2007-12-12 22:09:01 +01:00
|
|
|
/* Copyright (c) 2001, Matej Pfajfar.
|
2006-02-09 06:46:49 +01:00
|
|
|
* Copyright (c) 2001-2004, Roger Dingledine.
|
2007-12-12 22:09:01 +01:00
|
|
|
* Copyright (c) 2004-2006, Roger Dingledine, Nick Mathewson.
|
2017-03-15 21:13:17 +01:00
|
|
|
* Copyright (c) 2007-2017, The Tor Project, Inc. */
|
2002-07-24 16:02:39 +02:00
|
|
|
/* See LICENSE for licensing information */
|
|
|
|
|
2004-05-10 05:53:24 +02:00
|
|
|
/**
|
2004-05-10 09:54:13 +02:00
|
|
|
* \file crypto.h
|
2004-05-10 05:53:24 +02:00
|
|
|
*
|
2005-06-11 07:31:17 +02:00
|
|
|
* \brief Headers for crypto.c
|
2004-05-10 05:53:24 +02:00
|
|
|
**/
|
|
|
|
|
2012-10-12 18:13:10 +02:00
|
|
|
#ifndef TOR_CRYPTO_H
|
|
|
|
#define TOR_CRYPTO_H
|
2002-07-24 16:02:39 +02:00
|
|
|
|
2016-07-28 16:47:46 +02:00
|
|
|
#include "orconfig.h"
|
|
|
|
|
2002-08-22 09:30:03 +02:00
|
|
|
#include <stdio.h>
|
2006-10-01 23:59:05 +02:00
|
|
|
#include "torint.h"
|
2013-06-06 23:58:28 +02:00
|
|
|
#include "testsupport.h"
|
2015-11-25 16:30:58 +01:00
|
|
|
#include "compat.h"
|
2017-11-17 17:55:52 +01:00
|
|
|
#include "util.h"
|
2002-07-24 16:02:39 +02:00
|
|
|
|
2017-05-02 15:33:49 +02:00
|
|
|
#include "keccak-tiny/keccak-tiny.h"
|
|
|
|
|
2004-05-10 05:53:24 +02:00
|
|
|
/** Length of the output of our message digest. */
|
2004-04-03 04:40:30 +02:00
|
|
|
#define DIGEST_LEN 20
|
2009-08-20 01:21:29 +02:00
|
|
|
/** Length of the output of our second (improved) message digests. (For now
|
2012-09-22 03:55:06 +02:00
|
|
|
* this is just sha256, but it could be any other 256-bit digest.) */
|
2009-08-20 01:21:29 +02:00
|
|
|
#define DIGEST256_LEN 32
|
2015-11-18 09:37:05 +01:00
|
|
|
/** Length of the output of our 64-bit optimized message digests (SHA512). */
|
|
|
|
#define DIGEST512_LEN 64
|
2016-11-07 19:15:46 +01:00
|
|
|
/** Length of our symmetric cipher's keys of 128-bit. */
|
2004-04-03 04:40:30 +02:00
|
|
|
#define CIPHER_KEY_LEN 16
|
2016-11-07 19:15:46 +01:00
|
|
|
/** Length of our symmetric cipher's IV of 128-bit. */
|
2007-09-19 17:53:41 +02:00
|
|
|
#define CIPHER_IV_LEN 16
|
2016-11-07 19:15:46 +01:00
|
|
|
/** Length of our symmetric cipher's keys of 256-bit. */
|
|
|
|
#define CIPHER256_KEY_LEN 32
|
2004-05-10 05:53:24 +02:00
|
|
|
/** Length of our public keys. */
|
2004-05-01 22:46:28 +02:00
|
|
|
#define PK_BYTES (1024/8)
|
2004-05-10 05:53:24 +02:00
|
|
|
/** Length of our DH keys. */
|
2004-05-01 22:46:28 +02:00
|
|
|
#define DH_BYTES (1024/8)
|
2003-12-16 06:29:04 +01:00
|
|
|
|
2017-09-19 18:33:04 +02:00
|
|
|
/** Length of a sha1 message digest when encoded in base32 with trailing =
|
|
|
|
* signs removed. */
|
|
|
|
#define BASE32_DIGEST_LEN 32
|
2009-08-20 01:21:29 +02:00
|
|
|
/** Length of a sha1 message digest when encoded in base64 with trailing =
|
|
|
|
* signs removed. */
|
2005-09-18 04:18:59 +02:00
|
|
|
#define BASE64_DIGEST_LEN 27
|
2009-08-20 01:21:29 +02:00
|
|
|
/** Length of a sha256 message digest when encoded in base64 with trailing =
|
|
|
|
* signs removed. */
|
|
|
|
#define BASE64_DIGEST256_LEN 43
|
2015-11-18 09:37:05 +01:00
|
|
|
/** Length of a sha512 message digest when encoded in base64 with trailing =
|
|
|
|
* signs removed. */
|
|
|
|
#define BASE64_DIGEST512_LEN 86
|
2005-09-18 04:18:59 +02:00
|
|
|
|
2012-03-27 23:57:18 +02:00
|
|
|
/** Constant used to indicate OAEP padding for public-key encryption */
|
2004-04-03 04:40:30 +02:00
|
|
|
#define PK_PKCS1_OAEP_PADDING 60002
|
2004-03-30 21:47:32 +02:00
|
|
|
|
2004-05-10 05:53:24 +02:00
|
|
|
/** Number of bytes added for PKCS1-OAEP padding. */
|
2004-04-06 05:44:36 +02:00
|
|
|
#define PKCS1_OAEP_PADDING_OVERHEAD 42
|
|
|
|
|
2004-05-10 05:53:24 +02:00
|
|
|
/** Length of encoded public key fingerprints, including space; but not
|
2004-05-01 23:41:23 +02:00
|
|
|
* including terminating NUL. */
|
2004-05-01 22:46:28 +02:00
|
|
|
#define FINGERPRINT_LEN 49
|
2004-07-01 03:16:59 +02:00
|
|
|
/** Length of hex encoding of SHA1 digest, not including final NUL. */
|
|
|
|
#define HEX_DIGEST_LEN 40
|
2009-08-20 01:21:29 +02:00
|
|
|
/** Length of hex encoding of SHA256 digest, not including final NUL. */
|
|
|
|
#define HEX_DIGEST256_LEN 64
|
2015-11-18 09:37:05 +01:00
|
|
|
/** Length of hex encoding of SHA512 digest, not including final NUL. */
|
|
|
|
#define HEX_DIGEST512_LEN 128
|
2009-08-20 01:21:29 +02:00
|
|
|
|
|
|
|
typedef enum {
|
2009-09-16 23:01:01 +02:00
|
|
|
DIGEST_SHA1 = 0,
|
|
|
|
DIGEST_SHA256 = 1,
|
2015-11-18 09:37:05 +01:00
|
|
|
DIGEST_SHA512 = 2,
|
2015-12-18 23:15:01 +01:00
|
|
|
DIGEST_SHA3_256 = 3,
|
|
|
|
DIGEST_SHA3_512 = 4,
|
2009-08-20 01:21:29 +02:00
|
|
|
} digest_algorithm_t;
|
2015-12-18 23:15:01 +01:00
|
|
|
#define N_DIGEST_ALGORITHMS (DIGEST_SHA3_512+1)
|
2016-01-27 19:10:17 +01:00
|
|
|
#define N_COMMON_DIGEST_ALGORITHMS (DIGEST_SHA256+1)
|
2009-09-16 23:01:01 +02:00
|
|
|
|
2016-01-27 19:10:17 +01:00
|
|
|
/** A set of all the digests we commonly compute, taken on a single
|
2015-11-18 09:37:05 +01:00
|
|
|
* string. Any digests that are shorter than 512 bits are right-padded
|
2009-09-16 23:01:01 +02:00
|
|
|
* with 0 bits.
|
|
|
|
*
|
2015-11-18 09:37:05 +01:00
|
|
|
* Note that this representation wastes 44 bytes for the SHA1 case, so
|
2009-09-16 23:01:01 +02:00
|
|
|
* don't use it for anything where we need to allocate a whole bunch at
|
|
|
|
* once.
|
|
|
|
**/
|
|
|
|
typedef struct {
|
2016-01-27 19:10:17 +01:00
|
|
|
char d[N_COMMON_DIGEST_ALGORITHMS][DIGEST256_LEN];
|
2016-02-10 21:28:19 +01:00
|
|
|
} common_digests_t;
|
2004-05-01 22:46:28 +02:00
|
|
|
|
2012-01-18 21:53:30 +01:00
|
|
|
typedef struct crypto_pk_t crypto_pk_t;
|
2016-09-16 16:18:02 +02:00
|
|
|
typedef struct aes_cnt_cipher crypto_cipher_t;
|
2012-01-18 21:53:30 +01:00
|
|
|
typedef struct crypto_digest_t crypto_digest_t;
|
2015-12-18 23:31:12 +01:00
|
|
|
typedef struct crypto_xof_t crypto_xof_t;
|
2012-01-18 21:53:30 +01:00
|
|
|
typedef struct crypto_dh_t crypto_dh_t;
|
2002-07-24 16:02:39 +02:00
|
|
|
|
|
|
|
/* global state */
|
2015-11-25 16:36:34 +01:00
|
|
|
int crypto_early_init(void) ATTR_WUR;
|
2009-05-24 01:42:44 +02:00
|
|
|
int crypto_global_init(int hardwareAccel,
|
|
|
|
const char *accelName,
|
2015-11-25 16:36:34 +01:00
|
|
|
const char *accelPath) ATTR_WUR;
|
2017-03-25 11:27:50 +01:00
|
|
|
#ifdef USE_DMALLOC
|
|
|
|
int crypto_use_tor_alloc_functions(void);
|
|
|
|
#endif
|
|
|
|
|
2005-10-25 21:01:48 +02:00
|
|
|
void crypto_thread_cleanup(void);
|
2004-10-27 20:16:37 +02:00
|
|
|
int crypto_global_cleanup(void);
|
2002-07-24 16:02:39 +02:00
|
|
|
|
|
|
|
/* environment setup */
|
2015-09-15 17:09:18 +02:00
|
|
|
MOCK_DECL(crypto_pk_t *,crypto_pk_new,(void));
|
2017-11-17 17:55:52 +01:00
|
|
|
void crypto_pk_free_(crypto_pk_t *env);
|
2017-12-07 16:44:04 +01:00
|
|
|
#define crypto_pk_free(pk) FREE_AND_NULL(crypto_pk_t, crypto_pk_free_, (pk))
|
2002-07-24 16:02:39 +02:00
|
|
|
|
2015-03-14 17:40:55 +01:00
|
|
|
void crypto_set_tls_dh_prime(void);
|
2012-03-20 20:35:43 +01:00
|
|
|
crypto_cipher_t *crypto_cipher_new(const char *key);
|
2016-09-16 17:21:33 +02:00
|
|
|
crypto_cipher_t *crypto_cipher_new_with_bits(const char *key, int bits);
|
2012-03-20 20:35:43 +01:00
|
|
|
crypto_cipher_t *crypto_cipher_new_with_iv(const char *key, const char *iv);
|
2016-09-16 17:21:33 +02:00
|
|
|
crypto_cipher_t *crypto_cipher_new_with_iv_and_bits(const uint8_t *key,
|
|
|
|
const uint8_t *iv,
|
|
|
|
int bits);
|
2017-11-17 17:55:52 +01:00
|
|
|
void crypto_cipher_free_(crypto_cipher_t *env);
|
2017-12-07 16:52:55 +01:00
|
|
|
#define crypto_cipher_free(c) \
|
|
|
|
FREE_AND_NULL(crypto_cipher_t, crypto_cipher_free_, (c))
|
2002-07-24 16:02:39 +02:00
|
|
|
|
|
|
|
/* public key crypto */
|
2015-09-15 17:09:18 +02:00
|
|
|
MOCK_DECL(int, crypto_pk_generate_key_with_bits,(crypto_pk_t *env, int bits));
|
2009-09-29 06:48:45 +02:00
|
|
|
#define crypto_pk_generate_key(env) \
|
|
|
|
crypto_pk_generate_key_with_bits((env), (PK_BYTES*8))
|
2002-07-24 16:02:39 +02:00
|
|
|
|
2012-01-18 21:53:30 +01:00
|
|
|
int crypto_pk_read_private_key_from_filename(crypto_pk_t *env,
|
2005-12-14 21:40:40 +01:00
|
|
|
const char *keyfile);
|
2012-01-18 21:53:30 +01:00
|
|
|
int crypto_pk_write_public_key_to_string(crypto_pk_t *env,
|
2005-12-14 21:40:40 +01:00
|
|
|
char **dest, size_t *len);
|
2012-01-18 21:53:30 +01:00
|
|
|
int crypto_pk_write_private_key_to_string(crypto_pk_t *env,
|
2008-08-08 16:36:11 +02:00
|
|
|
char **dest, size_t *len);
|
2012-01-18 21:53:30 +01:00
|
|
|
int crypto_pk_read_public_key_from_string(crypto_pk_t *env,
|
2005-12-14 21:40:40 +01:00
|
|
|
const char *src, size_t len);
|
2012-01-18 21:53:30 +01:00
|
|
|
int crypto_pk_read_private_key_from_string(crypto_pk_t *env,
|
2011-01-10 18:07:34 +01:00
|
|
|
const char *s, ssize_t len);
|
2012-01-18 21:53:30 +01:00
|
|
|
int crypto_pk_write_private_key_to_filename(crypto_pk_t *env,
|
2005-12-14 21:40:40 +01:00
|
|
|
const char *fname);
|
2004-10-07 05:11:42 +02:00
|
|
|
|
2012-01-18 21:53:30 +01:00
|
|
|
int crypto_pk_check_key(crypto_pk_t *env);
|
2014-10-01 17:54:07 +02:00
|
|
|
int crypto_pk_cmp_keys(const crypto_pk_t *a, const crypto_pk_t *b);
|
|
|
|
int crypto_pk_eq_keys(const crypto_pk_t *a, const crypto_pk_t *b);
|
|
|
|
size_t crypto_pk_keysize(const crypto_pk_t *env);
|
2012-01-18 21:53:30 +01:00
|
|
|
int crypto_pk_num_bits(crypto_pk_t *env);
|
|
|
|
crypto_pk_t *crypto_pk_dup_key(crypto_pk_t *orig);
|
|
|
|
crypto_pk_t *crypto_pk_copy_full(crypto_pk_t *orig);
|
|
|
|
int crypto_pk_key_is_private(const crypto_pk_t *key);
|
|
|
|
int crypto_pk_public_exponent_ok(crypto_pk_t *env);
|
2002-07-24 16:02:39 +02:00
|
|
|
|
2012-01-18 21:53:30 +01:00
|
|
|
int crypto_pk_public_encrypt(crypto_pk_t *env, char *to, size_t tolen,
|
2005-05-07 07:55:06 +02:00
|
|
|
const char *from, size_t fromlen, int padding);
|
2012-01-18 21:53:30 +01:00
|
|
|
int crypto_pk_private_decrypt(crypto_pk_t *env, char *to, size_t tolen,
|
2005-05-07 07:55:06 +02:00
|
|
|
const char *from, size_t fromlen,
|
2004-11-02 03:28:51 +01:00
|
|
|
int padding, int warnOnFailure);
|
2016-12-14 02:22:34 +01:00
|
|
|
MOCK_DECL(int, crypto_pk_public_checksig,(const crypto_pk_t *env,
|
|
|
|
char *to, size_t tolen,
|
|
|
|
const char *from, size_t fromlen));
|
|
|
|
MOCK_DECL(int, crypto_pk_public_checksig_digest,(crypto_pk_t *env,
|
|
|
|
const char *data, size_t datalen,
|
|
|
|
const char *sig, size_t siglen));
|
2014-10-01 17:54:07 +02:00
|
|
|
int crypto_pk_private_sign(const crypto_pk_t *env, char *to, size_t tolen,
|
2005-05-07 07:55:06 +02:00
|
|
|
const char *from, size_t fromlen);
|
2012-01-18 21:53:30 +01:00
|
|
|
int crypto_pk_private_sign_digest(crypto_pk_t *env, char *to, size_t tolen,
|
2005-05-07 07:55:06 +02:00
|
|
|
const char *from, size_t fromlen);
|
2017-07-24 20:32:59 +02:00
|
|
|
int crypto_pk_obsolete_public_hybrid_encrypt(crypto_pk_t *env, char *to,
|
2011-01-13 20:36:41 +01:00
|
|
|
size_t tolen,
|
2005-05-07 07:55:06 +02:00
|
|
|
const char *from, size_t fromlen,
|
2004-11-02 03:28:51 +01:00
|
|
|
int padding, int force);
|
2017-07-24 20:32:59 +02:00
|
|
|
int crypto_pk_obsolete_private_hybrid_decrypt(crypto_pk_t *env, char *to,
|
2011-01-13 20:36:41 +01:00
|
|
|
size_t tolen,
|
2005-05-07 07:55:06 +02:00
|
|
|
const char *from, size_t fromlen,
|
2004-11-02 03:28:51 +01:00
|
|
|
int padding, int warnOnFailure);
|
2004-04-01 05:08:35 +02:00
|
|
|
|
2012-01-18 21:53:30 +01:00
|
|
|
int crypto_pk_asn1_encode(crypto_pk_t *pk, char *dest, size_t dest_len);
|
|
|
|
crypto_pk_t *crypto_pk_asn1_decode(const char *str, size_t len);
|
2014-12-01 17:12:05 +01:00
|
|
|
int crypto_pk_get_digest(const crypto_pk_t *pk, char *digest_out);
|
2016-02-10 21:35:46 +01:00
|
|
|
int crypto_pk_get_common_digests(crypto_pk_t *pk,
|
|
|
|
common_digests_t *digests_out);
|
2012-01-18 21:53:30 +01:00
|
|
|
int crypto_pk_get_fingerprint(crypto_pk_t *pk, char *fp_out,int add_space);
|
2014-02-26 10:44:55 +01:00
|
|
|
int crypto_pk_get_hashed_fingerprint(crypto_pk_t *pk, char *fp_out);
|
2003-05-07 04:13:23 +02:00
|
|
|
|
2015-04-25 10:23:15 +02:00
|
|
|
int crypto_pk_base64_encode(const crypto_pk_t *pk, char **priv_out);
|
|
|
|
crypto_pk_t *crypto_pk_base64_decode(const char *str, size_t len);
|
|
|
|
|
2002-07-24 16:02:39 +02:00
|
|
|
/* symmetric crypto */
|
2012-01-18 21:53:30 +01:00
|
|
|
const char *crypto_cipher_get_key(crypto_cipher_t *env);
|
2002-07-24 16:02:39 +02:00
|
|
|
|
2012-01-18 21:53:30 +01:00
|
|
|
int crypto_cipher_encrypt(crypto_cipher_t *env, char *to,
|
2005-05-07 07:55:06 +02:00
|
|
|
const char *from, size_t fromlen);
|
2012-01-18 21:53:30 +01:00
|
|
|
int crypto_cipher_decrypt(crypto_cipher_t *env, char *to,
|
2005-05-07 07:55:06 +02:00
|
|
|
const char *from, size_t fromlen);
|
2016-02-06 18:14:39 +01:00
|
|
|
void crypto_cipher_crypt_inplace(crypto_cipher_t *env, char *d, size_t len);
|
2002-07-24 16:02:39 +02:00
|
|
|
|
2012-03-20 20:35:43 +01:00
|
|
|
int crypto_cipher_encrypt_with_iv(const char *key,
|
2007-09-19 17:53:41 +02:00
|
|
|
char *to, size_t tolen,
|
|
|
|
const char *from, size_t fromlen);
|
2012-03-20 20:35:43 +01:00
|
|
|
int crypto_cipher_decrypt_with_iv(const char *key,
|
2007-09-19 17:53:41 +02:00
|
|
|
char *to, size_t tolen,
|
|
|
|
const char *from, size_t fromlen);
|
|
|
|
|
2009-09-16 23:01:01 +02:00
|
|
|
/* SHA-1 and other digests. */
|
2005-05-07 07:55:06 +02:00
|
|
|
int crypto_digest(char *digest, const char *m, size_t len);
|
2009-08-20 01:21:29 +02:00
|
|
|
int crypto_digest256(char *digest, const char *m, size_t len,
|
|
|
|
digest_algorithm_t algorithm);
|
2015-11-18 09:37:05 +01:00
|
|
|
int crypto_digest512(char *digest, const char *m, size_t len,
|
|
|
|
digest_algorithm_t algorithm);
|
2016-02-10 21:28:19 +01:00
|
|
|
int crypto_common_digests(common_digests_t *ds_out, const char *m, size_t len);
|
2013-02-22 18:53:45 +01:00
|
|
|
struct smartlist_t;
|
2014-10-01 05:36:47 +02:00
|
|
|
void crypto_digest_smartlist_prefix(char *digest_out, size_t len_out,
|
|
|
|
const char *prepend,
|
|
|
|
const struct smartlist_t *lst,
|
|
|
|
const char *append,
|
|
|
|
digest_algorithm_t alg);
|
2013-02-22 18:53:45 +01:00
|
|
|
void crypto_digest_smartlist(char *digest_out, size_t len_out,
|
|
|
|
const struct smartlist_t *lst, const char *append,
|
|
|
|
digest_algorithm_t alg);
|
2009-09-16 23:01:01 +02:00
|
|
|
const char *crypto_digest_algorithm_get_name(digest_algorithm_t alg);
|
2016-05-23 16:58:27 +02:00
|
|
|
size_t crypto_digest_algorithm_get_length(digest_algorithm_t alg);
|
2009-09-16 18:34:44 +02:00
|
|
|
int crypto_digest_algorithm_parse_name(const char *name);
|
2012-01-18 21:53:30 +01:00
|
|
|
crypto_digest_t *crypto_digest_new(void);
|
|
|
|
crypto_digest_t *crypto_digest256_new(digest_algorithm_t algorithm);
|
2015-11-18 09:37:05 +01:00
|
|
|
crypto_digest_t *crypto_digest512_new(digest_algorithm_t algorithm);
|
2017-11-17 17:55:52 +01:00
|
|
|
void crypto_digest_free_(crypto_digest_t *digest);
|
2017-12-07 16:52:55 +01:00
|
|
|
#define crypto_digest_free(d) \
|
|
|
|
FREE_AND_NULL(crypto_digest_t, crypto_digest_free_, (d))
|
2012-01-18 21:53:30 +01:00
|
|
|
void crypto_digest_add_bytes(crypto_digest_t *digest, const char *data,
|
2003-12-16 06:47:21 +01:00
|
|
|
size_t len);
|
2012-01-18 21:53:30 +01:00
|
|
|
void crypto_digest_get_digest(crypto_digest_t *digest,
|
2003-12-16 06:47:21 +01:00
|
|
|
char *out, size_t out_len);
|
2012-01-18 21:53:30 +01:00
|
|
|
crypto_digest_t *crypto_digest_dup(const crypto_digest_t *digest);
|
|
|
|
void crypto_digest_assign(crypto_digest_t *into,
|
|
|
|
const crypto_digest_t *from);
|
2011-09-13 17:38:13 +02:00
|
|
|
void crypto_hmac_sha256(char *hmac_out,
|
|
|
|
const char *key, size_t key_len,
|
|
|
|
const char *msg, size_t msg_len);
|
2016-12-12 22:45:28 +01:00
|
|
|
void crypto_mac_sha3_256(uint8_t *mac_out, size_t len_out,
|
|
|
|
const uint8_t *key, size_t key_len,
|
|
|
|
const uint8_t *msg, size_t msg_len);
|
|
|
|
|
2015-12-18 23:31:12 +01:00
|
|
|
crypto_xof_t *crypto_xof_new(void);
|
|
|
|
void crypto_xof_add_bytes(crypto_xof_t *xof, const uint8_t *data, size_t len);
|
|
|
|
void crypto_xof_squeeze_bytes(crypto_xof_t *xof, uint8_t *out, size_t len);
|
2017-11-17 17:55:52 +01:00
|
|
|
void crypto_xof_free_(crypto_xof_t *xof);
|
2017-12-07 16:52:55 +01:00
|
|
|
#define crypto_xof_free(xof) \
|
|
|
|
FREE_AND_NULL(crypto_xof_t, crypto_xof_free_, (xof))
|
2002-07-24 16:02:39 +02:00
|
|
|
|
2004-11-02 03:28:51 +01:00
|
|
|
/* Key negotiation */
|
2011-01-24 22:03:14 +01:00
|
|
|
#define DH_TYPE_CIRCUIT 1
|
|
|
|
#define DH_TYPE_REND 2
|
|
|
|
#define DH_TYPE_TLS 3
|
2012-01-18 21:53:30 +01:00
|
|
|
crypto_dh_t *crypto_dh_new(int dh_type);
|
2012-11-28 21:38:37 +01:00
|
|
|
crypto_dh_t *crypto_dh_dup(const crypto_dh_t *dh);
|
2012-01-18 21:53:30 +01:00
|
|
|
int crypto_dh_get_bytes(crypto_dh_t *dh);
|
|
|
|
int crypto_dh_generate_public(crypto_dh_t *dh);
|
|
|
|
int crypto_dh_get_public(crypto_dh_t *dh, char *pubkey_out,
|
2004-11-02 03:28:51 +01:00
|
|
|
size_t pubkey_out_len);
|
2012-01-18 21:53:30 +01:00
|
|
|
ssize_t crypto_dh_compute_secret(int severity, crypto_dh_t *dh,
|
2004-11-02 03:28:51 +01:00
|
|
|
const char *pubkey, size_t pubkey_len,
|
|
|
|
char *secret_out, size_t secret_out_len);
|
2017-11-17 17:55:52 +01:00
|
|
|
void crypto_dh_free_(crypto_dh_t *dh);
|
2017-12-07 16:44:04 +01:00
|
|
|
#define crypto_dh_free(dh) FREE_AND_NULL(crypto_dh_t, crypto_dh_free_, (dh))
|
2012-12-03 18:20:05 +01:00
|
|
|
|
|
|
|
int crypto_expand_key_material_TAP(const uint8_t *key_in,
|
|
|
|
size_t key_in_len,
|
|
|
|
uint8_t *key_out, size_t key_out_len);
|
|
|
|
int crypto_expand_key_material_rfc5869_sha256(
|
|
|
|
const uint8_t *key_in, size_t key_in_len,
|
|
|
|
const uint8_t *salt_in, size_t salt_in_len,
|
|
|
|
const uint8_t *info_in, size_t info_in_len,
|
|
|
|
uint8_t *key_out, size_t key_out_len);
|
2004-11-02 03:28:51 +01:00
|
|
|
|
2002-07-24 16:02:39 +02:00
|
|
|
/* random numbers */
|
2015-11-25 16:30:58 +01:00
|
|
|
int crypto_seed_rng(void) ATTR_WUR;
|
2015-11-25 16:42:00 +01:00
|
|
|
MOCK_DECL(void,crypto_rand,(char *to, size_t n));
|
|
|
|
void crypto_rand_unmocked(char *to, size_t n);
|
2015-12-08 16:54:42 +01:00
|
|
|
void crypto_strongest_rand(uint8_t *out, size_t out_len);
|
2005-10-07 00:18:01 +02:00
|
|
|
int crypto_rand_int(unsigned int max);
|
2015-04-21 16:17:12 +02:00
|
|
|
int crypto_rand_int_range(unsigned int min, unsigned int max);
|
2015-04-23 15:16:42 +02:00
|
|
|
uint64_t crypto_rand_uint64_range(uint64_t min, uint64_t max);
|
|
|
|
time_t crypto_rand_time_range(time_t min, time_t max);
|
2006-10-01 23:59:05 +02:00
|
|
|
uint64_t crypto_rand_uint64(uint64_t max);
|
2010-06-23 03:30:26 +02:00
|
|
|
double crypto_rand_double(void);
|
2013-02-08 22:28:05 +01:00
|
|
|
struct tor_weak_rng_t;
|
|
|
|
void crypto_seed_weak_rng(struct tor_weak_rng_t *rng);
|
2014-02-12 17:46:58 +01:00
|
|
|
int crypto_init_siphash_key(void);
|
2003-04-17 19:10:41 +02:00
|
|
|
|
2008-02-08 22:13:12 +01:00
|
|
|
char *crypto_random_hostname(int min_rand_len, int max_rand_len,
|
|
|
|
const char *prefix, const char *suffix);
|
|
|
|
|
2004-11-02 03:28:51 +01:00
|
|
|
struct smartlist_t;
|
|
|
|
void *smartlist_choose(const struct smartlist_t *sl);
|
2007-05-18 23:19:14 +02:00
|
|
|
void smartlist_shuffle(struct smartlist_t *sl);
|
2004-11-02 03:28:51 +01:00
|
|
|
|
2012-11-07 22:09:58 +01:00
|
|
|
/** OpenSSL-based utility functions. */
|
|
|
|
void memwipe(void *mem, uint8_t byte, size_t sz);
|
|
|
|
|
2010-04-10 00:45:08 +02:00
|
|
|
/* Prototypes for private functions only used by tortls.c, crypto.c, and the
|
|
|
|
* unit tests. */
|
2007-06-14 00:39:10 +02:00
|
|
|
struct rsa_st;
|
|
|
|
struct evp_pkey_st;
|
|
|
|
struct dh_st;
|
2012-10-12 18:22:13 +02:00
|
|
|
struct rsa_st *crypto_pk_get_rsa_(crypto_pk_t *env);
|
|
|
|
crypto_pk_t *crypto_new_pk_from_rsa_(struct rsa_st *rsa);
|
2015-09-15 17:09:18 +02:00
|
|
|
MOCK_DECL(struct evp_pkey_st *, crypto_pk_get_evp_pkey_,(crypto_pk_t *env,
|
|
|
|
int private));
|
2012-10-12 18:22:13 +02:00
|
|
|
struct dh_st *crypto_dh_get_dh_(crypto_dh_t *dh);
|
2013-06-06 23:58:28 +02:00
|
|
|
|
|
|
|
void crypto_add_spaces_to_fp(char *out, size_t outlen, const char *in);
|
2007-05-01 00:42:50 +02:00
|
|
|
|
2015-12-23 15:58:08 +01:00
|
|
|
#ifdef CRYPTO_PRIVATE
|
2017-05-02 15:33:49 +02:00
|
|
|
|
2015-12-23 15:58:08 +01:00
|
|
|
STATIC int crypto_force_rand_ssleay(void);
|
2016-05-03 19:33:33 +02:00
|
|
|
STATIC int crypto_strongest_rand_raw(uint8_t *out, size_t out_len);
|
2016-06-02 15:46:12 +02:00
|
|
|
|
|
|
|
#ifdef TOR_UNIT_TESTS
|
|
|
|
extern int break_strongest_rng_syscall;
|
|
|
|
extern int break_strongest_rng_fallback;
|
|
|
|
#endif
|
2017-09-15 22:24:44 +02:00
|
|
|
#endif /* defined(CRYPTO_PRIVATE) */
|
2015-12-23 15:58:08 +01:00
|
|
|
|
2016-09-09 15:44:57 +02:00
|
|
|
#ifdef TOR_UNIT_TESTS
|
|
|
|
void crypto_pk_assign_(crypto_pk_t *dest, const crypto_pk_t *src);
|
2017-07-06 15:39:48 +02:00
|
|
|
digest_algorithm_t crypto_digest_get_algorithm(crypto_digest_t *digest);
|
2016-09-09 15:44:57 +02:00
|
|
|
#endif
|
|
|
|
|
2017-09-15 22:24:44 +02:00
|
|
|
#endif /* !defined(TOR_CRYPTO_H) */
|
2015-10-02 14:33:54 +02:00
|
|
|
|