i2pd/libi2pd/Crypto.h

303 lines
8.0 KiB
C
Raw Normal View History

/*
2024-07-06 15:50:51 +03:00
* Copyright (c) 2013-2024, The PurpleI2P Project
*
* This file is part of Purple i2pd project and licensed under BSD3
*
* See full license text in LICENSE file at top of project tree
*/
2015-11-03 17:15:49 +03:00
#ifndef CRYPTO_H__
#define CRYPTO_H__
2014-05-06 20:22:22 +04:00
#include <inttypes.h>
2015-11-03 17:15:49 +03:00
#include <string>
#include <vector>
2016-05-11 23:02:26 +03:00
#include <openssl/bn.h>
#include <openssl/dh.h>
#include <openssl/aes.h>
#include <openssl/dsa.h>
2016-11-09 23:59:01 +03:00
#include <openssl/ecdsa.h>
2016-11-04 17:59:55 +03:00
#include <openssl/rsa.h>
2016-05-11 23:02:26 +03:00
#include <openssl/sha.h>
2016-11-10 20:51:39 +03:00
#include <openssl/evp.h>
2016-05-11 23:02:26 +03:00
#include <openssl/rand.h>
2018-09-08 23:52:42 +03:00
#include <openssl/opensslv.h>
2015-11-03 17:15:49 +03:00
#include "Base.h"
#include "Tag.h"
#include "CPU.h"
2014-05-06 20:22:22 +04:00
2018-09-08 23:52:42 +03:00
// recognize openssl version and features
2024-07-06 15:50:51 +03:00
#if (OPENSSL_VERSION_NUMBER >= 0x010101000) // 1.1.1
# define OPENSSL_HKDF 1
# define OPENSSL_EDDSA 1
# define OPENSSL_X25519 1
2024-07-30 15:13:24 +03:00
# if (!defined(LIBRESSL_VERSION_NUMBER) && (OPENSSL_VERSION_NUMBER != 0x030000000)) // 3.0.0, regression in SipHash, not implemented in LibreSSL
2024-07-06 15:50:51 +03:00
# define OPENSSL_SIPHASH 1
# endif
2018-09-08 23:52:42 +03:00
#endif
2014-05-06 20:22:22 +04:00
namespace i2p
{
namespace crypto
2015-11-03 17:15:49 +03:00
{
bool bn2buf (const BIGNUM * bn, uint8_t * buf, size_t len);
2015-11-03 17:15:49 +03:00
// DSA
2018-01-06 06:48:51 +03:00
DSA * CreateDSA ();
2015-11-03 17:15:49 +03:00
// RSA
const BIGNUM * GetRSAE ();
2015-11-03 17:15:49 +03:00
2018-09-08 23:52:42 +03:00
// x25519
class X25519Keys
{
public:
X25519Keys ();
2019-06-11 17:40:53 +03:00
X25519Keys (const uint8_t * priv, const uint8_t * pub); // if pub is null, derive from priv
2018-09-08 23:52:42 +03:00
~X25519Keys ();
void GenerateKeys ();
const uint8_t * GetPublicKey () const { return m_PublicKey; };
2018-11-01 17:43:31 +03:00
void GetPrivateKey (uint8_t * priv) const;
void SetPrivateKey (const uint8_t * priv, bool calculatePublic = false);
2021-01-01 23:03:11 +03:00
bool Agree (const uint8_t * pub, uint8_t * shared);
2018-09-08 23:52:42 +03:00
bool IsElligatorIneligible () const { return m_IsElligatorIneligible; }
void SetElligatorIneligible () { m_IsElligatorIneligible = true; }
2018-09-08 23:52:42 +03:00
private:
uint8_t m_PublicKey[32];
2018-09-08 23:52:42 +03:00
#if OPENSSL_X25519
EVP_PKEY_CTX * m_Ctx;
EVP_PKEY * m_Pkey;
#else
2018-09-08 23:52:42 +03:00
BN_CTX * m_Ctx;
2018-09-09 15:38:12 +03:00
uint8_t m_PrivateKey[32];
#endif
2021-11-12 19:33:51 +03:00
bool m_IsElligatorIneligible = false; // true if definitely ineligible
2018-09-08 23:52:42 +03:00
};
2015-11-03 17:15:49 +03:00
// ElGamal
void ElGamalEncrypt (const uint8_t * key, const uint8_t * data, uint8_t * encrypted); // 222 bytes data, 514 bytes encrypted
bool ElGamalDecrypt (const uint8_t * key, const uint8_t * encrypted, uint8_t * data); // 514 bytes encrypted, 222 data
2015-11-03 17:15:49 +03:00
void GenerateElGamalKeyPair (uint8_t * priv, uint8_t * pub);
2017-11-06 21:40:58 +03:00
// ECIES
void ECIESEncrypt (const EC_GROUP * curve, const EC_POINT * key, const uint8_t * data, uint8_t * encrypted); // 222 bytes data, 514 bytes encrypted
bool ECIESDecrypt (const EC_GROUP * curve, const BIGNUM * key, const uint8_t * encrypted, uint8_t * data); // 514 bytes encrypted, 222 data
2017-11-06 21:40:58 +03:00
void GenerateECIESKeyPair (const EC_GROUP * curve, BIGNUM *& priv, EC_POINT *& pub);
2018-01-06 06:48:51 +03:00
2015-11-03 17:15:49 +03:00
// AES
2018-01-06 06:48:51 +03:00
struct ChipherBlock
2014-05-06 20:22:22 +04:00
{
uint8_t buf[16];
2014-05-09 19:44:39 +04:00
2014-05-09 20:05:04 +04:00
void operator^=(const ChipherBlock& other) // XOR
2014-05-09 19:44:39 +04:00
{
2018-11-27 22:33:31 +03:00
if (!(((size_t)buf | (size_t)other.buf) & 0x03)) // multiple of 4 ?
{
2018-11-27 22:33:31 +03:00
for (int i = 0; i < 4; i++)
reinterpret_cast<uint32_t *>(buf)[i] ^= reinterpret_cast<const uint32_t *>(other.buf)[i];
}
2018-11-25 18:33:48 +03:00
else
{
2018-11-25 18:33:48 +03:00
for (int i = 0; i < 16; i++)
buf[i] ^= other.buf[i];
}
2018-01-06 06:48:51 +03:00
}
2014-05-06 20:22:22 +04:00
};
2014-11-01 21:56:13 +03:00
typedef i2p::data::Tag<32> AESKey;
2018-01-06 06:48:51 +03:00
2014-11-18 20:11:45 +03:00
template<size_t sz>
class AESAlignedBuffer // 16 bytes alignment
{
public:
2018-01-06 06:48:51 +03:00
2014-11-18 20:11:45 +03:00
AESAlignedBuffer ()
{
m_Buf = m_UnalignedBuffer;
2014-11-26 19:04:49 +03:00
uint8_t rem = ((size_t)m_Buf) & 0x0f;
2014-11-18 20:11:45 +03:00
if (rem)
m_Buf += (16 - rem);
}
2018-01-06 06:48:51 +03:00
2014-11-18 20:11:45 +03:00
operator uint8_t * () { return m_Buf; };
operator const uint8_t * () const { return m_Buf; };
2016-11-22 05:13:13 +03:00
ChipherBlock * GetChipherBlock () { return (ChipherBlock *)m_Buf; };
const ChipherBlock * GetChipherBlock () const { return (const ChipherBlock *)m_Buf; };
2018-01-06 06:48:51 +03:00
2014-11-18 20:11:45 +03:00
private:
uint8_t m_UnalignedBuffer[sz + 15]; // up to 15 bytes alignment
uint8_t * m_Buf;
2018-01-06 06:48:51 +03:00
};
2014-11-18 20:11:45 +03:00
#if SUPPORTS_AES
2014-05-07 23:40:24 +04:00
class ECBCryptoAESNI
2018-01-06 06:48:51 +03:00
{
2014-05-09 05:43:08 +04:00
public:
2014-05-13 06:51:59 +04:00
uint8_t * GetKeySchedule () { return m_KeySchedule; };
2014-11-18 20:11:45 +03:00
protected:
2014-11-02 04:53:45 +03:00
void ExpandKey (const AESKey& key);
2018-01-06 06:48:51 +03:00
2014-11-18 20:11:45 +03:00
private:
AESAlignedBuffer<240> m_KeySchedule; // 14 rounds for AES-256, 240 bytes
2018-01-06 06:48:51 +03:00
};
#endif
#if SUPPORTS_AES
class ECBEncryption: public ECBCryptoAESNI
#else
2014-05-09 00:49:00 +04:00
class ECBEncryption
#endif
2014-05-09 00:49:00 +04:00
{
public:
2018-01-06 06:48:51 +03:00
void SetKey (const AESKey& key);
void Encrypt(const ChipherBlock * in, ChipherBlock * out);
2014-05-09 00:49:00 +04:00
private:
AES_KEY m_Key;
2018-01-06 06:48:51 +03:00
};
2014-05-09 00:49:00 +04:00
#if SUPPORTS_AES
class ECBDecryption: public ECBCryptoAESNI
#else
2014-05-09 00:49:00 +04:00
class ECBDecryption
#endif
2014-05-09 00:49:00 +04:00
{
public:
2018-01-06 06:48:51 +03:00
void SetKey (const AESKey& key);
void Decrypt (const ChipherBlock * in, ChipherBlock * out);
2014-05-09 00:49:00 +04:00
private:
2015-11-03 17:15:49 +03:00
AES_KEY m_Key;
2018-01-06 06:48:51 +03:00
};
2014-05-09 00:49:00 +04:00
2014-05-06 20:22:22 +04:00
class CBCEncryption
{
public:
2018-01-06 06:48:51 +03:00
2016-11-22 05:13:13 +03:00
CBCEncryption () { memset ((uint8_t *)m_LastBlock, 0, 16); };
2014-05-06 20:22:22 +04:00
2014-11-02 04:53:45 +03:00
void SetKey (const AESKey& key) { m_ECBEncryption.SetKey (key); }; // 32 bytes
2016-11-22 05:13:13 +03:00
void SetIV (const uint8_t * iv) { memcpy ((uint8_t *)m_LastBlock, iv, 16); }; // 16 bytes
2018-06-13 21:56:51 +03:00
void GetIV (uint8_t * iv) const { memcpy (iv, (const uint8_t *)m_LastBlock, 16); };
2014-05-06 20:22:22 +04:00
void Encrypt (int numBlocks, const ChipherBlock * in, ChipherBlock * out);
void Encrypt (const uint8_t * in, std::size_t len, uint8_t * out);
2014-05-14 22:54:01 +04:00
void Encrypt (const uint8_t * in, uint8_t * out); // one block
2014-05-06 20:22:22 +04:00
ECBEncryption & ECB() { return m_ECBEncryption; }
2014-05-06 20:22:22 +04:00
private:
2016-11-22 05:13:13 +03:00
AESAlignedBuffer<16> m_LastBlock;
2018-01-06 06:48:51 +03:00
2014-05-09 05:43:08 +04:00
ECBEncryption m_ECBEncryption;
2014-05-06 20:22:22 +04:00
};
class CBCDecryption
{
public:
2018-01-06 06:48:51 +03:00
2016-11-22 05:13:13 +03:00
CBCDecryption () { memset ((uint8_t *)m_IV, 0, 16); };
2014-05-06 20:22:22 +04:00
2014-11-02 04:53:45 +03:00
void SetKey (const AESKey& key) { m_ECBDecryption.SetKey (key); }; // 32 bytes
2016-11-22 05:13:13 +03:00
void SetIV (const uint8_t * iv) { memcpy ((uint8_t *)m_IV, iv, 16); }; // 16 bytes
2018-06-13 21:56:51 +03:00
void GetIV (uint8_t * iv) const { memcpy (iv, (const uint8_t *)m_IV, 16); };
2014-05-06 20:22:22 +04:00
void Decrypt (int numBlocks, const ChipherBlock * in, ChipherBlock * out);
void Decrypt (const uint8_t * in, std::size_t len, uint8_t * out);
2014-05-14 22:54:01 +04:00
void Decrypt (const uint8_t * in, uint8_t * out); // one block
2014-05-06 20:22:22 +04:00
ECBDecryption & ECB() { return m_ECBDecryption; }
2014-05-06 20:22:22 +04:00
private:
2016-11-22 05:13:13 +03:00
AESAlignedBuffer<16> m_IV;
2014-05-09 05:43:08 +04:00
ECBDecryption m_ECBDecryption;
2018-01-06 06:48:51 +03:00
};
2014-05-15 19:21:41 +04:00
class TunnelEncryption // with double IV encryption
{
public:
2014-11-02 04:53:45 +03:00
void SetKeys (const AESKey& layerKey, const AESKey& ivKey)
2014-05-15 19:21:41 +04:00
{
m_LayerEncryption.SetKey (layerKey);
m_IVEncryption.SetKey (ivKey);
2018-01-06 06:48:51 +03:00
}
2014-05-15 19:21:41 +04:00
2018-01-06 06:48:51 +03:00
void Encrypt (const uint8_t * in, uint8_t * out); // 1024 bytes (16 IV + 1008 data)
2014-05-15 19:21:41 +04:00
private:
ECBEncryption m_IVEncryption;
CBCEncryption m_LayerEncryption;
};
class TunnelDecryption // with double IV encryption
{
public:
2014-11-02 04:53:45 +03:00
void SetKeys (const AESKey& layerKey, const AESKey& ivKey)
2014-05-15 19:21:41 +04:00
{
m_LayerDecryption.SetKey (layerKey);
m_IVDecryption.SetKey (ivKey);
2018-01-06 06:48:51 +03:00
}
2014-05-15 19:21:41 +04:00
2018-01-06 06:48:51 +03:00
void Decrypt (const uint8_t * in, uint8_t * out); // 1024 bytes (16 IV + 1008 data)
2014-05-15 19:21:41 +04:00
private:
ECBDecryption m_IVDecryption;
CBCDecryption m_LayerDecryption;
2018-01-06 06:48:51 +03:00
};
2018-06-13 18:41:46 +03:00
// AEAD/ChaCha20/Poly1305
bool AEADChaCha20Poly1305 (const uint8_t * msg, size_t msgLen, const uint8_t * ad, size_t adLen, const uint8_t * key, const uint8_t * nonce, uint8_t * buf, size_t len, bool encrypt); // msgLen is len without tag
2018-12-04 20:54:48 +03:00
void AEADChaCha20Poly1305Encrypt (const std::vector<std::pair<uint8_t *, size_t> >& bufs, const uint8_t * key, const uint8_t * nonce, uint8_t * mac); // encrypt multiple buffers with zero ad
2019-03-15 19:25:20 +03:00
// ChaCha20
2019-02-28 21:31:51 +03:00
void ChaCha20 (const uint8_t * msg, size_t msgLen, const uint8_t * key, const uint8_t * nonce, uint8_t * out);
2019-03-15 19:25:20 +03:00
// HKDF
void HKDF (const uint8_t * salt, const uint8_t * key, size_t keyLen, const std::string& info, uint8_t * out, size_t outLen = 64); // salt - 32, out - 32 or 64, info <= 32
2019-03-15 19:25:20 +03:00
2020-10-29 04:53:11 +03:00
// Noise
struct NoiseSymmetricState
{
uint8_t m_H[32] /*h*/, m_CK[64] /*[ck, k]*/;
2020-10-29 04:53:11 +03:00
void MixHash (const uint8_t * buf, size_t len);
2022-03-08 02:20:06 +03:00
void MixHash (const std::vector<std::pair<uint8_t *, size_t> >& bufs);
void MixKey (const uint8_t * sharedSecret);
};
void InitNoiseNState (NoiseSymmetricState& state, const uint8_t * pub); // Noise_N (tunnels, router)
void InitNoiseXKState (NoiseSymmetricState& state, const uint8_t * pub); // Noise_XK (NTCP2)
2022-02-05 23:58:39 +03:00
void InitNoiseXKState1 (NoiseSymmetricState& state, const uint8_t * pub); // Noise_XK (SSU2)
void InitNoiseIKState (NoiseSymmetricState& state, const uint8_t * pub); // Noise_IK (ratchets)
2018-06-13 18:41:46 +03:00
// init and terminate
void InitCrypto (bool precomputation, bool aesni, bool force);
2016-01-01 00:02:10 +03:00
void TerminateCrypto ();
2018-01-06 06:48:51 +03:00
}
}
2016-10-12 19:31:27 +03:00
2014-05-06 20:22:22 +04:00
#endif