blob: 5f76ba873bf0a31e9103f302e6c5f2cd930fbc84 [file] [log] [blame]
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -07001/* -*- Mode:C++; c-file-style:"gnu"; indent-tabs-mode:nil; -*- */
2/**
Zhiyi Zhanga67fa462020-04-19 13:48:03 -07003 * Copyright (c) 2017-2020, Regents of the University of California.
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -07004 *
5 * This file is part of ndncert, a certificate management system based on NDN.
6 *
7 * ndncert is free software: you can redistribute it and/or modify it under the terms
8 * of the GNU General Public License as published by the Free Software Foundation, either
9 * version 3 of the License, or (at your option) any later version.
10 *
11 * ndncert is distributed in the hope that it will be useful, but WITHOUT ANY
12 * WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A
13 * PARTICULAR PURPOSE. See the GNU General Public License for more details.
14 *
15 * You should have received copies of the GNU General Public License along with
16 * ndncert, e.g., in COPYING.md file. If not, see <http://www.gnu.org/licenses/>.
17 *
18 * See AUTHORS.md for complete list of ndncert authors and contributors.
19 */
20
21#ifndef NDNCERT_CRYPTO_SUPPORT_CRYPTO_HELPER_HPP
22#define NDNCERT_CRYPTO_SUPPORT_CRYPTO_HELPER_HPP
23
Zhiyi Zhang926b1852020-10-10 10:16:00 -070024#include "../ndncert-common.hpp"
Zhiyi Zhangb8cb0472020-05-05 20:55:05 -070025
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -070026namespace ndn {
27namespace ndncert {
28
Zhiyi Zhangef6b36a2020-09-22 21:20:59 -070029static const int INFO_LEN = 10;
30static const uint8_t INFO[] = {0xf0, 0xf1, 0xf2, 0xf3, 0xf4, 0xf5, 0xf6, 0xf7, 0xf8, 0xf9};
tylerliu8e170d62020-09-30 01:31:53 -070031static const int AES_128_KEY_LEN = 16;
Zhiyi Zhangef6b36a2020-09-22 21:20:59 -070032
Zhiyi Zhangb8cb0472020-05-05 20:55:05 -070033class ECDHState {
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -070034public:
35 ECDHState();
36 ~ECDHState();
37
38 std::string
39 getBase64PubKey();
40
41 uint8_t*
42 deriveSecret(const std::string& peerKeyStr);
Zhiyi Zhange4891b72020-10-10 15:11:57 -070043
Zhiyi Zhangcfad98d2020-10-11 11:25:14 -070044 uint8_t m_publicKey[256];
45 size_t m_publicKeyLen;
46 uint8_t m_sharedSecret[256];
47 size_t m_sharedSecretLen;
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -070048
Zhiyi Zhange4891b72020-10-10 15:11:57 -070049PUBLIC_WITH_TESTS_ELSE_PRIVATE:
50 uint8_t*
51 deriveSecret(const uint8_t* peerkey, int peerKeySize);
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -070052
53 uint8_t*
54 getRawSelfPubKey();
Zhiyi Zhangcfad98d2020-10-11 11:25:14 -070055
56private:
57 struct ECDH_CTX;
58 unique_ptr<ECDH_CTX> context;
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -070059};
60
Zhiyi Zhang97bedb82020-10-10 11:11:35 -070061/**
62 * HMAC based key derivation function (HKDF)
63 * @p secret, intput, the input to the HKDF
64 * @p secretLen, intput, the length of the secret
65 * @p salt, intput, the salt used in HKDF
66 * @p saltLen, intput, the length of the salt
67 * @p output, output, the output of the HKDF
68 * @p output_len, intput, the length of expected output
69 * @p info, intput, the additional information used in HKDF
70 * @p info_len, intput, the additional information used in HKDF
71 * @return the length of the derived key if successful, -1 if failed
72 */
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -070073int
Zhiyi Zhang97bedb82020-10-10 11:11:35 -070074hkdf(const uint8_t* secret, int secret_len,
75 const uint8_t* salt, int salt_len,
76 uint8_t* output, int output_len,
Zhiyi Zhangb8cb0472020-05-05 20:55:05 -070077 const uint8_t* info = INFO, int info_len = INFO_LEN);
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -070078
Zhiyi Zhanga2c39f72020-10-06 16:45:55 -070079/**
Zhiyi Zhang97bedb82020-10-10 11:11:35 -070080 * HMAC based on SHA-256
81 * @p data, intput, the array to hmac
82 * @p data_length, intput, the length of the array
83 * @p key, intput, the key for the function
84 * @p key_len, intput, the length of the key
85 * @p result, output, result of the HMAC. Enough memory (32 Bytes) must be allocated beforehands
Zhiyi Zhanga2c39f72020-10-06 16:45:55 -070086 * @return 0 if successful, -1 if failed
87 */
Zhiyi Zhanga67fa462020-04-19 13:48:03 -070088int
Zhiyi Zhang97bedb82020-10-10 11:11:35 -070089hmac_sha256(const uint8_t* data, const unsigned data_length,
90 const uint8_t* key, const unsigned key_length,
91 uint8_t* result);
Zhiyi Zhanga67fa462020-04-19 13:48:03 -070092
93/**
Zhiyi Zhang97bedb82020-10-10 11:11:35 -070094 * Authenticated GCM 128 Encryption with associated data
Zhiyi Zhanga67fa462020-04-19 13:48:03 -070095 * @p plaintext, input, plaintext
96 * @p plaintext_len, input, size of plaintext
97 * @p associated, input, associated authentication data
98 * @p associated_len, input, size of associated authentication data
99 * @p key, input, 16 bytes AES key
100 * @p iv, input, 12 bytes IV
Zhiyi Zhang97bedb82020-10-10 11:11:35 -0700101 * @p ciphertext, output, enough memory must be allocated beforehands
Zhiyi Zhanga67fa462020-04-19 13:48:03 -0700102 * @p tag, output, 16 bytes tag
103 * @return the size of ciphertext
Zhiyi Zhangccd5a0c2020-10-12 13:48:16 -0700104 * @throw runtime_error when there is an error in the process of encryption
Zhiyi Zhanga67fa462020-04-19 13:48:03 -0700105 */
106int
107aes_gcm_128_encrypt(const uint8_t* plaintext, size_t plaintext_len, const uint8_t* associated, size_t associated_len,
108 const uint8_t* key, const uint8_t* iv, uint8_t* ciphertext, uint8_t* tag);
109
110/**
Zhiyi Zhang97bedb82020-10-10 11:11:35 -0700111 * Authenticated GCM 128 Decryption with associated data
Zhiyi Zhanga67fa462020-04-19 13:48:03 -0700112 * @p ciphertext, input, ciphertext
113 * @p ciphertext_len, input, size of ciphertext
114 * @p associated, input, associated authentication data
115 * @p associated_len, input, size of associated authentication data
116 * @p tag, input, 16 bytes tag
117 * @p key, input, 16 bytes AES key
118 * @p iv, input, 12 bytes IV
Zhiyi Zhang97bedb82020-10-10 11:11:35 -0700119 * @p plaintext, output, enough memory must be allocated beforehands
Zhiyi Zhanga67fa462020-04-19 13:48:03 -0700120 * @return the size of plaintext or -1 if the verification fails
Zhiyi Zhangccd5a0c2020-10-12 13:48:16 -0700121 * @throw runtime_error when there is an error in the process of encryption
Zhiyi Zhanga67fa462020-04-19 13:48:03 -0700122 */
123int
124aes_gcm_128_decrypt(const uint8_t* ciphertext, size_t ciphertext_len, const uint8_t* associated, size_t associated_len,
125 const uint8_t* tag, const uint8_t* key, const uint8_t* iv, uint8_t* plaintext);
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -0700126
127void
128handleErrors(const std::string& errorInfo);
129
Zhiyi Zhange4891b72020-10-10 15:11:57 -0700130} // namespace ndncert
131} // namespace ndn
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -0700132
Zhiyi Zhange4891b72020-10-10 15:11:57 -0700133#endif // NDNCERT_CRYPTO_SUPPORT_CRYPTO_HELPER_HPP