blob: 9ce7ce700b1412035b6c4f5973f103941cb6fa12 [file] [log] [blame]
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -07001/* -*- Mode:C++; c-file-style:"gnu"; indent-tabs-mode:nil; -*- */
2/**
Zhiyi Zhanga67fa462020-04-19 13:48:03 -07003 * Copyright (c) 2017-2020, Regents of the University of California.
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -07004 *
5 * This file is part of ndncert, a certificate management system based on NDN.
6 *
7 * ndncert is free software: you can redistribute it and/or modify it under the terms
8 * of the GNU General Public License as published by the Free Software Foundation, either
9 * version 3 of the License, or (at your option) any later version.
10 *
11 * ndncert is distributed in the hope that it will be useful, but WITHOUT ANY
12 * WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A
13 * PARTICULAR PURPOSE. See the GNU General Public License for more details.
14 *
15 * You should have received copies of the GNU General Public License along with
16 * ndncert, e.g., in COPYING.md file. If not, see <http://www.gnu.org/licenses/>.
17 *
18 * See AUTHORS.md for complete list of ndncert authors and contributors.
19 */
20
21#ifndef NDNCERT_CRYPTO_SUPPORT_CRYPTO_HELPER_HPP
22#define NDNCERT_CRYPTO_SUPPORT_CRYPTO_HELPER_HPP
23
Zhiyi Zhang926b1852020-10-10 10:16:00 -070024#include "../ndncert-common.hpp"
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -070025#include <openssl/ec.h>
Zhiyi Zhangb8cb0472020-05-05 20:55:05 -070026#include <openssl/evp.h>
27
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -070028namespace ndn {
29namespace ndncert {
30
Zhiyi Zhangef6b36a2020-09-22 21:20:59 -070031static const int INFO_LEN = 10;
32static const uint8_t INFO[] = {0xf0, 0xf1, 0xf2, 0xf3, 0xf4, 0xf5, 0xf6, 0xf7, 0xf8, 0xf9};
tylerliu8e170d62020-09-30 01:31:53 -070033static const int AES_128_KEY_LEN = 16;
Zhiyi Zhangef6b36a2020-09-22 21:20:59 -070034
Zhiyi Zhang97bedb82020-10-10 11:11:35 -070035class CryptoError : public std::runtime_error {
36public:
37 using std::runtime_error::runtime_error;
38};
39
Zhiyi Zhangb8cb0472020-05-05 20:55:05 -070040struct ECDH_CTX {
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -070041 int EC_NID;
Zhiyi Zhangb8cb0472020-05-05 20:55:05 -070042 EVP_PKEY_CTX* ctx_params;
43 EVP_PKEY_CTX* ctx_keygen;
44 EVP_PKEY* privkey;
45 EVP_PKEY* peerkey;
46 EVP_PKEY* params;
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -070047 uint8_t publicKey[256];
48 int publicKeyLen;
49 uint8_t sharedSecret[256];
50 int sharedSecretLen;
51};
52
Zhiyi Zhangb8cb0472020-05-05 20:55:05 -070053class ECDHState {
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -070054public:
55 ECDHState();
56 ~ECDHState();
57
58 std::string
59 getBase64PubKey();
60
61 uint8_t*
62 deriveSecret(const std::string& peerKeyStr);
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -070063 unique_ptr<ECDH_CTX> context;
64
Zhiyi Zhang97bedb82020-10-10 11:11:35 -070065 PUBLIC_WITH_TESTS_ELSE_PRIVATE : uint8_t*
66 deriveSecret(const uint8_t* peerkey, int peerKeySize);
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -070067
68 uint8_t*
69 getRawSelfPubKey();
70};
71
Zhiyi Zhang97bedb82020-10-10 11:11:35 -070072/**
73 * HMAC based key derivation function (HKDF)
74 * @p secret, intput, the input to the HKDF
75 * @p secretLen, intput, the length of the secret
76 * @p salt, intput, the salt used in HKDF
77 * @p saltLen, intput, the length of the salt
78 * @p output, output, the output of the HKDF
79 * @p output_len, intput, the length of expected output
80 * @p info, intput, the additional information used in HKDF
81 * @p info_len, intput, the additional information used in HKDF
82 * @return the length of the derived key if successful, -1 if failed
83 */
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -070084int
Zhiyi Zhang97bedb82020-10-10 11:11:35 -070085hkdf(const uint8_t* secret, int secret_len,
86 const uint8_t* salt, int salt_len,
87 uint8_t* output, int output_len,
Zhiyi Zhangb8cb0472020-05-05 20:55:05 -070088 const uint8_t* info = INFO, int info_len = INFO_LEN);
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -070089
Zhiyi Zhanga2c39f72020-10-06 16:45:55 -070090/**
Zhiyi Zhang97bedb82020-10-10 11:11:35 -070091 * HMAC based on SHA-256
92 * @p data, intput, the array to hmac
93 * @p data_length, intput, the length of the array
94 * @p key, intput, the key for the function
95 * @p key_len, intput, the length of the key
96 * @p result, output, result of the HMAC. Enough memory (32 Bytes) must be allocated beforehands
Zhiyi Zhanga2c39f72020-10-06 16:45:55 -070097 * @return 0 if successful, -1 if failed
98 */
Zhiyi Zhanga67fa462020-04-19 13:48:03 -070099int
Zhiyi Zhang97bedb82020-10-10 11:11:35 -0700100hmac_sha256(const uint8_t* data, const unsigned data_length,
101 const uint8_t* key, const unsigned key_length,
102 uint8_t* result);
Zhiyi Zhanga67fa462020-04-19 13:48:03 -0700103
104/**
Zhiyi Zhang97bedb82020-10-10 11:11:35 -0700105 * Authenticated GCM 128 Encryption with associated data
Zhiyi Zhanga67fa462020-04-19 13:48:03 -0700106 * @p plaintext, input, plaintext
107 * @p plaintext_len, input, size of plaintext
108 * @p associated, input, associated authentication data
109 * @p associated_len, input, size of associated authentication data
110 * @p key, input, 16 bytes AES key
111 * @p iv, input, 12 bytes IV
Zhiyi Zhang97bedb82020-10-10 11:11:35 -0700112 * @p ciphertext, output, enough memory must be allocated beforehands
Zhiyi Zhanga67fa462020-04-19 13:48:03 -0700113 * @p tag, output, 16 bytes tag
114 * @return the size of ciphertext
115 * @throw CryptoError when there is an error in the process of encryption
116 */
117int
118aes_gcm_128_encrypt(const uint8_t* plaintext, size_t plaintext_len, const uint8_t* associated, size_t associated_len,
119 const uint8_t* key, const uint8_t* iv, uint8_t* ciphertext, uint8_t* tag);
120
121/**
Zhiyi Zhang97bedb82020-10-10 11:11:35 -0700122 * Authenticated GCM 128 Decryption with associated data
Zhiyi Zhanga67fa462020-04-19 13:48:03 -0700123 * @p ciphertext, input, ciphertext
124 * @p ciphertext_len, input, size of ciphertext
125 * @p associated, input, associated authentication data
126 * @p associated_len, input, size of associated authentication data
127 * @p tag, input, 16 bytes tag
128 * @p key, input, 16 bytes AES key
129 * @p iv, input, 12 bytes IV
Zhiyi Zhang97bedb82020-10-10 11:11:35 -0700130 * @p plaintext, output, enough memory must be allocated beforehands
Zhiyi Zhanga67fa462020-04-19 13:48:03 -0700131 * @return the size of plaintext or -1 if the verification fails
132 * @throw CryptoError when there is an error in the process of encryption
133 */
134int
135aes_gcm_128_decrypt(const uint8_t* ciphertext, size_t ciphertext_len, const uint8_t* associated, size_t associated_len,
136 const uint8_t* tag, const uint8_t* key, const uint8_t* iv, uint8_t* plaintext);
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -0700137
138void
139handleErrors(const std::string& errorInfo);
140
Zhiyi Zhangb8cb0472020-05-05 20:55:05 -0700141} // namespace ndncert
142} // namespace ndn
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -0700143
Zhiyi Zhangb8cb0472020-05-05 20:55:05 -0700144#endif // NDNCERT_CRYPTO_SUPPORT_CRYPTO_HELPER_HPP