2 This header file is an extension to ANSI/POSIX
8 #pragma src "/sys/src/ape/lib/sec"
9 #pragma lib "/$M/lib/ape/libsec.a"
14 typedef struct mpint mpint;
28 typedef struct AESstate AESstate;
34 uchar key[AESmaxkey]; /* unexpanded key */
35 ulong ekey[4*(AESmaxrounds + 1)]; /* encryption key */
36 ulong dkey[4*(AESmaxrounds + 1)]; /* decryption key */
37 uchar ivec[AESbsize]; /* initialization vector */
38 uchar mackey[3 * AESbsize]; /* 3 XCBC mac 96 keys */
42 void aes_encrypt(ulong rk[], int Nr, uchar pt[16], uchar ct[16]);
43 void aes_decrypt(ulong rk[], int Nr, uchar ct[16], uchar pt[16]);
45 void setupAESstate(AESstate *s, uchar key[], int keybytes, uchar *ivec);
46 void aesCBCencrypt(uchar *p, int len, AESstate *s);
47 void aesCBCdecrypt(uchar *p, int len, AESstate *s);
49 void setupAESXCBCstate(AESstate *s);
50 uchar* aesXCBCmac(uchar *p, int len, AESstate *s);
52 typedef struct AESGCMstate AESGCMstate;
61 void setupAESGCMstate(AESGCMstate *s, uchar *key, int keylen, uchar *iv, int ivlen);
62 void aesgcm_setiv(AESGCMstate *s, uchar *iv, int ivlen);
63 void aesgcm_encrypt(uchar *dat, ulong ndat, uchar *aad, ulong naad, uchar tag[16], AESGCMstate *s);
64 int aesgcm_decrypt(uchar *dat, ulong ndat, uchar *aad, ulong naad, uchar tag[16], AESGCMstate *s);
67 * Blowfish Definitions
76 /* 16-round Blowfish */
77 typedef struct BFstate BFstate;
85 u32int pbox[BFrounds+2];
89 void setupBFstate(BFstate *s, uchar key[], int keybytes, uchar *ivec);
90 void bfCBCencrypt(uchar*, int, BFstate*);
91 void bfCBCdecrypt(uchar*, int, BFstate*);
92 void bfECBencrypt(uchar*, int, BFstate*);
93 void bfECBdecrypt(uchar*, int, BFstate*);
106 typedef struct Chachastate Chachastate;
122 void setupChachastate(Chachastate*, uchar*, ulong, uchar*, ulong, int);
123 void chacha_setiv(Chachastate *, uchar*);
124 void chacha_setblock(Chachastate*, u64int);
125 void chacha_encrypt(uchar*, ulong, Chachastate*);
126 void chacha_encrypt2(uchar*, uchar*, ulong, Chachastate*);
128 void ccpoly_encrypt(uchar *dat, ulong ndat, uchar *aad, ulong naad, uchar tag[16], Chachastate *cs);
129 int ccpoly_decrypt(uchar *dat, ulong ndat, uchar *aad, ulong naad, uchar tag[16], Chachastate *cs);
142 typedef struct Salsastate Salsastate;
151 void setupSalsastate(Salsastate*, uchar*, ulong, uchar*, ulong, int);
152 void salsa_setiv(Salsastate*, uchar*);
153 void salsa_setblock(Salsastate*, u64int);
154 void salsa_encrypt(uchar*, ulong, Salsastate*);
155 void salsa_encrypt2(uchar*, uchar*, ulong, Salsastate*);
157 void hsalsa(uchar h[32], uchar *key, ulong keylen, uchar nonce[16], int rounds);
169 typedef struct DESstate DESstate;
173 uchar key[8]; /* unexpanded key */
174 ulong expanded[32]; /* expanded key */
175 uchar ivec[8]; /* initialization vector */
178 void setupDESstate(DESstate *s, uchar key[8], uchar *ivec);
179 void des_key_setup(uchar[8], ulong[32]);
180 void block_cipher(ulong*, uchar*, int);
181 void desCBCencrypt(uchar*, int, DESstate*);
182 void desCBCdecrypt(uchar*, int, DESstate*);
183 void desECBencrypt(uchar*, int, DESstate*);
184 void desECBdecrypt(uchar*, int, DESstate*);
186 /* for backward compatibility with 7-byte DES key format */
187 void des56to64(uchar *k56, uchar *k64);
188 void des64to56(uchar *k64, uchar *k56);
189 void key_setup(uchar[7], ulong[32]);
191 /* triple des encrypt/decrypt orderings */
201 typedef struct DES3state DES3state;
205 uchar key[3][8]; /* unexpanded key */
206 ulong expanded[3][32]; /* expanded key */
207 uchar ivec[8]; /* initialization vector */
210 void setupDES3state(DES3state *s, uchar key[3][8], uchar *ivec);
211 void triple_block_cipher(ulong keys[3][32], uchar*, int);
212 void des3CBCencrypt(uchar*, int, DES3state*);
213 void des3CBCdecrypt(uchar*, int, DES3state*);
214 void des3ECBencrypt(uchar*, int, DES3state*);
215 void des3ECBdecrypt(uchar*, int, DES3state*);
223 SHA1dlen= 20, /* SHA digest length */
224 SHA2_224dlen= 28, /* SHA-224 digest length */
225 SHA2_256dlen= 32, /* SHA-256 digest length */
226 SHA2_384dlen= 48, /* SHA-384 digest length */
227 SHA2_512dlen= 64, /* SHA-512 digest length */
228 MD4dlen= 16, /* MD4 digest length */
229 MD5dlen= 16, /* MD5 digest length */
230 Poly1305dlen= 16, /* Poly1305 digest length */
232 Hmacblksz = 64, /* in bytes; from rfc2104 */
235 typedef struct DigestState DigestState;
248 typedef struct DigestState SHAstate; /* obsolete name */
249 typedef struct DigestState SHA1state;
250 typedef struct DigestState SHA2_224state;
251 typedef struct DigestState SHA2_256state;
252 typedef struct DigestState SHA2_384state;
253 typedef struct DigestState SHA2_512state;
254 typedef struct DigestState MD5state;
255 typedef struct DigestState MD4state;
257 DigestState* md4(uchar*, ulong, uchar*, DigestState*);
258 DigestState* md5(uchar*, ulong, uchar*, DigestState*);
259 DigestState* sha1(uchar*, ulong, uchar*, DigestState*);
260 DigestState* sha2_224(uchar*, ulong, uchar*, DigestState*);
261 DigestState* sha2_256(uchar*, ulong, uchar*, DigestState*);
262 DigestState* sha2_384(uchar*, ulong, uchar*, DigestState*);
263 DigestState* sha2_512(uchar*, ulong, uchar*, DigestState*);
264 DigestState* hmac_x(uchar *p, ulong len, uchar *key, ulong klen,
265 uchar *digest, DigestState *s,
266 DigestState*(*x)(uchar*, ulong, uchar*, DigestState*),
268 DigestState* hmac_md5(uchar*, ulong, uchar*, ulong, uchar*, DigestState*);
269 DigestState* hmac_sha1(uchar*, ulong, uchar*, ulong, uchar*, DigestState*);
270 DigestState* hmac_sha2_224(uchar*, ulong, uchar*, ulong, uchar*, DigestState*);
271 DigestState* hmac_sha2_256(uchar*, ulong, uchar*, ulong, uchar*, DigestState*);
272 DigestState* hmac_sha2_384(uchar*, ulong, uchar*, ulong, uchar*, DigestState*);
273 DigestState* hmac_sha2_512(uchar*, ulong, uchar*, ulong, uchar*, DigestState*);
274 char* md5pickle(MD5state*);
275 MD5state* md5unpickle(char*);
276 char* sha1pickle(SHA1state*);
277 SHA1state* sha1unpickle(char*);
279 DigestState* poly1305(uchar*, ulong, uchar*, ulong, uchar*, DigestState*);
282 * random number generation
284 void genrandom(uchar *buf, int nbytes);
285 void prng(uchar *buf, int nbytes);
286 ulong fastrand(void);
287 ulong nfastrand(ulong);
292 void genprime(mpint *p, int n, int accuracy); /* generate n-bit probable prime */
293 void gensafeprime(mpint *p, mpint *alpha, int n, int accuracy); /* prime & generator */
294 void genstrongprime(mpint *p, int n, int accuracy); /* generate n-bit strong prime */
295 void DSAprimes(mpint *q, mpint *p, uchar seed[SHA1dlen]);
296 int probably_prime(mpint *n, int nrep); /* miller-rabin test */
297 int smallprimetest(mpint *p); /* returns -1 if not prime, 0 otherwise */
302 typedef struct RC4state RC4state;
310 void setupRC4state(RC4state*, uchar*, int);
311 void rc4(RC4state*, uchar*, int);
312 void rc4skip(RC4state*, int);
313 void rc4back(RC4state*, int);
318 typedef struct RSApub RSApub;
319 typedef struct RSApriv RSApriv;
320 typedef struct PEMChain PEMChain;
322 /* public/encryption key */
325 mpint *n; /* modulus */
326 mpint *ek; /* exp (encryption key) */
329 /* private/decryption key */
334 mpint *dk; /* exp (decryption key) */
336 /* precomputed values to help with chinese remainder theorem calc */
339 mpint *kp; /* dk mod p-1 */
340 mpint *kq; /* dk mod q-1 */
341 mpint *c2; /* (inv p) mod q */
350 RSApriv* rsagen(int nlen, int elen, int rounds);
351 RSApriv* rsafill(mpint *n, mpint *e, mpint *d, mpint *p, mpint *q);
352 mpint* rsaencrypt(RSApub *k, mpint *in, mpint *out);
353 mpint* rsadecrypt(RSApriv *k, mpint *in, mpint *out);
354 RSApub* rsapuballoc(void);
355 void rsapubfree(RSApub*);
356 RSApriv* rsaprivalloc(void);
357 void rsaprivfree(RSApriv*);
358 RSApub* rsaprivtopub(RSApriv*);
359 RSApub* X509toRSApub(uchar*, int, char*, int);
360 RSApriv* asn1toRSApriv(uchar*, int);
361 void asn1dump(uchar *der, int len);
362 uchar* decodePEM(char *s, char *type, int *len, char **new_s);
363 PEMChain* decodepemchain(char *s, char *type);
364 uchar* X509rsagen(RSApriv *priv, char *subj, ulong valid[2], int *certlen);
365 uchar* X509rsareq(RSApriv *priv, char *subj, int *certlen);
366 char* X509rsaverifydigest(uchar *sig, int siglen, uchar *edigest, int edigestlen, RSApub *pk);
367 char* X509rsaverify(uchar *cert, int ncert, RSApub *pk);
369 void X509dump(uchar *cert, int ncert);
374 typedef struct EGpub EGpub;
375 typedef struct EGpriv EGpriv;
376 typedef struct EGsig EGsig;
378 /* public/encryption key */
381 mpint *p; /* modulus */
382 mpint *alpha; /* generator */
383 mpint *key; /* (encryption key) alpha**secret mod p */
386 /* private/decryption key */
390 mpint *secret; /* (decryption key) */
399 EGpriv* eggen(int nlen, int rounds);
400 mpint* egencrypt(EGpub *k, mpint *in, mpint *out); /* deprecated */
401 mpint* egdecrypt(EGpriv *k, mpint *in, mpint *out);
402 EGsig* egsign(EGpriv *k, mpint *m);
403 int egverify(EGpub *k, EGsig *sig, mpint *m);
404 EGpub* egpuballoc(void);
405 void egpubfree(EGpub*);
406 EGpriv* egprivalloc(void);
407 void egprivfree(EGpriv*);
408 EGsig* egsigalloc(void);
409 void egsigfree(EGsig*);
410 EGpub* egprivtopub(EGpriv*);
415 typedef struct DSApub DSApub;
416 typedef struct DSApriv DSApriv;
417 typedef struct DSAsig DSAsig;
419 /* public/encryption key */
422 mpint *p; /* modulus */
423 mpint *q; /* group order, q divides p-1 */
424 mpint *alpha; /* group generator */
425 mpint *key; /* (encryption key) alpha**secret mod p */
428 /* private/decryption key */
432 mpint *secret; /* (decryption key) */
441 DSApriv* dsagen(DSApub *opub); /* opub not checked for consistency! */
442 DSAsig* dsasign(DSApriv *k, mpint *m);
443 int dsaverify(DSApub *k, DSAsig *sig, mpint *m);
444 DSApub* dsapuballoc(void);
445 void dsapubfree(DSApub*);
446 DSApriv* dsaprivalloc(void);
447 void dsaprivfree(DSApriv*);
448 DSAsig* dsasigalloc(void);
449 void dsasigfree(DSAsig*);
450 DSApub* dsaprivtopub(DSApriv*);
451 DSApriv* asn1toDSApriv(uchar*, int);
456 typedef struct Thumbprint{
457 struct Thumbprint *next;
458 uchar sha1[SHA1dlen];
461 typedef struct TLSconn{
462 char dir[40]; /* connection directory */
463 uchar *cert; /* certificate (local on input, remote on output) */
469 int (*trace)(char*fmt, ...);
470 PEMChain*chain; /* optional extra certificate evidence for servers to present */
480 int tlsClient(int fd, TLSconn *c);
481 int tlsServer(int fd, TLSconn *c);
484 Thumbprint* initThumbprints(char *ok, char *crl);
485 void freeThumbprints(Thumbprint *ok);
486 int okThumbprint(uchar *sha1, Thumbprint *ok);
489 uchar *readcert(char *filename, int *pcertlen);
490 PEMChain*readcertchain(char *filename);
493 int aes_xts_encrypt(ulong tweak[], ulong ecb[], vlong sectorNumber, uchar *input, uchar *output, ulong len) ;
494 int aes_xts_decrypt(ulong tweak[], ulong ecb[], vlong sectorNumber, uchar *input, uchar *output, ulong len);
496 typedef struct ECpoint{
500 mpint *z; /* nil when using affine coordinates */
503 typedef ECpoint ECpub;
504 typedef struct ECpriv{
509 typedef struct ECdomain{
518 void ecdominit(ECdomain *, void (*init)(mpint *p, mpint *a, mpint *b, mpint *x, mpint *y, mpint *n, mpint *h));
519 void ecdomfree(ECdomain *);
521 void ecassign(ECdomain *, ECpoint *old, ECpoint *new);
522 void ecadd(ECdomain *, ECpoint *a, ECpoint *b, ECpoint *s);
523 void ecmul(ECdomain *, ECpoint *a, mpint *k, ECpoint *s);
524 ECpoint* strtoec(ECdomain *, char *, char **, ECpoint *);
525 ECpriv* ecgen(ECdomain *, ECpriv*);
526 int ecverify(ECdomain *, ECpoint *);
527 int ecpubverify(ECdomain *, ECpub *);
528 void ecdsasign(ECdomain *, ECpriv *, uchar *, int, mpint *, mpint *);
529 int ecdsaverify(ECdomain *, ECpub *, uchar *, int, mpint *, mpint *);
530 void base58enc(uchar *, char *, int);
531 int base58dec(char *, uchar *, int);
533 ECpub* ecdecodepub(ECdomain *dom, uchar *, int);
534 int ecencodepub(ECdomain *dom, ECpub *, uchar *, int);
535 void ecpubfree(ECpub *);
537 ECpub* X509toECpub(uchar *cert, int ncert, ECdomain *dom);
538 char* X509ecdsaverifydigest(uchar *sig, int siglen, uchar *edigest, int edigestlen, ECdomain *dom, ECpub *pub);
539 char* X509ecdsaverify(uchar *sig, int siglen, ECdomain *dom, ECpub *pub);
542 void secp256r1(mpint *p, mpint *a, mpint *b, mpint *x, mpint *y, mpint *n, mpint *h);
543 void secp256k1(mpint *p, mpint *a, mpint *b, mpint *x, mpint *y, mpint *n, mpint *h);
545 DigestState* ripemd160(uchar *, ulong, uchar *, DigestState *);
548 * Diffie-Hellman key exchange
551 typedef struct DHstate DHstate;
554 mpint *g; /* base g */
555 mpint *p; /* large prime */
556 mpint *q; /* subgroup prime */
557 mpint *x; /* random secret */
558 mpint *y; /* public key y = g**x % p */
561 /* generate new public key: y = g**x % p */
562 mpint* dh_new(DHstate *dh, mpint *p, mpint *q, mpint *g);
564 /* calculate shared key: k = y**x % p */
565 mpint* dh_finish(DHstate *dh, mpint *y);
567 /* Curve25519 elliptic curve, public key function */
568 void curve25519(uchar mypublic[32], uchar secret[32], uchar basepoint[32]);
570 /* Curve25519 diffie hellman */
571 void curve25519_dh_new(uchar x[32], uchar y[32]);
572 void curve25519_dh_finish(uchar x[32], uchar y[32], uchar z[32]);
574 /* password-based key derivation function 2 (rfc2898) */
575 void pbkdf2_x(uchar *p, ulong plen, uchar *s, ulong slen, ulong rounds, uchar *d, ulong dlen,
576 DigestState* (*x)(uchar*, ulong, uchar*, ulong, uchar*, DigestState*), int xlen);
578 /* hmac-based key derivation function (rfc5869) */
579 void hkdf_x(uchar *salt, ulong nsalt, uchar *info, ulong ninfo, uchar *key, ulong nkey, uchar *d, ulong dlen,
580 DigestState* (*x)(uchar*, ulong, uchar*, ulong, uchar*, DigestState*), int xlen);
582 /* timing safe memcmp() */
583 int tsmemcmp(void*, void*, ulong);