsa_encrypt(&pub->key, NULL, generate_random_for_rsa,
|
|
|
|
src_size, src, ciphertext);
|
|
|
|
if (r == 0) {
|
|
|
|
mpz_clear(ciphertext);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
size_t len = crypto_export(dst, dst_size, ciphertext);
|
|
|
|
mpz_clear(ciphertext);
|
|
|
|
return len;
|
|
|
|
}
|
|
|
|
|
|
|
|
ssize_t crypto_rsa_decrypt(struct crypto_rsa_priv_key* priv, uint8_t* dst,
|
|
|
|
size_t dst_size, const uint8_t* src, size_t src_size)
|
|
|
|
{
|
|
|
|
mpz_t ciphertext;
|
|
|
|
mpz_init(ciphertext);
|
|
|
|
crypto_import(ciphertext, src, src_size);
|
|
|
|
int r = rsa_decrypt(&priv->key, &dst_size, dst, ciphertext);
|
|
|
|
mpz_clear(ciphertext);
|
|
|
|
return r != 0 ? (ssize_t)dst_size : -1;
|
|
|
|
}
|