djm@openbsd.org | 523463a | 2015-02-16 22:13:32 +0000 | [diff] [blame] | 1 | /* $OpenBSD: kex.h,v 1.71 2015/02/16 22:13:32 djm Exp $ */ |
Ben Lindstrom | 36579d3 | 2001-01-29 07:39:26 +0000 | [diff] [blame] | 2 | |
Damien Miller | 33b1356 | 2000-04-04 14:38:59 +1000 | [diff] [blame] | 3 | /* |
Ben Lindstrom | 4469723 | 2001-07-04 03:32:30 +0000 | [diff] [blame] | 4 | * Copyright (c) 2000, 2001 Markus Friedl. All rights reserved. |
Damien Miller | 33b1356 | 2000-04-04 14:38:59 +1000 | [diff] [blame] | 5 | * |
| 6 | * Redistribution and use in source and binary forms, with or without |
| 7 | * modification, are permitted provided that the following conditions |
| 8 | * are met: |
| 9 | * 1. Redistributions of source code must retain the above copyright |
| 10 | * notice, this list of conditions and the following disclaimer. |
| 11 | * 2. Redistributions in binary form must reproduce the above copyright |
| 12 | * notice, this list of conditions and the following disclaimer in the |
| 13 | * documentation and/or other materials provided with the distribution. |
Damien Miller | 33b1356 | 2000-04-04 14:38:59 +1000 | [diff] [blame] | 14 | * |
| 15 | * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR |
| 16 | * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES |
| 17 | * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. |
| 18 | * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, |
| 19 | * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
| 20 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
| 21 | * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
| 22 | * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
| 23 | * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
| 24 | * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
| 25 | */ |
| 26 | #ifndef KEX_H |
| 27 | #define KEX_H |
| 28 | |
markus@openbsd.org | 128343b | 2015-01-13 19:31:40 +0000 | [diff] [blame] | 29 | #include "mac.h" |
djm@openbsd.org | 1129dcf | 2015-01-15 09:40:00 +0000 | [diff] [blame] | 30 | #include "buffer.h" /* XXX for typedef */ |
| 31 | #include "key.h" /* XXX for typedef */ |
markus@openbsd.org | 128343b | 2015-01-13 19:31:40 +0000 | [diff] [blame] | 32 | |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 33 | #ifdef WITH_LEAKMALLOC |
| 34 | #include "leakmalloc.h" |
Darren Tucker | 8ccb739 | 2010-09-10 12:28:24 +1000 | [diff] [blame] | 35 | #endif |
Ben Lindstrom | 06b33aa | 2001-02-15 03:01:59 +0000 | [diff] [blame] | 36 | |
Damien Miller | 773dda2 | 2015-01-30 23:10:17 +1100 | [diff] [blame] | 37 | #ifdef WITH_OPENSSL |
| 38 | # ifdef OPENSSL_HAS_ECC |
| 39 | # include <openssl/ec.h> |
| 40 | # else /* OPENSSL_HAS_ECC */ |
| 41 | # define EC_KEY void |
| 42 | # define EC_GROUP void |
| 43 | # define EC_POINT void |
| 44 | # endif /* OPENSSL_HAS_ECC */ |
| 45 | #else /* WITH_OPENSSL */ |
| 46 | # define EC_KEY void |
| 47 | # define EC_GROUP void |
| 48 | # define EC_POINT void |
| 49 | #endif /* WITH_OPENSSL */ |
| 50 | |
Darren Tucker | 5b48cdd | 2009-06-21 18:15:25 +1000 | [diff] [blame] | 51 | #define KEX_COOKIE_LEN 16 |
| 52 | |
Damien Miller | 19bb3a5 | 2005-11-05 15:19:35 +1100 | [diff] [blame] | 53 | #define KEX_DH1 "diffie-hellman-group1-sha1" |
| 54 | #define KEX_DH14 "diffie-hellman-group14-sha1" |
| 55 | #define KEX_DHGEX_SHA1 "diffie-hellman-group-exchange-sha1" |
Damien Miller | a63128d | 2006-03-15 12:08:28 +1100 | [diff] [blame] | 56 | #define KEX_DHGEX_SHA256 "diffie-hellman-group-exchange-sha256" |
Darren Tucker | 36331b5 | 2010-01-08 16:50:41 +1100 | [diff] [blame] | 57 | #define KEX_RESUME "resume@appgate.com" |
Damien Miller | ea11119 | 2013-04-23 19:24:32 +1000 | [diff] [blame] | 58 | #define KEX_ECDH_SHA2_NISTP256 "ecdh-sha2-nistp256" |
| 59 | #define KEX_ECDH_SHA2_NISTP384 "ecdh-sha2-nistp384" |
| 60 | #define KEX_ECDH_SHA2_NISTP521 "ecdh-sha2-nistp521" |
Damien Miller | 1e12426 | 2013-11-04 08:26:52 +1100 | [diff] [blame] | 61 | #define KEX_CURVE25519_SHA256 "curve25519-sha256@libssh.org" |
Damien Miller | 33b1356 | 2000-04-04 14:38:59 +1000 | [diff] [blame] | 62 | |
Damien Miller | 9786e6e | 2005-07-26 21:54:56 +1000 | [diff] [blame] | 63 | #define COMP_NONE 0 |
| 64 | #define COMP_ZLIB 1 |
| 65 | #define COMP_DELAYED 2 |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 66 | |
| 67 | #define CURVE25519_SIZE 32 |
Damien Miller | 9786e6e | 2005-07-26 21:54:56 +1000 | [diff] [blame] | 68 | |
Damien Miller | 33b1356 | 2000-04-04 14:38:59 +1000 | [diff] [blame] | 69 | enum kex_init_proposals { |
| 70 | PROPOSAL_KEX_ALGS, |
| 71 | PROPOSAL_SERVER_HOST_KEY_ALGS, |
| 72 | PROPOSAL_ENC_ALGS_CTOS, |
| 73 | PROPOSAL_ENC_ALGS_STOC, |
| 74 | PROPOSAL_MAC_ALGS_CTOS, |
| 75 | PROPOSAL_MAC_ALGS_STOC, |
| 76 | PROPOSAL_COMP_ALGS_CTOS, |
| 77 | PROPOSAL_COMP_ALGS_STOC, |
| 78 | PROPOSAL_LANG_CTOS, |
| 79 | PROPOSAL_LANG_STOC, |
| 80 | PROPOSAL_MAX |
| 81 | }; |
| 82 | |
| 83 | enum kex_modes { |
| 84 | MODE_IN, |
| 85 | MODE_OUT, |
| 86 | MODE_MAX |
| 87 | }; |
| 88 | |
Damien Miller | 874d77b | 2000-10-14 16:23:11 +1100 | [diff] [blame] | 89 | enum kex_exchange { |
Damien Miller | 8e7fb33 | 2003-02-24 12:03:03 +1100 | [diff] [blame] | 90 | KEX_DH_GRP1_SHA1, |
Damien Miller | f675fc4 | 2004-06-15 10:30:09 +1000 | [diff] [blame] | 91 | KEX_DH_GRP14_SHA1, |
Damien Miller | 8e7fb33 | 2003-02-24 12:03:03 +1100 | [diff] [blame] | 92 | KEX_DH_GEX_SHA1, |
Damien Miller | a63128d | 2006-03-15 12:08:28 +1100 | [diff] [blame] | 93 | KEX_DH_GEX_SHA256, |
Damien Miller | eb8b60e | 2010-08-31 22:41:14 +1000 | [diff] [blame] | 94 | KEX_ECDH_SHA2, |
Damien Miller | 1e12426 | 2013-11-04 08:26:52 +1100 | [diff] [blame] | 95 | KEX_C25519_SHA256, |
Damien Miller | 8e7fb33 | 2003-02-24 12:03:03 +1100 | [diff] [blame] | 96 | KEX_MAX |
Damien Miller | 874d77b | 2000-10-14 16:23:11 +1100 | [diff] [blame] | 97 | }; |
Kevin Steves | ef4eea9 | 2001-02-05 12:42:17 +0000 | [diff] [blame] | 98 | |
Ben Lindstrom | 2d90e00 | 2001-04-04 02:00:54 +0000 | [diff] [blame] | 99 | #define KEX_INIT_SENT 0x0001 |
| 100 | |
markus@openbsd.org | 091c302 | 2015-01-19 19:52:16 +0000 | [diff] [blame] | 101 | struct sshenc { |
Ben Lindstrom | 2d90e00 | 2001-04-04 02:00:54 +0000 | [diff] [blame] | 102 | char *name; |
markus@openbsd.org | 091c302 | 2015-01-19 19:52:16 +0000 | [diff] [blame] | 103 | const struct sshcipher *cipher; |
Ben Lindstrom | 2d90e00 | 2001-04-04 02:00:54 +0000 | [diff] [blame] | 104 | int enabled; |
Damien Miller | 963f6b2 | 2002-02-19 15:21:23 +1100 | [diff] [blame] | 105 | u_int key_len; |
Damien Miller | 1d75abf | 2013-01-09 16:12:19 +1100 | [diff] [blame] | 106 | u_int iv_len; |
Damien Miller | 963f6b2 | 2002-02-19 15:21:23 +1100 | [diff] [blame] | 107 | u_int block_size; |
Ben Lindstrom | 46c1622 | 2000-12-22 01:43:59 +0000 | [diff] [blame] | 108 | u_char *key; |
| 109 | u_char *iv; |
Damien Miller | 33b1356 | 2000-04-04 14:38:59 +1000 | [diff] [blame] | 110 | }; |
markus@openbsd.org | 091c302 | 2015-01-19 19:52:16 +0000 | [diff] [blame] | 111 | struct sshcomp { |
| 112 | u_int type; |
Ben Lindstrom | 2d90e00 | 2001-04-04 02:00:54 +0000 | [diff] [blame] | 113 | int enabled; |
| 114 | char *name; |
Damien Miller | 33b1356 | 2000-04-04 14:38:59 +1000 | [diff] [blame] | 115 | }; |
markus@openbsd.org | 091c302 | 2015-01-19 19:52:16 +0000 | [diff] [blame] | 116 | struct newkeys { |
| 117 | struct sshenc enc; |
| 118 | struct sshmac mac; |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 119 | struct sshcomp comp; |
Ben Lindstrom | 2d90e00 | 2001-04-04 02:00:54 +0000 | [diff] [blame] | 120 | }; |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 121 | |
| 122 | struct ssh; |
| 123 | |
markus@openbsd.org | 091c302 | 2015-01-19 19:52:16 +0000 | [diff] [blame] | 124 | struct kex { |
Ben Lindstrom | 2d90e00 | 2001-04-04 02:00:54 +0000 | [diff] [blame] | 125 | u_char *session_id; |
markus@openbsd.org | 091c302 | 2015-01-19 19:52:16 +0000 | [diff] [blame] | 126 | size_t session_id_len; |
| 127 | struct newkeys *newkeys[MODE_MAX]; |
Damien Miller | eccb9de | 2005-06-17 12:59:34 +1000 | [diff] [blame] | 128 | u_int we_need; |
Damien Miller | 76eea4a | 2014-01-26 09:37:25 +1100 | [diff] [blame] | 129 | u_int dh_need; |
Ben Lindstrom | 2d90e00 | 2001-04-04 02:00:54 +0000 | [diff] [blame] | 130 | int server; |
| 131 | char *name; |
| 132 | int hostkey_type; |
djm@openbsd.org | 5104db7 | 2015-01-26 06:10:03 +0000 | [diff] [blame] | 133 | int hostkey_nid; |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 134 | u_int kex_type; |
Darren Tucker | 36331b5 | 2010-01-08 16:50:41 +1100 | [diff] [blame] | 135 | int roaming; |
markus@openbsd.org | 091c302 | 2015-01-19 19:52:16 +0000 | [diff] [blame] | 136 | struct sshbuf *my; |
| 137 | struct sshbuf *peer; |
Damien Miller | 97c91f6 | 2006-04-23 12:08:37 +1000 | [diff] [blame] | 138 | sig_atomic_t done; |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 139 | u_int flags; |
Damien Miller | b3051d0 | 2014-01-10 10:58:53 +1100 | [diff] [blame] | 140 | int hash_alg; |
Damien Miller | ea11119 | 2013-04-23 19:24:32 +1000 | [diff] [blame] | 141 | int ec_nid; |
Ben Lindstrom | 2d90e00 | 2001-04-04 02:00:54 +0000 | [diff] [blame] | 142 | char *client_version_string; |
| 143 | char *server_version_string; |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 144 | int (*verify_host_key)(struct sshkey *, struct ssh *); |
djm@openbsd.org | 5104db7 | 2015-01-26 06:10:03 +0000 | [diff] [blame] | 145 | struct sshkey *(*load_host_public_key)(int, int, struct ssh *); |
| 146 | struct sshkey *(*load_host_private_key)(int, int, struct ssh *); |
djm@openbsd.org | 523463a | 2015-02-16 22:13:32 +0000 | [diff] [blame] | 147 | int (*host_key_index)(struct sshkey *, int, struct ssh *); |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 148 | int (*sign)(struct sshkey *, struct sshkey *, |
djm@openbsd.org | 523463a | 2015-02-16 22:13:32 +0000 | [diff] [blame] | 149 | u_char **, size_t *, const u_char *, size_t, u_int); |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 150 | int (*kex[KEX_MAX])(struct ssh *); |
| 151 | /* kex specific state */ |
| 152 | DH *dh; /* DH */ |
| 153 | u_int min, max, nbits; /* GEX */ |
| 154 | EC_KEY *ec_client_key; /* ECDH */ |
| 155 | const EC_GROUP *ec_group; /* ECDH */ |
| 156 | u_char c25519_client_key[CURVE25519_SIZE]; /* 25519 */ |
| 157 | u_char c25519_client_pubkey[CURVE25519_SIZE]; /* 25519 */ |
Damien Miller | 33b1356 | 2000-04-04 14:38:59 +1000 | [diff] [blame] | 158 | }; |
| 159 | |
Damien Miller | d5f62bf | 2010-09-24 22:11:14 +1000 | [diff] [blame] | 160 | int kex_names_valid(const char *); |
Damien Miller | 690d989 | 2013-11-08 12:16:49 +1100 | [diff] [blame] | 161 | char *kex_alg_list(char); |
Damien Miller | d5f62bf | 2010-09-24 22:11:14 +1000 | [diff] [blame] | 162 | |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 163 | int kex_new(struct ssh *, char *[PROPOSAL_MAX], struct kex **); |
| 164 | int kex_setup(struct ssh *, char *[PROPOSAL_MAX]); |
| 165 | void kex_free_newkeys(struct newkeys *); |
| 166 | void kex_free(struct kex *); |
Ben Lindstrom | 238abf6 | 2001-04-04 17:52:53 +0000 | [diff] [blame] | 167 | |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 168 | int kex_buf2prop(struct sshbuf *, int *, char ***); |
| 169 | int kex_prop2buf(struct sshbuf *, char *proposal[PROPOSAL_MAX]); |
| 170 | void kex_prop_free(char **); |
| 171 | |
| 172 | int kex_send_kexinit(struct ssh *); |
markus@openbsd.org | 3fdc88a | 2015-01-19 20:07:45 +0000 | [diff] [blame] | 173 | int kex_input_kexinit(int, u_int32_t, void *); |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 174 | int kex_derive_keys(struct ssh *, u_char *, u_int, const struct sshbuf *); |
| 175 | int kex_derive_keys_bn(struct ssh *, u_char *, u_int, const BIGNUM *); |
| 176 | int kex_send_newkeys(struct ssh *); |
Ben Lindstrom | 2d90e00 | 2001-04-04 02:00:54 +0000 | [diff] [blame] | 177 | |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 178 | int kexdh_client(struct ssh *); |
| 179 | int kexdh_server(struct ssh *); |
| 180 | int kexgex_client(struct ssh *); |
| 181 | int kexgex_server(struct ssh *); |
| 182 | int kexecdh_client(struct ssh *); |
| 183 | int kexecdh_server(struct ssh *); |
| 184 | int kexc25519_client(struct ssh *); |
| 185 | int kexc25519_server(struct ssh *); |
Damien Miller | 8e7fb33 | 2003-02-24 12:03:03 +1100 | [diff] [blame] | 186 | |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 187 | int kex_dh_hash(const char *, const char *, |
| 188 | const u_char *, size_t, const u_char *, size_t, const u_char *, size_t, |
| 189 | const BIGNUM *, const BIGNUM *, const BIGNUM *, u_char *, size_t *); |
Damien Miller | 1e12426 | 2013-11-04 08:26:52 +1100 | [diff] [blame] | 190 | |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 191 | int kexgex_hash(int, const char *, const char *, |
| 192 | const u_char *, size_t, const u_char *, size_t, const u_char *, size_t, |
| 193 | int, int, int, |
| 194 | const BIGNUM *, const BIGNUM *, const BIGNUM *, |
| 195 | const BIGNUM *, const BIGNUM *, |
| 196 | u_char *, size_t *); |
| 197 | |
| 198 | int kex_ecdh_hash(int, const EC_GROUP *, const char *, const char *, |
| 199 | const u_char *, size_t, const u_char *, size_t, const u_char *, size_t, |
| 200 | const EC_POINT *, const EC_POINT *, const BIGNUM *, u_char *, size_t *); |
| 201 | |
| 202 | int kex_c25519_hash(int, const char *, const char *, const char *, size_t, |
| 203 | const char *, size_t, const u_char *, size_t, const u_char *, const u_char *, |
| 204 | const u_char *, size_t, u_char *, size_t *); |
| 205 | |
| 206 | void kexc25519_keygen(u_char key[CURVE25519_SIZE], u_char pub[CURVE25519_SIZE]) |
Damien Miller | 686c7d9 | 2014-05-15 14:37:03 +1000 | [diff] [blame] | 207 | __attribute__((__bounded__(__minbytes__, 1, CURVE25519_SIZE))) |
| 208 | __attribute__((__bounded__(__minbytes__, 2, CURVE25519_SIZE))); |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 209 | int kexc25519_shared_key(const u_char key[CURVE25519_SIZE], |
| 210 | const u_char pub[CURVE25519_SIZE], struct sshbuf *out) |
Damien Miller | 686c7d9 | 2014-05-15 14:37:03 +1000 | [diff] [blame] | 211 | __attribute__((__bounded__(__minbytes__, 1, CURVE25519_SIZE))) |
| 212 | __attribute__((__bounded__(__minbytes__, 2, CURVE25519_SIZE))); |
Damien Miller | 8e7fb33 | 2003-02-24 12:03:03 +1100 | [diff] [blame] | 213 | |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 214 | int |
Darren Tucker | e4ab115 | 2004-05-24 10:14:24 +1000 | [diff] [blame] | 215 | derive_ssh1_session_id(BIGNUM *, BIGNUM *, u_int8_t[8], u_int8_t[16]); |
| 216 | |
Damien Miller | eb8b60e | 2010-08-31 22:41:14 +1000 | [diff] [blame] | 217 | #if defined(DEBUG_KEX) || defined(DEBUG_KEXDH) || defined(DEBUG_KEXECDH) |
Ben Lindstrom | 16ae3d0 | 2001-07-04 04:02:36 +0000 | [diff] [blame] | 218 | void dump_digest(char *, u_char *, int); |
Ben Lindstrom | 20d7c7b | 2001-04-04 01:56:17 +0000 | [diff] [blame] | 219 | #endif |
| 220 | |
Damien Miller | 773dda2 | 2015-01-30 23:10:17 +1100 | [diff] [blame] | 221 | #if !defined(WITH_OPENSSL) || !defined(OPENSSL_HAS_ECC) |
| 222 | # undef EC_KEY |
| 223 | # undef EC_GROUP |
| 224 | # undef EC_POINT |
| 225 | #endif |
| 226 | |
Damien Miller | 33b1356 | 2000-04-04 14:38:59 +1000 | [diff] [blame] | 227 | #endif |