djm@openbsd.org | bb956ea | 2019-01-23 00:30:41 +0000 | [diff] [blame] | 1 | /* $OpenBSD: kex.h,v 1.107 2019/01/23 00:30:41 djm Exp $ */ |
Ben Lindstrom | 36579d3 | 2001-01-29 07:39:26 +0000 | [diff] [blame] | 2 | |
Damien Miller | 33b1356 | 2000-04-04 14:38:59 +1000 | [diff] [blame] | 3 | /* |
Ben Lindstrom | 4469723 | 2001-07-04 03:32:30 +0000 | [diff] [blame] | 4 | * Copyright (c) 2000, 2001 Markus Friedl. All rights reserved. |
Damien Miller | 33b1356 | 2000-04-04 14:38:59 +1000 | [diff] [blame] | 5 | * |
| 6 | * Redistribution and use in source and binary forms, with or without |
| 7 | * modification, are permitted provided that the following conditions |
| 8 | * are met: |
| 9 | * 1. Redistributions of source code must retain the above copyright |
| 10 | * notice, this list of conditions and the following disclaimer. |
| 11 | * 2. Redistributions in binary form must reproduce the above copyright |
| 12 | * notice, this list of conditions and the following disclaimer in the |
| 13 | * documentation and/or other materials provided with the distribution. |
Damien Miller | 33b1356 | 2000-04-04 14:38:59 +1000 | [diff] [blame] | 14 | * |
| 15 | * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR |
| 16 | * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES |
| 17 | * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. |
| 18 | * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, |
| 19 | * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
| 20 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
| 21 | * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
| 22 | * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
| 23 | * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
| 24 | * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
| 25 | */ |
| 26 | #ifndef KEX_H |
| 27 | #define KEX_H |
| 28 | |
markus@openbsd.org | 128343b | 2015-01-13 19:31:40 +0000 | [diff] [blame] | 29 | #include "mac.h" |
djm@openbsd.org | dfd5916 | 2019-01-21 10:20:12 +0000 | [diff] [blame] | 30 | #include "crypto_api.h" |
markus@openbsd.org | 128343b | 2015-01-13 19:31:40 +0000 | [diff] [blame] | 31 | |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 32 | #ifdef WITH_LEAKMALLOC |
| 33 | #include "leakmalloc.h" |
Darren Tucker | 8ccb739 | 2010-09-10 12:28:24 +1000 | [diff] [blame] | 34 | #endif |
Damien Miller | d8337c5 | 2006-07-24 14:14:19 +1000 | [diff] [blame] | 35 | |
Damien Miller | 773dda2 | 2015-01-30 23:10:17 +1100 | [diff] [blame] | 36 | #ifdef WITH_OPENSSL |
| 37 | # ifdef OPENSSL_HAS_ECC |
| 38 | # include <openssl/ec.h> |
| 39 | # else /* OPENSSL_HAS_ECC */ |
| 40 | # define EC_KEY void |
| 41 | # define EC_GROUP void |
| 42 | # define EC_POINT void |
| 43 | # endif /* OPENSSL_HAS_ECC */ |
| 44 | #else /* WITH_OPENSSL */ |
Damien Miller | eef1447 | 2018-07-12 14:49:26 +1000 | [diff] [blame] | 45 | # define DH void |
| 46 | # define BIGNUM void |
Damien Miller | 773dda2 | 2015-01-30 23:10:17 +1100 | [diff] [blame] | 47 | # define EC_KEY void |
| 48 | # define EC_GROUP void |
| 49 | # define EC_POINT void |
| 50 | #endif /* WITH_OPENSSL */ |
| 51 | |
Darren Tucker | 5b48cdd | 2009-06-21 18:15:25 +1000 | [diff] [blame] | 52 | #define KEX_COOKIE_LEN 16 |
| 53 | |
djm@openbsd.org | b97739d | 2016-09-22 21:15:41 +0000 | [diff] [blame] | 54 | #define KEX_DH1 "diffie-hellman-group1-sha1" |
| 55 | #define KEX_DH14_SHA1 "diffie-hellman-group14-sha1" |
| 56 | #define KEX_DH14_SHA256 "diffie-hellman-group14-sha256" |
| 57 | #define KEX_DH16_SHA512 "diffie-hellman-group16-sha512" |
| 58 | #define KEX_DH18_SHA512 "diffie-hellman-group18-sha512" |
| 59 | #define KEX_DHGEX_SHA1 "diffie-hellman-group-exchange-sha1" |
| 60 | #define KEX_DHGEX_SHA256 "diffie-hellman-group-exchange-sha256" |
| 61 | #define KEX_ECDH_SHA2_NISTP256 "ecdh-sha2-nistp256" |
| 62 | #define KEX_ECDH_SHA2_NISTP384 "ecdh-sha2-nistp384" |
| 63 | #define KEX_ECDH_SHA2_NISTP521 "ecdh-sha2-nistp521" |
| 64 | #define KEX_CURVE25519_SHA256 "curve25519-sha256" |
| 65 | #define KEX_CURVE25519_SHA256_OLD "curve25519-sha256@libssh.org" |
djm@openbsd.org | dfd5916 | 2019-01-21 10:20:12 +0000 | [diff] [blame] | 66 | #define KEX_SNTRUP4591761X25519_SHA512 "sntrup4591761x25519-sha512@tinyssh.org" |
Damien Miller | 33b1356 | 2000-04-04 14:38:59 +1000 | [diff] [blame] | 67 | |
Damien Miller | 9786e6e | 2005-07-26 21:54:56 +1000 | [diff] [blame] | 68 | #define COMP_NONE 0 |
sf@openbsd.org | 984bacf | 2018-07-10 09:36:58 +0000 | [diff] [blame] | 69 | /* pre-auth compression (COMP_ZLIB) is only supported in the client */ |
sf@openbsd.org | ab39267 | 2018-07-06 09:06:14 +0000 | [diff] [blame] | 70 | #define COMP_ZLIB 1 |
sf@openbsd.org | 168b46f | 2018-07-09 13:37:10 +0000 | [diff] [blame] | 71 | #define COMP_DELAYED 2 |
Damien Miller | 9786e6e | 2005-07-26 21:54:56 +1000 | [diff] [blame] | 72 | |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 73 | #define CURVE25519_SIZE 32 |
| 74 | |
Damien Miller | 33b1356 | 2000-04-04 14:38:59 +1000 | [diff] [blame] | 75 | enum kex_init_proposals { |
| 76 | PROPOSAL_KEX_ALGS, |
| 77 | PROPOSAL_SERVER_HOST_KEY_ALGS, |
| 78 | PROPOSAL_ENC_ALGS_CTOS, |
| 79 | PROPOSAL_ENC_ALGS_STOC, |
| 80 | PROPOSAL_MAC_ALGS_CTOS, |
| 81 | PROPOSAL_MAC_ALGS_STOC, |
| 82 | PROPOSAL_COMP_ALGS_CTOS, |
| 83 | PROPOSAL_COMP_ALGS_STOC, |
| 84 | PROPOSAL_LANG_CTOS, |
| 85 | PROPOSAL_LANG_STOC, |
| 86 | PROPOSAL_MAX |
| 87 | }; |
| 88 | |
| 89 | enum kex_modes { |
| 90 | MODE_IN, |
| 91 | MODE_OUT, |
| 92 | MODE_MAX |
| 93 | }; |
| 94 | |
Damien Miller | 874d77b | 2000-10-14 16:23:11 +1100 | [diff] [blame] | 95 | enum kex_exchange { |
Damien Miller | 8e7fb33 | 2003-02-24 12:03:03 +1100 | [diff] [blame] | 96 | KEX_DH_GRP1_SHA1, |
Damien Miller | f675fc4 | 2004-06-15 10:30:09 +1000 | [diff] [blame] | 97 | KEX_DH_GRP14_SHA1, |
djm@openbsd.org | 0e8eeec | 2016-05-02 10:26:04 +0000 | [diff] [blame] | 98 | KEX_DH_GRP14_SHA256, |
| 99 | KEX_DH_GRP16_SHA512, |
| 100 | KEX_DH_GRP18_SHA512, |
Damien Miller | 8e7fb33 | 2003-02-24 12:03:03 +1100 | [diff] [blame] | 101 | KEX_DH_GEX_SHA1, |
Damien Miller | a63128d | 2006-03-15 12:08:28 +1100 | [diff] [blame] | 102 | KEX_DH_GEX_SHA256, |
Damien Miller | eb8b60e | 2010-08-31 22:41:14 +1000 | [diff] [blame] | 103 | KEX_ECDH_SHA2, |
Damien Miller | 1e12426 | 2013-11-04 08:26:52 +1100 | [diff] [blame] | 104 | KEX_C25519_SHA256, |
djm@openbsd.org | dfd5916 | 2019-01-21 10:20:12 +0000 | [diff] [blame] | 105 | KEX_KEM_SNTRUP4591761X25519_SHA512, |
Damien Miller | 8e7fb33 | 2003-02-24 12:03:03 +1100 | [diff] [blame] | 106 | KEX_MAX |
Damien Miller | 874d77b | 2000-10-14 16:23:11 +1100 | [diff] [blame] | 107 | }; |
Kevin Steves | ef4eea9 | 2001-02-05 12:42:17 +0000 | [diff] [blame] | 108 | |
Ben Lindstrom | 2d90e00 | 2001-04-04 02:00:54 +0000 | [diff] [blame] | 109 | #define KEX_INIT_SENT 0x0001 |
djm@openbsd.org | a6a0788 | 2018-12-07 03:39:40 +0000 | [diff] [blame] | 110 | #define KEX_INITIAL 0x0002 |
Ben Lindstrom | 2d90e00 | 2001-04-04 02:00:54 +0000 | [diff] [blame] | 111 | |
markus@openbsd.org | 091c302 | 2015-01-19 19:52:16 +0000 | [diff] [blame] | 112 | struct sshenc { |
Ben Lindstrom | 2d90e00 | 2001-04-04 02:00:54 +0000 | [diff] [blame] | 113 | char *name; |
markus@openbsd.org | 091c302 | 2015-01-19 19:52:16 +0000 | [diff] [blame] | 114 | const struct sshcipher *cipher; |
Ben Lindstrom | 2d90e00 | 2001-04-04 02:00:54 +0000 | [diff] [blame] | 115 | int enabled; |
Damien Miller | 963f6b2 | 2002-02-19 15:21:23 +1100 | [diff] [blame] | 116 | u_int key_len; |
Damien Miller | 1d75abf | 2013-01-09 16:12:19 +1100 | [diff] [blame] | 117 | u_int iv_len; |
Damien Miller | 963f6b2 | 2002-02-19 15:21:23 +1100 | [diff] [blame] | 118 | u_int block_size; |
Ben Lindstrom | 46c1622 | 2000-12-22 01:43:59 +0000 | [diff] [blame] | 119 | u_char *key; |
| 120 | u_char *iv; |
Damien Miller | 33b1356 | 2000-04-04 14:38:59 +1000 | [diff] [blame] | 121 | }; |
markus@openbsd.org | 091c302 | 2015-01-19 19:52:16 +0000 | [diff] [blame] | 122 | struct sshcomp { |
| 123 | u_int type; |
Ben Lindstrom | 2d90e00 | 2001-04-04 02:00:54 +0000 | [diff] [blame] | 124 | int enabled; |
| 125 | char *name; |
Damien Miller | 33b1356 | 2000-04-04 14:38:59 +1000 | [diff] [blame] | 126 | }; |
markus@openbsd.org | 091c302 | 2015-01-19 19:52:16 +0000 | [diff] [blame] | 127 | struct newkeys { |
| 128 | struct sshenc enc; |
| 129 | struct sshmac mac; |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 130 | struct sshcomp comp; |
Ben Lindstrom | 2d90e00 | 2001-04-04 02:00:54 +0000 | [diff] [blame] | 131 | }; |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 132 | |
| 133 | struct ssh; |
| 134 | |
markus@openbsd.org | 091c302 | 2015-01-19 19:52:16 +0000 | [diff] [blame] | 135 | struct kex { |
Ben Lindstrom | 2d90e00 | 2001-04-04 02:00:54 +0000 | [diff] [blame] | 136 | u_char *session_id; |
markus@openbsd.org | 091c302 | 2015-01-19 19:52:16 +0000 | [diff] [blame] | 137 | size_t session_id_len; |
| 138 | struct newkeys *newkeys[MODE_MAX]; |
Damien Miller | eccb9de | 2005-06-17 12:59:34 +1000 | [diff] [blame] | 139 | u_int we_need; |
Damien Miller | 76eea4a | 2014-01-26 09:37:25 +1100 | [diff] [blame] | 140 | u_int dh_need; |
Ben Lindstrom | 2d90e00 | 2001-04-04 02:00:54 +0000 | [diff] [blame] | 141 | int server; |
| 142 | char *name; |
markus@openbsd.org | 76c9fbb | 2015-12-04 16:41:28 +0000 | [diff] [blame] | 143 | char *hostkey_alg; |
Ben Lindstrom | 2d90e00 | 2001-04-04 02:00:54 +0000 | [diff] [blame] | 144 | int hostkey_type; |
djm@openbsd.org | 5104db7 | 2015-01-26 06:10:03 +0000 | [diff] [blame] | 145 | int hostkey_nid; |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 146 | u_int kex_type; |
djm@openbsd.org | 4ba0d54 | 2018-07-03 11:39:54 +0000 | [diff] [blame] | 147 | char *server_sig_algs; |
markus@openbsd.org | 76c9fbb | 2015-12-04 16:41:28 +0000 | [diff] [blame] | 148 | int ext_info_c; |
markus@openbsd.org | 091c302 | 2015-01-19 19:52:16 +0000 | [diff] [blame] | 149 | struct sshbuf *my; |
| 150 | struct sshbuf *peer; |
djm@openbsd.org | 0a843d9 | 2018-12-27 03:25:24 +0000 | [diff] [blame] | 151 | struct sshbuf *client_version; |
| 152 | struct sshbuf *server_version; |
Damien Miller | 97c91f6 | 2006-04-23 12:08:37 +1000 | [diff] [blame] | 153 | sig_atomic_t done; |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 154 | u_int flags; |
Damien Miller | b3051d0 | 2014-01-10 10:58:53 +1100 | [diff] [blame] | 155 | int hash_alg; |
Damien Miller | ea11119 | 2013-04-23 19:24:32 +1000 | [diff] [blame] | 156 | int ec_nid; |
djm@openbsd.org | f319912 | 2015-07-29 04:43:06 +0000 | [diff] [blame] | 157 | char *failed_choice; |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 158 | int (*verify_host_key)(struct sshkey *, struct ssh *); |
djm@openbsd.org | 5104db7 | 2015-01-26 06:10:03 +0000 | [diff] [blame] | 159 | struct sshkey *(*load_host_public_key)(int, int, struct ssh *); |
| 160 | struct sshkey *(*load_host_private_key)(int, int, struct ssh *); |
djm@openbsd.org | 523463a | 2015-02-16 22:13:32 +0000 | [diff] [blame] | 161 | int (*host_key_index)(struct sshkey *, int, struct ssh *); |
djm@openbsd.org | 04c091f | 2019-01-19 21:43:56 +0000 | [diff] [blame] | 162 | int (*sign)(struct ssh *, struct sshkey *, struct sshkey *, |
| 163 | u_char **, size_t *, const u_char *, size_t, const char *); |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 164 | int (*kex[KEX_MAX])(struct ssh *); |
| 165 | /* kex specific state */ |
| 166 | DH *dh; /* DH */ |
| 167 | u_int min, max, nbits; /* GEX */ |
| 168 | EC_KEY *ec_client_key; /* ECDH */ |
| 169 | const EC_GROUP *ec_group; /* ECDH */ |
djm@openbsd.org | dfd5916 | 2019-01-21 10:20:12 +0000 | [diff] [blame] | 170 | u_char c25519_client_key[CURVE25519_SIZE]; /* 25519 + KEM */ |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 171 | u_char c25519_client_pubkey[CURVE25519_SIZE]; /* 25519 */ |
djm@openbsd.org | dfd5916 | 2019-01-21 10:20:12 +0000 | [diff] [blame] | 172 | u_char sntrup4591761_client_key[crypto_kem_sntrup4591761_SECRETKEYBYTES]; /* KEM */ |
djm@openbsd.org | aaca72d | 2019-01-21 10:40:11 +0000 | [diff] [blame] | 173 | struct sshbuf *client_pub; |
Damien Miller | 33b1356 | 2000-04-04 14:38:59 +1000 | [diff] [blame] | 174 | }; |
| 175 | |
Damien Miller | d5f62bf | 2010-09-24 22:11:14 +1000 | [diff] [blame] | 176 | int kex_names_valid(const char *); |
Damien Miller | 690d989 | 2013-11-08 12:16:49 +1100 | [diff] [blame] | 177 | char *kex_alg_list(char); |
djm@openbsd.org | f9eca24 | 2015-07-30 00:01:34 +0000 | [diff] [blame] | 178 | char *kex_names_cat(const char *, const char *); |
djm@openbsd.org | 312d2f2 | 2018-07-04 13:49:31 +0000 | [diff] [blame] | 179 | int kex_assemble_names(char **, const char *, const char *); |
Damien Miller | d5f62bf | 2010-09-24 22:11:14 +1000 | [diff] [blame] | 180 | |
djm@openbsd.org | 0a843d9 | 2018-12-27 03:25:24 +0000 | [diff] [blame] | 181 | int kex_exchange_identification(struct ssh *, int, const char *); |
| 182 | |
| 183 | struct kex *kex_new(void); |
| 184 | int kex_ready(struct ssh *, char *[PROPOSAL_MAX]); |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 185 | int kex_setup(struct ssh *, char *[PROPOSAL_MAX]); |
| 186 | void kex_free_newkeys(struct newkeys *); |
| 187 | void kex_free(struct kex *); |
Ben Lindstrom | 238abf6 | 2001-04-04 17:52:53 +0000 | [diff] [blame] | 188 | |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 189 | int kex_buf2prop(struct sshbuf *, int *, char ***); |
| 190 | int kex_prop2buf(struct sshbuf *, char *proposal[PROPOSAL_MAX]); |
| 191 | void kex_prop_free(char **); |
djm@openbsd.org | bb39baf | 2019-01-21 10:05:09 +0000 | [diff] [blame] | 192 | int kex_load_hostkey(struct ssh *, struct sshkey **, struct sshkey **); |
djm@openbsd.org | b1b2ff4 | 2019-01-21 10:07:22 +0000 | [diff] [blame] | 193 | int kex_verify_host_key(struct ssh *, struct sshkey *); |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 194 | |
| 195 | int kex_send_kexinit(struct ssh *); |
markus@openbsd.org | 2ae666a | 2017-05-30 14:23:52 +0000 | [diff] [blame] | 196 | int kex_input_kexinit(int, u_int32_t, struct ssh *); |
| 197 | int kex_input_ext_info(int, u_int32_t, struct ssh *); |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 198 | int kex_derive_keys(struct ssh *, u_char *, u_int, const struct sshbuf *); |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 199 | int kex_send_newkeys(struct ssh *); |
djm@openbsd.org | 19bcf2e | 2016-02-08 10:57:07 +0000 | [diff] [blame] | 200 | int kex_start_rekex(struct ssh *); |
Damien Miller | 33b1356 | 2000-04-04 14:38:59 +1000 | [diff] [blame] | 201 | |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 202 | int kexgex_client(struct ssh *); |
| 203 | int kexgex_server(struct ssh *); |
djm@openbsd.org | aaca72d | 2019-01-21 10:40:11 +0000 | [diff] [blame] | 204 | int kex_gen_client(struct ssh *); |
| 205 | int kex_gen_server(struct ssh *); |
djm@openbsd.org | dfd5916 | 2019-01-21 10:20:12 +0000 | [diff] [blame] | 206 | |
djm@openbsd.org | 9c9c97e | 2019-01-21 10:28:01 +0000 | [diff] [blame] | 207 | int kex_dh_keypair(struct kex *); |
djm@openbsd.org | 71e67ff | 2019-01-21 10:35:09 +0000 | [diff] [blame] | 208 | int kex_dh_enc(struct kex *, const struct sshbuf *, struct sshbuf **, |
djm@openbsd.org | 9c9c97e | 2019-01-21 10:28:01 +0000 | [diff] [blame] | 209 | struct sshbuf **); |
djm@openbsd.org | 71e67ff | 2019-01-21 10:35:09 +0000 | [diff] [blame] | 210 | int kex_dh_dec(struct kex *, const struct sshbuf *, struct sshbuf **); |
djm@openbsd.org | 9c9c97e | 2019-01-21 10:28:01 +0000 | [diff] [blame] | 211 | |
djm@openbsd.org | 92dda34 | 2019-01-21 10:29:56 +0000 | [diff] [blame] | 212 | int kex_ecdh_keypair(struct kex *); |
djm@openbsd.org | 71e67ff | 2019-01-21 10:35:09 +0000 | [diff] [blame] | 213 | int kex_ecdh_enc(struct kex *, const struct sshbuf *, struct sshbuf **, |
djm@openbsd.org | 92dda34 | 2019-01-21 10:29:56 +0000 | [diff] [blame] | 214 | struct sshbuf **); |
djm@openbsd.org | 71e67ff | 2019-01-21 10:35:09 +0000 | [diff] [blame] | 215 | int kex_ecdh_dec(struct kex *, const struct sshbuf *, struct sshbuf **); |
djm@openbsd.org | 92dda34 | 2019-01-21 10:29:56 +0000 | [diff] [blame] | 216 | |
djm@openbsd.org | 2f6a9dd | 2019-01-21 10:24:09 +0000 | [diff] [blame] | 217 | int kex_c25519_keypair(struct kex *); |
djm@openbsd.org | 71e67ff | 2019-01-21 10:35:09 +0000 | [diff] [blame] | 218 | int kex_c25519_enc(struct kex *, const struct sshbuf *, struct sshbuf **, |
djm@openbsd.org | 2f6a9dd | 2019-01-21 10:24:09 +0000 | [diff] [blame] | 219 | struct sshbuf **); |
djm@openbsd.org | 71e67ff | 2019-01-21 10:35:09 +0000 | [diff] [blame] | 220 | int kex_c25519_dec(struct kex *, const struct sshbuf *, struct sshbuf **); |
djm@openbsd.org | 2f6a9dd | 2019-01-21 10:24:09 +0000 | [diff] [blame] | 221 | |
djm@openbsd.org | dfd5916 | 2019-01-21 10:20:12 +0000 | [diff] [blame] | 222 | int kex_kem_sntrup4591761x25519_keypair(struct kex *); |
djm@openbsd.org | 71e67ff | 2019-01-21 10:35:09 +0000 | [diff] [blame] | 223 | int kex_kem_sntrup4591761x25519_enc(struct kex *, const struct sshbuf *, |
djm@openbsd.org | dfd5916 | 2019-01-21 10:20:12 +0000 | [diff] [blame] | 224 | struct sshbuf **, struct sshbuf **); |
djm@openbsd.org | 71e67ff | 2019-01-21 10:35:09 +0000 | [diff] [blame] | 225 | int kex_kem_sntrup4591761x25519_dec(struct kex *, const struct sshbuf *, |
djm@openbsd.org | dfd5916 | 2019-01-21 10:20:12 +0000 | [diff] [blame] | 226 | struct sshbuf **); |
Damien Miller | 8e7fb33 | 2003-02-24 12:03:03 +1100 | [diff] [blame] | 227 | |
djm@openbsd.org | e93bd98 | 2019-01-21 10:00:23 +0000 | [diff] [blame] | 228 | int kex_dh_keygen(struct kex *); |
djm@openbsd.org | dec5e9d | 2019-01-21 10:03:37 +0000 | [diff] [blame] | 229 | int kex_dh_compute_key(struct kex *, BIGNUM *, struct sshbuf *); |
Damien Miller | 1e12426 | 2013-11-04 08:26:52 +1100 | [diff] [blame] | 230 | |
djm@openbsd.org | 0a843d9 | 2018-12-27 03:25:24 +0000 | [diff] [blame] | 231 | int kexgex_hash(int, const struct sshbuf *, const struct sshbuf *, |
djm@openbsd.org | bb956ea | 2019-01-23 00:30:41 +0000 | [diff] [blame] | 232 | const struct sshbuf *, const struct sshbuf *, const struct sshbuf *, |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 233 | int, int, int, |
| 234 | const BIGNUM *, const BIGNUM *, const BIGNUM *, |
djm@openbsd.org | dec5e9d | 2019-01-21 10:03:37 +0000 | [diff] [blame] | 235 | const BIGNUM *, const u_char *, size_t, |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 236 | u_char *, size_t *); |
| 237 | |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 238 | void kexc25519_keygen(u_char key[CURVE25519_SIZE], u_char pub[CURVE25519_SIZE]) |
Damien Miller | 686c7d9 | 2014-05-15 14:37:03 +1000 | [diff] [blame] | 239 | __attribute__((__bounded__(__minbytes__, 1, CURVE25519_SIZE))) |
| 240 | __attribute__((__bounded__(__minbytes__, 2, CURVE25519_SIZE))); |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 241 | int kexc25519_shared_key(const u_char key[CURVE25519_SIZE], |
| 242 | const u_char pub[CURVE25519_SIZE], struct sshbuf *out) |
Damien Miller | 686c7d9 | 2014-05-15 14:37:03 +1000 | [diff] [blame] | 243 | __attribute__((__bounded__(__minbytes__, 1, CURVE25519_SIZE))) |
| 244 | __attribute__((__bounded__(__minbytes__, 2, CURVE25519_SIZE))); |
djm@openbsd.org | dfd5916 | 2019-01-21 10:20:12 +0000 | [diff] [blame] | 245 | int kexc25519_shared_key_ext(const u_char key[CURVE25519_SIZE], |
| 246 | const u_char pub[CURVE25519_SIZE], struct sshbuf *out, int) |
| 247 | __attribute__((__bounded__(__minbytes__, 1, CURVE25519_SIZE))) |
| 248 | __attribute__((__bounded__(__minbytes__, 2, CURVE25519_SIZE))); |
Damien Miller | 8e7fb33 | 2003-02-24 12:03:03 +1100 | [diff] [blame] | 249 | |
Damien Miller | eb8b60e | 2010-08-31 22:41:14 +1000 | [diff] [blame] | 250 | #if defined(DEBUG_KEX) || defined(DEBUG_KEXDH) || defined(DEBUG_KEXECDH) |
djm@openbsd.org | dfd5916 | 2019-01-21 10:20:12 +0000 | [diff] [blame] | 251 | void dump_digest(const char *, const u_char *, int); |
Ben Lindstrom | 20d7c7b | 2001-04-04 01:56:17 +0000 | [diff] [blame] | 252 | #endif |
| 253 | |
Damien Miller | 773dda2 | 2015-01-30 23:10:17 +1100 | [diff] [blame] | 254 | #if !defined(WITH_OPENSSL) || !defined(OPENSSL_HAS_ECC) |
| 255 | # undef EC_KEY |
| 256 | # undef EC_GROUP |
| 257 | # undef EC_POINT |
| 258 | #endif |
| 259 | |
Damien Miller | 33b1356 | 2000-04-04 14:38:59 +1000 | [diff] [blame] | 260 | #endif |