+++ /dev/null
-/*
- ecdh.c -- Diffie-Hellman key exchange handling
- Copyright (C) 2011-2013 Guus Sliepen <guus@tinc-vpn.org>
-
- This program is free software; you can redistribute it and/or modify
- it under the terms of the GNU General Public License as published by
- the Free Software Foundation; either version 2 of the License, or
- (at your option) any later version.
-
- This program is distributed in the hope that it will be useful,
- but WITHOUT ANY WARRANTY; without even the implied warranty of
- MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- GNU General Public License for more details.
-
- You should have received a copy of the GNU General Public License along
- with this program; if not, write to the Free Software Foundation, Inc.,
- 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
-*/
-
-#include "../system.h"
-
-#include "../ecdh.h"
-#include "../logger.h"
-#include "../utils.h"
-#include "../xalloc.h"
-
-ecdh_t *ecdh_generate_public(void *pubkey) {
- logger(DEBUG_ALWAYS, LOG_ERR, "EC support using libgcrypt not implemented");
- return NULL;
-}
-
-bool ecdh_compute_shared(ecdh_t *ecdh, const void *pubkey, void *shared) {
- return false
-}
-
-void ecdh_free(ecdh_t *ecdh) {
-}
+++ /dev/null
-/*
- ecdsa.c -- ECDSA key handling
- Copyright (C) 2011-2013 Guus Sliepen <guus@tinc-vpn.org>
-
- This program is free software; you can redistribute it and/or modify
- it under the terms of the GNU General Public License as published by
- the Free Software Foundation; either version 2 of the License, or
- (at your option) any later version.
-
- This program is distributed in the hope that it will be useful,
- but WITHOUT ANY WARRANTY; without even the implied warranty of
- MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- GNU General Public License for more details.
-
- You should have received a copy of the GNU General Public License along
- with this program; if not, write to the Free Software Foundation, Inc.,
- 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
-*/
-
-#include "../system.h"
-
-#include "../logger.h"
-#include "../ecdsa.h"
-#include "../utils.h"
-#include "../xalloc.h"
-
-// Get and set ECDSA keys
-//
-ecdsa_t *ecdsa_set_base64_public_key(const char *p) {
- logger(DEBUG_ALWAYS, LOG_ERR, "EC support using libgcrypt not implemented");
- return NULL;
-}
-
-char *ecdsa_get_base64_public_key(ecdsa_t *ecdsa) {
- return NULL;
-}
-
-// Read PEM ECDSA keys
-
-ecdsa_t *ecdsa_read_pem_public_key(FILE *fp) {
- logger(DEBUG_ALWAYS, LOG_ERR, "EC support using libgcrypt not implemented");
- return NULL;
-}
-
-ecdsa_t *ecdsa_read_pem_private_key(FILE *fp) {
- logger(DEBUG_ALWAYS, LOG_ERR, "EC support using libgcrypt not implemented");
- return NULL;
-}
-
-size_t ecdsa_size(ecdsa_t *ecdsa) {
- return 0;
-}
-
-bool ecdsa_sign(ecdsa_t *ecdsa, const void *in, size_t len, void *sig) {
- return false;
-}
-
-bool ecdsa_verify(ecdsa_t *ecdsa, const void *in, size_t len, const void *sig) {
- return false;
-}
-
-bool ecdsa_active(ecdsa_t *ecdsa) {
- return false;
-}
-
-void ecdsa_free(ecdsa_t *ecdsa) {
-}
+++ /dev/null
-/*
- ecdsagen.c -- ECDSA key generation and export
- Copyright (C) 2011-2013 Guus Sliepen <guus@tinc-vpn.org>
-
- This program is free software; you can redistribute it and/or modify
- it under the terms of the GNU General Public License as published by
- the Free Software Foundation; either version 2 of the License, or
- (at your option) any later version.
-
- This program is distributed in the hope that it will be useful,
- but WITHOUT ANY WARRANTY; without even the implied warranty of
- MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- GNU General Public License for more details.
-
- You should have received a copy of the GNU General Public License along
- with this program; if not, write to the Free Software Foundation, Inc.,
- 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
-*/
-
-#include "../system.h"
-
-#include "../ecdsagen.h"
-#include "../utils.h"
-#include "../xalloc.h"
-
-// Generate ECDSA key
-
-ecdsa_t *ecdsa_generate(void) {
- logger(DEBUG_ALWAYS, LOG_ERR, "EC support using libgcrypt not implemented");
- return NULL;
-}
-
-// Write PEM ECDSA keys
-
-bool ecdsa_write_pem_public_key(ecdsa_t *ecdsa, FILE *fp) {
- return false;
-}
-
-bool ecdsa_write_pem_private_key(ecdsa_t *ecdsa, FILE *fp) {
- return false;
-}
#include "../system.h"
-#include "digest.h"
-#include "../digest.h"
#include "../prf.h"
+#include "../ed25519/sha512.h"
+
+static void memxor(char *buf, char c, size_t len) {
+ for(size_t i = 0; i < len; i++)
+ buf[i] ^= c;
+}
+
+static const size_t mdlen = 64;
+static const size_t blklen = 128;
+
+static bool hmac_sha512(const char *key, size_t keylen, const char *msg, size_t msglen, char *out) {
+ char tmp[blklen + mdlen];
+ sha512_context md;
+
+ if(keylen <= blklen) {
+ memcpy(tmp, key, keylen);
+ memset(tmp + keylen, 0, blklen - keylen);
+ } else {
+ if(sha512(key, keylen, tmp) != 0)
+ return false;
+ memset(tmp + mdlen, 0, blklen - mdlen);
+ }
+
+ if(sha512_init(&md) != 0)
+ return false;
+
+ // ipad
+ memxor(tmp, 0x36, blklen);
+ if(sha512_update(&md, tmp, blklen) != 0)
+ return false;
+
+ // message
+ if(sha512_update(&md, msg, msglen) != 0)
+ return false;
+
+ if(sha512_final(&md, tmp + blklen) != 0)
+ return false;
+
+ // opad
+ memxor(tmp, 0x36 ^ 0x5c, blklen);
+ if(sha512(tmp, sizeof tmp, out) != 0)
+ return false;
+
+ return true;
+}
+
+
+/* Generate key material from a master secret and a seed, based on RFC 4346 section 5.
+ We use SHA512 instead of MD5 and SHA1.
+ */
bool prf(const char *secret, size_t secretlen, char *seed, size_t seedlen, char *out, size_t outlen) {
- logger(DEBUG_ALWAYS, LOG_ERR, "PRF support using libgcrypt not implemented");
- return false;
+ /* Data is what the "inner" HMAC function processes.
+ It consists of the previous HMAC result plus the seed.
+ */
+
+ char data[mdlen + seedlen];
+ memset(data, 0, mdlen);
+ memcpy(data + mdlen, seed, seedlen);
+
+ char hash[mdlen];
+
+ while(outlen > 0) {
+ /* Inner HMAC */
+ if(!hmac_sha512(secret, secretlen, data, sizeof data, data))
+ return false;
+
+ /* Outer HMAC */
+ if(outlen >= mdlen) {
+ if(!hmac_sha512(secret, secretlen, data, sizeof data, out))
+ return false;
+ out += mdlen;
+ outlen -= mdlen;
+ } else {
+ if(!hmac_sha512(secret, secretlen, data, sizeof data, hash))
+ return false;
+ memcpy(out, hash, outlen);
+ out += outlen;
+ outlen = 0;
+ }
+ }
+
+ return true;
}