| Greg Hartman | a2eb7b5 | 2016-02-03 09:59:44 -0800 | [diff] [blame] | 1 | /* $OpenBSD: kex.h,v 1.73 2015/07/30 00:01:34 djm Exp $ */ | 
| Greg Hartman | bd77cf7 | 2015-02-25 13:21:06 -0800 | [diff] [blame] | 2 |  | 
 | 3 | /* | 
 | 4 |  * Copyright (c) 2000, 2001 Markus Friedl.  All rights reserved. | 
 | 5 |  * | 
 | 6 |  * Redistribution and use in source and binary forms, with or without | 
 | 7 |  * modification, are permitted provided that the following conditions | 
 | 8 |  * are met: | 
 | 9 |  * 1. Redistributions of source code must retain the above copyright | 
 | 10 |  *    notice, this list of conditions and the following disclaimer. | 
 | 11 |  * 2. Redistributions in binary form must reproduce the above copyright | 
 | 12 |  *    notice, this list of conditions and the following disclaimer in the | 
 | 13 |  *    documentation and/or other materials provided with the distribution. | 
 | 14 |  * | 
 | 15 |  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR | 
 | 16 |  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES | 
 | 17 |  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. | 
 | 18 |  * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, | 
 | 19 |  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | 
 | 20 |  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, | 
 | 21 |  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY | 
 | 22 |  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT | 
 | 23 |  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF | 
 | 24 |  * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | 
 | 25 |  */ | 
 | 26 | #ifndef KEX_H | 
 | 27 | #define KEX_H | 
 | 28 |  | 
| Adam Langley | d059297 | 2015-03-30 14:49:51 -0700 | [diff] [blame] | 29 | #include "mac.h" | 
 | 30 | #include "buffer.h" /* XXX for typedef */ | 
 | 31 | #include "key.h" /* XXX for typedef */ | 
 | 32 |  | 
 | 33 | #ifdef WITH_LEAKMALLOC | 
 | 34 | #include "leakmalloc.h" | 
| Greg Hartman | bd77cf7 | 2015-02-25 13:21:06 -0800 | [diff] [blame] | 35 | #endif | 
 | 36 |  | 
| Adam Langley | d059297 | 2015-03-30 14:49:51 -0700 | [diff] [blame] | 37 | #ifdef WITH_OPENSSL | 
 | 38 | # ifdef OPENSSL_HAS_ECC | 
 | 39 | #  include <openssl/ec.h> | 
 | 40 | # else /* OPENSSL_HAS_ECC */ | 
 | 41 | #  define EC_KEY	void | 
 | 42 | #  define EC_GROUP	void | 
 | 43 | #  define EC_POINT	void | 
 | 44 | # endif /* OPENSSL_HAS_ECC */ | 
 | 45 | #else /* WITH_OPENSSL */ | 
 | 46 | # define EC_KEY		void | 
 | 47 | # define EC_GROUP	void | 
 | 48 | # define EC_POINT	void | 
 | 49 | #endif /* WITH_OPENSSL */ | 
 | 50 |  | 
| Greg Hartman | bd77cf7 | 2015-02-25 13:21:06 -0800 | [diff] [blame] | 51 | #define KEX_COOKIE_LEN	16 | 
 | 52 |  | 
 | 53 | #define	KEX_DH1			"diffie-hellman-group1-sha1" | 
 | 54 | #define	KEX_DH14		"diffie-hellman-group14-sha1" | 
 | 55 | #define	KEX_DHGEX_SHA1		"diffie-hellman-group-exchange-sha1" | 
 | 56 | #define	KEX_DHGEX_SHA256	"diffie-hellman-group-exchange-sha256" | 
 | 57 | #define	KEX_RESUME		"resume@appgate.com" | 
| Adam Langley | d059297 | 2015-03-30 14:49:51 -0700 | [diff] [blame] | 58 | #define	KEX_ECDH_SHA2_NISTP256	"ecdh-sha2-nistp256" | 
 | 59 | #define	KEX_ECDH_SHA2_NISTP384	"ecdh-sha2-nistp384" | 
 | 60 | #define	KEX_ECDH_SHA2_NISTP521	"ecdh-sha2-nistp521" | 
 | 61 | #define	KEX_CURVE25519_SHA256	"curve25519-sha256@libssh.org" | 
| Greg Hartman | bd77cf7 | 2015-02-25 13:21:06 -0800 | [diff] [blame] | 62 |  | 
 | 63 | #define COMP_NONE	0 | 
 | 64 | #define COMP_ZLIB	1 | 
 | 65 | #define COMP_DELAYED	2 | 
 | 66 |  | 
| Adam Langley | d059297 | 2015-03-30 14:49:51 -0700 | [diff] [blame] | 67 | #define CURVE25519_SIZE 32 | 
 | 68 |  | 
| Greg Hartman | bd77cf7 | 2015-02-25 13:21:06 -0800 | [diff] [blame] | 69 | enum kex_init_proposals { | 
 | 70 | 	PROPOSAL_KEX_ALGS, | 
 | 71 | 	PROPOSAL_SERVER_HOST_KEY_ALGS, | 
 | 72 | 	PROPOSAL_ENC_ALGS_CTOS, | 
 | 73 | 	PROPOSAL_ENC_ALGS_STOC, | 
 | 74 | 	PROPOSAL_MAC_ALGS_CTOS, | 
 | 75 | 	PROPOSAL_MAC_ALGS_STOC, | 
 | 76 | 	PROPOSAL_COMP_ALGS_CTOS, | 
 | 77 | 	PROPOSAL_COMP_ALGS_STOC, | 
 | 78 | 	PROPOSAL_LANG_CTOS, | 
 | 79 | 	PROPOSAL_LANG_STOC, | 
 | 80 | 	PROPOSAL_MAX | 
 | 81 | }; | 
 | 82 |  | 
 | 83 | enum kex_modes { | 
 | 84 | 	MODE_IN, | 
 | 85 | 	MODE_OUT, | 
 | 86 | 	MODE_MAX | 
 | 87 | }; | 
 | 88 |  | 
 | 89 | enum kex_exchange { | 
 | 90 | 	KEX_DH_GRP1_SHA1, | 
 | 91 | 	KEX_DH_GRP14_SHA1, | 
 | 92 | 	KEX_DH_GEX_SHA1, | 
 | 93 | 	KEX_DH_GEX_SHA256, | 
 | 94 | 	KEX_ECDH_SHA2, | 
| Adam Langley | d059297 | 2015-03-30 14:49:51 -0700 | [diff] [blame] | 95 | 	KEX_C25519_SHA256, | 
| Greg Hartman | bd77cf7 | 2015-02-25 13:21:06 -0800 | [diff] [blame] | 96 | 	KEX_MAX | 
 | 97 | }; | 
 | 98 |  | 
 | 99 | #define KEX_INIT_SENT	0x0001 | 
 | 100 |  | 
| Adam Langley | d059297 | 2015-03-30 14:49:51 -0700 | [diff] [blame] | 101 | struct sshenc { | 
| Greg Hartman | bd77cf7 | 2015-02-25 13:21:06 -0800 | [diff] [blame] | 102 | 	char	*name; | 
| Adam Langley | d059297 | 2015-03-30 14:49:51 -0700 | [diff] [blame] | 103 | 	const struct sshcipher *cipher; | 
| Greg Hartman | bd77cf7 | 2015-02-25 13:21:06 -0800 | [diff] [blame] | 104 | 	int	enabled; | 
 | 105 | 	u_int	key_len; | 
| Adam Langley | d059297 | 2015-03-30 14:49:51 -0700 | [diff] [blame] | 106 | 	u_int	iv_len; | 
| Greg Hartman | bd77cf7 | 2015-02-25 13:21:06 -0800 | [diff] [blame] | 107 | 	u_int	block_size; | 
 | 108 | 	u_char	*key; | 
 | 109 | 	u_char	*iv; | 
 | 110 | }; | 
| Adam Langley | d059297 | 2015-03-30 14:49:51 -0700 | [diff] [blame] | 111 | struct sshcomp { | 
 | 112 | 	u_int	type; | 
| Greg Hartman | bd77cf7 | 2015-02-25 13:21:06 -0800 | [diff] [blame] | 113 | 	int	enabled; | 
 | 114 | 	char	*name; | 
 | 115 | }; | 
| Adam Langley | d059297 | 2015-03-30 14:49:51 -0700 | [diff] [blame] | 116 | struct newkeys { | 
 | 117 | 	struct sshenc	enc; | 
 | 118 | 	struct sshmac	mac; | 
 | 119 | 	struct sshcomp  comp; | 
| Greg Hartman | bd77cf7 | 2015-02-25 13:21:06 -0800 | [diff] [blame] | 120 | }; | 
| Adam Langley | d059297 | 2015-03-30 14:49:51 -0700 | [diff] [blame] | 121 |  | 
 | 122 | struct ssh; | 
 | 123 |  | 
 | 124 | struct kex { | 
| Greg Hartman | bd77cf7 | 2015-02-25 13:21:06 -0800 | [diff] [blame] | 125 | 	u_char	*session_id; | 
| Adam Langley | d059297 | 2015-03-30 14:49:51 -0700 | [diff] [blame] | 126 | 	size_t	session_id_len; | 
 | 127 | 	struct newkeys	*newkeys[MODE_MAX]; | 
| Greg Hartman | bd77cf7 | 2015-02-25 13:21:06 -0800 | [diff] [blame] | 128 | 	u_int	we_need; | 
| Adam Langley | d059297 | 2015-03-30 14:49:51 -0700 | [diff] [blame] | 129 | 	u_int	dh_need; | 
| Greg Hartman | bd77cf7 | 2015-02-25 13:21:06 -0800 | [diff] [blame] | 130 | 	int	server; | 
 | 131 | 	char	*name; | 
 | 132 | 	int	hostkey_type; | 
| Adam Langley | d059297 | 2015-03-30 14:49:51 -0700 | [diff] [blame] | 133 | 	int	hostkey_nid; | 
 | 134 | 	u_int	kex_type; | 
| Greg Hartman | bd77cf7 | 2015-02-25 13:21:06 -0800 | [diff] [blame] | 135 | 	int	roaming; | 
| Adam Langley | d059297 | 2015-03-30 14:49:51 -0700 | [diff] [blame] | 136 | 	struct sshbuf *my; | 
 | 137 | 	struct sshbuf *peer; | 
| Greg Hartman | bd77cf7 | 2015-02-25 13:21:06 -0800 | [diff] [blame] | 138 | 	sig_atomic_t done; | 
| Adam Langley | d059297 | 2015-03-30 14:49:51 -0700 | [diff] [blame] | 139 | 	u_int	flags; | 
 | 140 | 	int	hash_alg; | 
 | 141 | 	int	ec_nid; | 
| Greg Hartman | bd77cf7 | 2015-02-25 13:21:06 -0800 | [diff] [blame] | 142 | 	char	*client_version_string; | 
 | 143 | 	char	*server_version_string; | 
| Greg Hartman | a2eb7b5 | 2016-02-03 09:59:44 -0800 | [diff] [blame] | 144 | 	char	*failed_choice; | 
| Adam Langley | d059297 | 2015-03-30 14:49:51 -0700 | [diff] [blame] | 145 | 	int	(*verify_host_key)(struct sshkey *, struct ssh *); | 
 | 146 | 	struct sshkey *(*load_host_public_key)(int, int, struct ssh *); | 
 | 147 | 	struct sshkey *(*load_host_private_key)(int, int, struct ssh *); | 
 | 148 | 	int	(*host_key_index)(struct sshkey *, int, struct ssh *); | 
 | 149 | 	int	(*sign)(struct sshkey *, struct sshkey *, | 
 | 150 | 	    u_char **, size_t *, const u_char *, size_t, u_int); | 
 | 151 | 	int	(*kex[KEX_MAX])(struct ssh *); | 
 | 152 | 	/* kex specific state */ | 
 | 153 | 	DH	*dh;			/* DH */ | 
 | 154 | 	u_int	min, max, nbits;	/* GEX */ | 
 | 155 | 	EC_KEY	*ec_client_key;		/* ECDH */ | 
 | 156 | 	const EC_GROUP *ec_group;	/* ECDH */ | 
 | 157 | 	u_char c25519_client_key[CURVE25519_SIZE]; /* 25519 */ | 
 | 158 | 	u_char c25519_client_pubkey[CURVE25519_SIZE]; /* 25519 */ | 
| Greg Hartman | bd77cf7 | 2015-02-25 13:21:06 -0800 | [diff] [blame] | 159 | }; | 
 | 160 |  | 
 | 161 | int	 kex_names_valid(const char *); | 
| Adam Langley | d059297 | 2015-03-30 14:49:51 -0700 | [diff] [blame] | 162 | char	*kex_alg_list(char); | 
| Greg Hartman | a2eb7b5 | 2016-02-03 09:59:44 -0800 | [diff] [blame] | 163 | char	*kex_names_cat(const char *, const char *); | 
 | 164 | int	 kex_assemble_names(const char *, char **); | 
| Greg Hartman | bd77cf7 | 2015-02-25 13:21:06 -0800 | [diff] [blame] | 165 |  | 
| Adam Langley | d059297 | 2015-03-30 14:49:51 -0700 | [diff] [blame] | 166 | int	 kex_new(struct ssh *, char *[PROPOSAL_MAX], struct kex **); | 
 | 167 | int	 kex_setup(struct ssh *, char *[PROPOSAL_MAX]); | 
 | 168 | void	 kex_free_newkeys(struct newkeys *); | 
 | 169 | void	 kex_free(struct kex *); | 
| Greg Hartman | bd77cf7 | 2015-02-25 13:21:06 -0800 | [diff] [blame] | 170 |  | 
| Adam Langley | d059297 | 2015-03-30 14:49:51 -0700 | [diff] [blame] | 171 | int	 kex_buf2prop(struct sshbuf *, int *, char ***); | 
 | 172 | int	 kex_prop2buf(struct sshbuf *, char *proposal[PROPOSAL_MAX]); | 
 | 173 | void	 kex_prop_free(char **); | 
| Greg Hartman | bd77cf7 | 2015-02-25 13:21:06 -0800 | [diff] [blame] | 174 |  | 
| Adam Langley | d059297 | 2015-03-30 14:49:51 -0700 | [diff] [blame] | 175 | int	 kex_send_kexinit(struct ssh *); | 
 | 176 | int	 kex_input_kexinit(int, u_int32_t, void *); | 
 | 177 | int	 kex_derive_keys(struct ssh *, u_char *, u_int, const struct sshbuf *); | 
 | 178 | int	 kex_derive_keys_bn(struct ssh *, u_char *, u_int, const BIGNUM *); | 
 | 179 | int	 kex_send_newkeys(struct ssh *); | 
| Greg Hartman | bd77cf7 | 2015-02-25 13:21:06 -0800 | [diff] [blame] | 180 |  | 
| Adam Langley | d059297 | 2015-03-30 14:49:51 -0700 | [diff] [blame] | 181 | int	 kexdh_client(struct ssh *); | 
 | 182 | int	 kexdh_server(struct ssh *); | 
 | 183 | int	 kexgex_client(struct ssh *); | 
 | 184 | int	 kexgex_server(struct ssh *); | 
 | 185 | int	 kexecdh_client(struct ssh *); | 
 | 186 | int	 kexecdh_server(struct ssh *); | 
 | 187 | int	 kexc25519_client(struct ssh *); | 
 | 188 | int	 kexc25519_server(struct ssh *); | 
| Greg Hartman | bd77cf7 | 2015-02-25 13:21:06 -0800 | [diff] [blame] | 189 |  | 
| Adam Langley | d059297 | 2015-03-30 14:49:51 -0700 | [diff] [blame] | 190 | int	 kex_dh_hash(const char *, const char *, | 
 | 191 |     const u_char *, size_t, const u_char *, size_t, const u_char *, size_t, | 
 | 192 |     const BIGNUM *, const BIGNUM *, const BIGNUM *, u_char *, size_t *); | 
| Greg Hartman | bd77cf7 | 2015-02-25 13:21:06 -0800 | [diff] [blame] | 193 |  | 
| Adam Langley | d059297 | 2015-03-30 14:49:51 -0700 | [diff] [blame] | 194 | int	 kexgex_hash(int, const char *, const char *, | 
 | 195 |     const u_char *, size_t, const u_char *, size_t, const u_char *, size_t, | 
 | 196 |     int, int, int, | 
 | 197 |     const BIGNUM *, const BIGNUM *, const BIGNUM *, | 
 | 198 |     const BIGNUM *, const BIGNUM *, | 
 | 199 |     u_char *, size_t *); | 
 | 200 |  | 
 | 201 | int kex_ecdh_hash(int, const EC_GROUP *, const char *, const char *, | 
 | 202 |     const u_char *, size_t, const u_char *, size_t, const u_char *, size_t, | 
 | 203 |     const EC_POINT *, const EC_POINT *, const BIGNUM *, u_char *, size_t *); | 
 | 204 |  | 
 | 205 | int	 kex_c25519_hash(int, const char *, const char *, const char *, size_t, | 
 | 206 |     const char *, size_t, const u_char *, size_t, const u_char *, const u_char *, | 
 | 207 |     const u_char *, size_t, u_char *, size_t *); | 
 | 208 |  | 
 | 209 | void	kexc25519_keygen(u_char key[CURVE25519_SIZE], u_char pub[CURVE25519_SIZE]) | 
 | 210 | 	__attribute__((__bounded__(__minbytes__, 1, CURVE25519_SIZE))) | 
 | 211 | 	__attribute__((__bounded__(__minbytes__, 2, CURVE25519_SIZE))); | 
 | 212 | int	kexc25519_shared_key(const u_char key[CURVE25519_SIZE], | 
 | 213 |     const u_char pub[CURVE25519_SIZE], struct sshbuf *out) | 
 | 214 | 	__attribute__((__bounded__(__minbytes__, 1, CURVE25519_SIZE))) | 
 | 215 | 	__attribute__((__bounded__(__minbytes__, 2, CURVE25519_SIZE))); | 
 | 216 |  | 
 | 217 | int | 
| Greg Hartman | bd77cf7 | 2015-02-25 13:21:06 -0800 | [diff] [blame] | 218 | derive_ssh1_session_id(BIGNUM *, BIGNUM *, u_int8_t[8], u_int8_t[16]); | 
 | 219 |  | 
 | 220 | #if defined(DEBUG_KEX) || defined(DEBUG_KEXDH) || defined(DEBUG_KEXECDH) | 
 | 221 | void	dump_digest(char *, u_char *, int); | 
 | 222 | #endif | 
 | 223 |  | 
| Adam Langley | d059297 | 2015-03-30 14:49:51 -0700 | [diff] [blame] | 224 | #if !defined(WITH_OPENSSL) || !defined(OPENSSL_HAS_ECC) | 
 | 225 | # undef EC_KEY | 
 | 226 | # undef EC_GROUP | 
 | 227 | # undef EC_POINT | 
 | 228 | #endif | 
 | 229 |  | 
| Greg Hartman | bd77cf7 | 2015-02-25 13:21:06 -0800 | [diff] [blame] | 230 | #endif |