blob: 3af83af411b57a237444f4e2fb4c877ea1359925 [file] [log] [blame]
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -07001/* -*- Mode:C++; c-file-style:"gnu"; indent-tabs-mode:nil; -*- */
2/**
Zhiyi Zhanga67fa462020-04-19 13:48:03 -07003 * Copyright (c) 2017-2020, Regents of the University of California.
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -07004 *
5 * This file is part of ndncert, a certificate management system based on NDN.
6 *
7 * ndncert is free software: you can redistribute it and/or modify it under the terms
8 * of the GNU General Public License as published by the Free Software Foundation, either
9 * version 3 of the License, or (at your option) any later version.
10 *
11 * ndncert is distributed in the hope that it will be useful, but WITHOUT ANY
12 * WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A
13 * PARTICULAR PURPOSE. See the GNU General Public License for more details.
14 *
15 * You should have received copies of the GNU General Public License along with
16 * ndncert, e.g., in COPYING.md file. If not, see <http://www.gnu.org/licenses/>.
17 *
18 * See AUTHORS.md for complete list of ndncert authors and contributors.
19 */
20
21#ifndef NDNCERT_CRYPTO_SUPPORT_CRYPTO_HELPER_HPP
22#define NDNCERT_CRYPTO_SUPPORT_CRYPTO_HELPER_HPP
23
Zhiyi Zhang926b1852020-10-10 10:16:00 -070024#include "../ndncert-common.hpp"
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -070025#include <openssl/ec.h>
Zhiyi Zhangb8cb0472020-05-05 20:55:05 -070026#include <openssl/evp.h>
27
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -070028namespace ndn {
29namespace ndncert {
30
Zhiyi Zhangef6b36a2020-09-22 21:20:59 -070031static const int INFO_LEN = 10;
32static const uint8_t INFO[] = {0xf0, 0xf1, 0xf2, 0xf3, 0xf4, 0xf5, 0xf6, 0xf7, 0xf8, 0xf9};
tylerliu8e170d62020-09-30 01:31:53 -070033static const int AES_128_KEY_LEN = 16;
Zhiyi Zhangef6b36a2020-09-22 21:20:59 -070034
Zhiyi Zhang97bedb82020-10-10 11:11:35 -070035class CryptoError : public std::runtime_error {
36public:
37 using std::runtime_error::runtime_error;
38};
39
Zhiyi Zhangb8cb0472020-05-05 20:55:05 -070040struct ECDH_CTX {
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -070041 int EC_NID;
Zhiyi Zhangb8cb0472020-05-05 20:55:05 -070042 EVP_PKEY_CTX* ctx_params;
43 EVP_PKEY_CTX* ctx_keygen;
44 EVP_PKEY* privkey;
45 EVP_PKEY* peerkey;
46 EVP_PKEY* params;
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -070047 uint8_t publicKey[256];
48 int publicKeyLen;
49 uint8_t sharedSecret[256];
50 int sharedSecretLen;
51};
52
Zhiyi Zhangb8cb0472020-05-05 20:55:05 -070053class ECDHState {
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -070054public:
55 ECDHState();
56 ~ECDHState();
57
58 std::string
59 getBase64PubKey();
60
61 uint8_t*
62 deriveSecret(const std::string& peerKeyStr);
Zhiyi Zhange4891b72020-10-10 15:11:57 -070063
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -070064 unique_ptr<ECDH_CTX> context;
65
Zhiyi Zhange4891b72020-10-10 15:11:57 -070066PUBLIC_WITH_TESTS_ELSE_PRIVATE:
67 uint8_t*
68 deriveSecret(const uint8_t* peerkey, int peerKeySize);
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -070069
70 uint8_t*
71 getRawSelfPubKey();
72};
73
Zhiyi Zhang97bedb82020-10-10 11:11:35 -070074/**
75 * HMAC based key derivation function (HKDF)
76 * @p secret, intput, the input to the HKDF
77 * @p secretLen, intput, the length of the secret
78 * @p salt, intput, the salt used in HKDF
79 * @p saltLen, intput, the length of the salt
80 * @p output, output, the output of the HKDF
81 * @p output_len, intput, the length of expected output
82 * @p info, intput, the additional information used in HKDF
83 * @p info_len, intput, the additional information used in HKDF
84 * @return the length of the derived key if successful, -1 if failed
85 */
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -070086int
Zhiyi Zhang97bedb82020-10-10 11:11:35 -070087hkdf(const uint8_t* secret, int secret_len,
88 const uint8_t* salt, int salt_len,
89 uint8_t* output, int output_len,
Zhiyi Zhangb8cb0472020-05-05 20:55:05 -070090 const uint8_t* info = INFO, int info_len = INFO_LEN);
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -070091
Zhiyi Zhanga2c39f72020-10-06 16:45:55 -070092/**
Zhiyi Zhang97bedb82020-10-10 11:11:35 -070093 * HMAC based on SHA-256
94 * @p data, intput, the array to hmac
95 * @p data_length, intput, the length of the array
96 * @p key, intput, the key for the function
97 * @p key_len, intput, the length of the key
98 * @p result, output, result of the HMAC. Enough memory (32 Bytes) must be allocated beforehands
Zhiyi Zhanga2c39f72020-10-06 16:45:55 -070099 * @return 0 if successful, -1 if failed
100 */
Zhiyi Zhanga67fa462020-04-19 13:48:03 -0700101int
Zhiyi Zhang97bedb82020-10-10 11:11:35 -0700102hmac_sha256(const uint8_t* data, const unsigned data_length,
103 const uint8_t* key, const unsigned key_length,
104 uint8_t* result);
Zhiyi Zhanga67fa462020-04-19 13:48:03 -0700105
106/**
Zhiyi Zhang97bedb82020-10-10 11:11:35 -0700107 * Authenticated GCM 128 Encryption with associated data
Zhiyi Zhanga67fa462020-04-19 13:48:03 -0700108 * @p plaintext, input, plaintext
109 * @p plaintext_len, input, size of plaintext
110 * @p associated, input, associated authentication data
111 * @p associated_len, input, size of associated authentication data
112 * @p key, input, 16 bytes AES key
113 * @p iv, input, 12 bytes IV
Zhiyi Zhang97bedb82020-10-10 11:11:35 -0700114 * @p ciphertext, output, enough memory must be allocated beforehands
Zhiyi Zhanga67fa462020-04-19 13:48:03 -0700115 * @p tag, output, 16 bytes tag
116 * @return the size of ciphertext
117 * @throw CryptoError when there is an error in the process of encryption
118 */
119int
120aes_gcm_128_encrypt(const uint8_t* plaintext, size_t plaintext_len, const uint8_t* associated, size_t associated_len,
121 const uint8_t* key, const uint8_t* iv, uint8_t* ciphertext, uint8_t* tag);
122
123/**
Zhiyi Zhang97bedb82020-10-10 11:11:35 -0700124 * Authenticated GCM 128 Decryption with associated data
Zhiyi Zhanga67fa462020-04-19 13:48:03 -0700125 * @p ciphertext, input, ciphertext
126 * @p ciphertext_len, input, size of ciphertext
127 * @p associated, input, associated authentication data
128 * @p associated_len, input, size of associated authentication data
129 * @p tag, input, 16 bytes tag
130 * @p key, input, 16 bytes AES key
131 * @p iv, input, 12 bytes IV
Zhiyi Zhang97bedb82020-10-10 11:11:35 -0700132 * @p plaintext, output, enough memory must be allocated beforehands
Zhiyi Zhanga67fa462020-04-19 13:48:03 -0700133 * @return the size of plaintext or -1 if the verification fails
134 * @throw CryptoError when there is an error in the process of encryption
135 */
136int
137aes_gcm_128_decrypt(const uint8_t* ciphertext, size_t ciphertext_len, const uint8_t* associated, size_t associated_len,
138 const uint8_t* tag, const uint8_t* key, const uint8_t* iv, uint8_t* plaintext);
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -0700139
140void
141handleErrors(const std::string& errorInfo);
142
Zhiyi Zhange4891b72020-10-10 15:11:57 -0700143} // namespace ndncert
144} // namespace ndn
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -0700145
Zhiyi Zhange4891b72020-10-10 15:11:57 -0700146#endif // NDNCERT_CRYPTO_SUPPORT_CRYPTO_HELPER_HPP