2008-10-26 18:40:52 +00:00
|
|
|
/*
|
|
|
|
* Implement J-PAKE, as described in
|
|
|
|
* http://grouper.ieee.org/groups/1363/Research/contributions/hao-ryan-2008.pdf
|
|
|
|
*
|
|
|
|
* With hints from http://www.cl.cam.ac.uk/~fh240/software/JPAKE2.java.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef HEADER_JPAKE_H
|
|
|
|
#define HEADER_JPAKE_H
|
|
|
|
|
2008-11-12 17:28:18 +00:00
|
|
|
#include <openssl/opensslconf.h>
|
|
|
|
|
2008-11-24 17:27:08 +00:00
|
|
|
#ifdef OPENSSL_NO_JPAKE
|
|
|
|
#error JPAKE is disabled.
|
|
|
|
#endif
|
|
|
|
|
2008-10-26 18:40:52 +00:00
|
|
|
#ifdef __cplusplus
|
|
|
|
extern "C" {
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#include <openssl/bn.h>
|
|
|
|
#include <openssl/sha.h>
|
|
|
|
|
|
|
|
typedef struct JPAKE_CTX JPAKE_CTX;
|
|
|
|
|
2008-10-27 12:02:52 +00:00
|
|
|
/* Note that "g" in the ZKPs is not necessarily the J-PAKE g. */
|
2008-10-26 18:40:52 +00:00
|
|
|
typedef struct
|
|
|
|
{
|
2008-10-27 12:02:52 +00:00
|
|
|
BIGNUM *gr; /* g^r (r random) */
|
|
|
|
BIGNUM *b; /* b = r - x*h, h=hash(g, g^r, g^x, name) */
|
2008-10-26 18:40:52 +00:00
|
|
|
} JPAKE_ZKP;
|
|
|
|
|
|
|
|
typedef struct
|
|
|
|
{
|
2008-10-27 12:02:52 +00:00
|
|
|
BIGNUM *gx; /* g^x in step 1, g^(xa + xc + xd) * xb * s in step 2 */
|
|
|
|
JPAKE_ZKP zkpx; /* ZKP(x) or ZKP(xb * s) */
|
2008-10-26 18:40:52 +00:00
|
|
|
} JPAKE_STEP_PART;
|
|
|
|
|
|
|
|
typedef struct
|
|
|
|
{
|
2008-10-27 12:02:52 +00:00
|
|
|
JPAKE_STEP_PART p1; /* g^x3, ZKP(x3) or g^x1, ZKP(x1) */
|
|
|
|
JPAKE_STEP_PART p2; /* g^x4, ZKP(x4) or g^x2, ZKP(x2) */
|
2008-10-26 18:40:52 +00:00
|
|
|
} JPAKE_STEP1;
|
|
|
|
|
|
|
|
typedef JPAKE_STEP_PART JPAKE_STEP2;
|
|
|
|
|
|
|
|
typedef struct
|
|
|
|
{
|
|
|
|
unsigned char hhk[SHA_DIGEST_LENGTH];
|
|
|
|
} JPAKE_STEP3A;
|
|
|
|
|
|
|
|
typedef struct
|
|
|
|
{
|
|
|
|
unsigned char hk[SHA_DIGEST_LENGTH];
|
|
|
|
} JPAKE_STEP3B;
|
|
|
|
|
2008-10-27 12:02:52 +00:00
|
|
|
/* Parameters are copied */
|
2008-10-26 18:40:52 +00:00
|
|
|
JPAKE_CTX *JPAKE_CTX_new(const char *name, const char *peer_name,
|
|
|
|
const BIGNUM *p, const BIGNUM *g, const BIGNUM *q,
|
|
|
|
const BIGNUM *secret);
|
|
|
|
void JPAKE_CTX_free(JPAKE_CTX *ctx);
|
|
|
|
|
2008-10-27 12:02:52 +00:00
|
|
|
/*
|
|
|
|
* Note that JPAKE_STEP1 can be used multiple times before release
|
|
|
|
* without another init.
|
|
|
|
*/
|
2008-10-26 18:40:52 +00:00
|
|
|
void JPAKE_STEP1_init(JPAKE_STEP1 *s1);
|
|
|
|
int JPAKE_STEP1_generate(JPAKE_STEP1 *send, JPAKE_CTX *ctx);
|
|
|
|
int JPAKE_STEP1_process(JPAKE_CTX *ctx, const JPAKE_STEP1 *received);
|
|
|
|
void JPAKE_STEP1_release(JPAKE_STEP1 *s1);
|
|
|
|
|
2008-10-27 12:02:52 +00:00
|
|
|
/*
|
|
|
|
* Note that JPAKE_STEP2 can be used multiple times before release
|
|
|
|
* without another init.
|
|
|
|
*/
|
2008-10-26 18:40:52 +00:00
|
|
|
void JPAKE_STEP2_init(JPAKE_STEP2 *s2);
|
|
|
|
int JPAKE_STEP2_generate(JPAKE_STEP2 *send, JPAKE_CTX *ctx);
|
|
|
|
int JPAKE_STEP2_process(JPAKE_CTX *ctx, const JPAKE_STEP2 *received);
|
|
|
|
void JPAKE_STEP2_release(JPAKE_STEP2 *s2);
|
|
|
|
|
2008-10-27 12:02:52 +00:00
|
|
|
/*
|
|
|
|
* Optionally verify the shared key. If the shared secrets do not
|
|
|
|
* match, the two ends will disagree about the shared key, but
|
|
|
|
* otherwise the protocol will succeed.
|
|
|
|
*/
|
2008-10-26 18:40:52 +00:00
|
|
|
void JPAKE_STEP3A_init(JPAKE_STEP3A *s3a);
|
|
|
|
int JPAKE_STEP3A_generate(JPAKE_STEP3A *send, JPAKE_CTX *ctx);
|
|
|
|
int JPAKE_STEP3A_process(JPAKE_CTX *ctx, const JPAKE_STEP3A *received);
|
|
|
|
void JPAKE_STEP3A_release(JPAKE_STEP3A *s3a);
|
|
|
|
|
|
|
|
void JPAKE_STEP3B_init(JPAKE_STEP3B *s3b);
|
|
|
|
int JPAKE_STEP3B_generate(JPAKE_STEP3B *send, JPAKE_CTX *ctx);
|
|
|
|
int JPAKE_STEP3B_process(JPAKE_CTX *ctx, const JPAKE_STEP3B *received);
|
|
|
|
void JPAKE_STEP3B_release(JPAKE_STEP3B *s3b);
|
|
|
|
|
2008-10-27 12:02:52 +00:00
|
|
|
/*
|
|
|
|
* the return value belongs to the library and will be released when
|
|
|
|
* ctx is released, and will change when a new handshake is performed.
|
|
|
|
*/
|
2008-10-26 18:40:52 +00:00
|
|
|
const BIGNUM *JPAKE_get_shared_key(JPAKE_CTX *ctx);
|
|
|
|
|
|
|
|
/* BEGIN ERROR CODES */
|
|
|
|
/* The following lines are auto generated by the script mkerr.pl. Any changes
|
|
|
|
* made after this point may be overwritten when the script is next run.
|
|
|
|
*/
|
|
|
|
void ERR_load_JPAKE_strings(void);
|
|
|
|
|
|
|
|
/* Error codes for the JPAKE functions. */
|
|
|
|
|
|
|
|
/* Function codes. */
|
|
|
|
#define JPAKE_F_JPAKE_STEP1_PROCESS 101
|
|
|
|
#define JPAKE_F_JPAKE_STEP2_PROCESS 102
|
|
|
|
#define JPAKE_F_JPAKE_STEP3A_PROCESS 103
|
|
|
|
#define JPAKE_F_JPAKE_STEP3B_PROCESS 104
|
|
|
|
#define JPAKE_F_VERIFY_ZKP 100
|
|
|
|
|
|
|
|
/* Reason codes. */
|
2010-11-29 18:32:05 +00:00
|
|
|
#define JPAKE_R_G_TO_THE_X3_IS_NOT_LEGAL 108
|
|
|
|
#define JPAKE_R_G_TO_THE_X4_IS_NOT_LEGAL 109
|
2008-10-26 18:40:52 +00:00
|
|
|
#define JPAKE_R_G_TO_THE_X4_IS_ONE 105
|
|
|
|
#define JPAKE_R_HASH_OF_HASH_OF_KEY_MISMATCH 106
|
|
|
|
#define JPAKE_R_HASH_OF_KEY_MISMATCH 107
|
|
|
|
#define JPAKE_R_VERIFY_B_FAILED 102
|
|
|
|
#define JPAKE_R_VERIFY_X3_FAILED 103
|
|
|
|
#define JPAKE_R_VERIFY_X4_FAILED 104
|
|
|
|
#define JPAKE_R_ZKP_VERIFY_FAILED 100
|
|
|
|
|
|
|
|
#ifdef __cplusplus
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
#endif
|