2008-08-06 18:36:30 +00:00
|
|
|
// This file is part of BOINC.
|
2005-01-20 23:22:22 +00:00
|
|
|
// http://boinc.berkeley.edu
|
2008-08-06 18:36:30 +00:00
|
|
|
// Copyright (C) 2008 University of California
|
2003-09-03 05:42:33 +00:00
|
|
|
//
|
2008-08-06 18:36:30 +00:00
|
|
|
// BOINC is free software; you can redistribute it and/or modify it
|
|
|
|
// under the terms of the GNU Lesser General Public License
|
|
|
|
// as published by the Free Software Foundation,
|
|
|
|
// either version 3 of the License, or (at your option) any later version.
|
2003-09-03 05:42:33 +00:00
|
|
|
//
|
2008-08-06 18:36:30 +00:00
|
|
|
// BOINC is distributed in the hope that it will be useful,
|
2005-01-20 23:22:22 +00:00
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
|
|
|
|
// See the GNU Lesser General Public License for more details.
|
2003-06-11 23:36:48 +00:00
|
|
|
//
|
2008-08-06 18:36:30 +00:00
|
|
|
// You should have received a copy of the GNU Lesser General Public License
|
|
|
|
// along with BOINC. If not, see <http://www.gnu.org/licenses/>.
|
2003-06-11 23:36:48 +00:00
|
|
|
|
2017-04-08 06:54:49 +00:00
|
|
|
#ifndef BOINC_CRYPT_H
|
|
|
|
#define BOINC_CRYPT_H
|
2005-08-01 22:44:40 +00:00
|
|
|
|
|
|
|
// We're set up to use either RSAEuro or the OpenSSL crypto library.
|
|
|
|
// We use our own data structures (R_RSA_PUBLIC_KEY and R_RSA_PRIVATE_KEY)
|
|
|
|
// to store keys in either case.
|
|
|
|
|
2009-02-26 00:23:23 +00:00
|
|
|
#include <cstdio>
|
2002-07-07 20:39:24 +00:00
|
|
|
|
2005-08-01 22:44:40 +00:00
|
|
|
#include <openssl/rsa.h>
|
|
|
|
|
2016-06-27 16:26:27 +00:00
|
|
|
#if (OPENSSL_VERSION_NUMBER >= 0x10100000L) /* OpenSSL 1.1.0+ */
|
|
|
|
#define HAVE_OPAQUE_EVP_PKEY 1 /* since 1.1.0 -pre3 */
|
|
|
|
#define HAVE_OPAQUE_RSA_DSA_DH 1 /* since 1.1.0 -pre5 */
|
|
|
|
#endif
|
|
|
|
|
2005-08-01 22:44:40 +00:00
|
|
|
#define MAX_RSA_MODULUS_BITS 1024
|
|
|
|
#define MAX_RSA_MODULUS_LEN ((MAX_RSA_MODULUS_BITS + 7) / 8)
|
|
|
|
#define MAX_RSA_PRIME_BITS ((MAX_RSA_MODULUS_BITS + 1) / 2)
|
|
|
|
#define MAX_RSA_PRIME_LEN ((MAX_RSA_PRIME_BITS + 7) / 8)
|
|
|
|
|
|
|
|
typedef struct {
|
|
|
|
unsigned short int bits; /* length in bits of modulus */
|
|
|
|
unsigned char modulus[MAX_RSA_MODULUS_LEN]; /* modulus */
|
|
|
|
unsigned char exponent[MAX_RSA_MODULUS_LEN]; /* public exponent */
|
|
|
|
} R_RSA_PUBLIC_KEY;
|
|
|
|
|
|
|
|
typedef struct {
|
|
|
|
unsigned short int bits; /* length in bits of modulus */
|
|
|
|
unsigned char modulus[MAX_RSA_MODULUS_LEN]; /* modulus */
|
|
|
|
unsigned char publicExponent[MAX_RSA_MODULUS_LEN]; /* public exponent */
|
|
|
|
unsigned char exponent[MAX_RSA_MODULUS_LEN]; /* private exponent */
|
|
|
|
unsigned char prime[2][MAX_RSA_PRIME_LEN]; /* prime factors */
|
|
|
|
unsigned char primeExponent[2][MAX_RSA_PRIME_LEN]; /* exponents for CRT */
|
|
|
|
unsigned char coefficient[MAX_RSA_PRIME_LEN]; /* CRT coefficient */
|
|
|
|
} R_RSA_PRIVATE_KEY;
|
|
|
|
|
|
|
|
// functions to convert between OpenSSL's keys (using BIGNUMs)
|
|
|
|
// and our binary format
|
|
|
|
|
|
|
|
extern void openssl_to_keys(
|
|
|
|
RSA* rp, int nbits, R_RSA_PRIVATE_KEY& priv, R_RSA_PUBLIC_KEY& pub
|
|
|
|
);
|
|
|
|
extern void private_to_openssl(R_RSA_PRIVATE_KEY& priv, RSA* rp);
|
|
|
|
extern void public_to_openssl(R_RSA_PUBLIC_KEY& pub, RSA* rp);
|
2008-09-04 15:13:54 +00:00
|
|
|
extern int openssl_to_private(RSA *from, R_RSA_PRIVATE_KEY *to);
|
2005-08-01 22:44:40 +00:00
|
|
|
|
2002-06-14 05:49:34 +00:00
|
|
|
struct KEY {
|
|
|
|
unsigned short int bits;
|
|
|
|
unsigned char data[1];
|
|
|
|
};
|
|
|
|
|
|
|
|
struct DATA_BLOCK {
|
|
|
|
unsigned char* data;
|
|
|
|
unsigned int len;
|
|
|
|
};
|
|
|
|
|
2020-05-07 11:17:22 +00:00
|
|
|
#define MIN_OUT_BUFFER_SIZE (MAX_RSA_MODULUS_LEN+1)
|
2002-06-14 05:49:34 +00:00
|
|
|
|
2002-07-07 20:39:24 +00:00
|
|
|
// the size of a binary signature (encrypted MD5)
|
2002-07-05 05:33:40 +00:00
|
|
|
//
|
2002-07-07 20:39:24 +00:00
|
|
|
#define SIGNATURE_SIZE_BINARY MIN_OUT_BUFFER_SIZE
|
|
|
|
|
|
|
|
// size of text-encoded signature
|
|
|
|
#define SIGNATURE_SIZE_TEXT (SIGNATURE_SIZE_BINARY*2+20)
|
2005-12-14 23:43:50 +00:00
|
|
|
extern int sprint_hex_data(char* p, DATA_BLOCK&);
|
2009-07-27 20:54:15 +00:00
|
|
|
#ifdef _USING_FCGI_
|
|
|
|
#undef FILE
|
|
|
|
#endif
|
2009-01-13 23:06:02 +00:00
|
|
|
extern int print_hex_data(FILE* f, DATA_BLOCK&);
|
2005-12-14 23:43:50 +00:00
|
|
|
extern int scan_hex_data(FILE* f, DATA_BLOCK&);
|
|
|
|
extern int print_key_hex(FILE*, KEY* key, int len);
|
|
|
|
extern int scan_key_hex(FILE*, KEY* key, int len);
|
2009-07-27 20:54:15 +00:00
|
|
|
#ifdef _USING_FCGI_
|
|
|
|
#define FILE FCGI_FILE
|
2009-01-13 23:06:02 +00:00
|
|
|
#endif
|
2005-12-14 23:43:50 +00:00
|
|
|
extern int sscan_key_hex(const char*, KEY* key, int len);
|
|
|
|
extern int encrypt_private(
|
|
|
|
R_RSA_PRIVATE_KEY& key, DATA_BLOCK& in, DATA_BLOCK& out
|
|
|
|
);
|
|
|
|
extern int decrypt_public(
|
|
|
|
R_RSA_PUBLIC_KEY& key, DATA_BLOCK& in, DATA_BLOCK& out
|
|
|
|
);
|
|
|
|
extern int sign_file(
|
|
|
|
const char* path, R_RSA_PRIVATE_KEY&, DATA_BLOCK& signature
|
|
|
|
);
|
|
|
|
extern int sign_block(
|
|
|
|
DATA_BLOCK& data, R_RSA_PRIVATE_KEY&, DATA_BLOCK& signature
|
|
|
|
);
|
2012-02-06 06:06:44 +00:00
|
|
|
extern int check_file_signature(
|
2012-02-06 22:57:36 +00:00
|
|
|
const char* md5, R_RSA_PUBLIC_KEY&, DATA_BLOCK& signature, bool&
|
2005-02-16 23:17:43 +00:00
|
|
|
);
|
2012-02-06 06:06:44 +00:00
|
|
|
extern int check_file_signature2(
|
2012-02-06 22:57:36 +00:00
|
|
|
const char* md5, const char* signature, const char* key, bool&
|
2005-02-16 23:17:43 +00:00
|
|
|
);
|
2012-02-06 06:06:44 +00:00
|
|
|
extern int check_string_signature(
|
2005-02-16 23:17:43 +00:00
|
|
|
const char* text, const char* signature, R_RSA_PUBLIC_KEY&, bool&
|
|
|
|
);
|
2012-02-06 06:06:44 +00:00
|
|
|
extern int check_string_signature2(
|
2005-02-16 23:17:43 +00:00
|
|
|
const char* text, const char* signature, const char* key, bool&
|
|
|
|
);
|
2008-09-04 15:13:54 +00:00
|
|
|
extern int print_raw_data(FILE* f, DATA_BLOCK& x);
|
|
|
|
extern int scan_raw_data(FILE *f, DATA_BLOCK& x);
|
2005-12-14 23:43:50 +00:00
|
|
|
extern int read_key_file(const char* keyfile, R_RSA_PRIVATE_KEY& key);
|
|
|
|
extern int generate_signature(
|
|
|
|
char* text_to_sign, char* signature_hex, R_RSA_PRIVATE_KEY& key
|
|
|
|
);
|
2003-09-03 05:42:33 +00:00
|
|
|
|
2008-09-04 12:17:58 +00:00
|
|
|
// Check if sfileMsg (of length sfsize) has been created from sha1_md using the
|
2021-10-01 07:36:00 +00:00
|
|
|
// private key belonging to the public key file cFile
|
2008-09-04 12:17:58 +00:00
|
|
|
// Return:
|
|
|
|
// 1: YES
|
|
|
|
// 0: NO or error
|
|
|
|
extern int check_validity_of_cert(
|
|
|
|
const char *cFile, const unsigned char *sha1_md,
|
2008-09-24 23:42:56 +00:00
|
|
|
unsigned char *sfileMsg, const int sfsize, const char* caPath
|
2008-09-04 12:17:58 +00:00
|
|
|
);
|
|
|
|
|
2008-09-04 15:13:54 +00:00
|
|
|
extern char *check_validity(const char *certPath, const char *origFile,
|
|
|
|
unsigned char *signature, char* caPath
|
|
|
|
);
|
|
|
|
|
2011-08-11 17:41:48 +00:00
|
|
|
struct CERT_SIGS;
|
2008-09-04 12:50:54 +00:00
|
|
|
|
2008-09-04 12:17:58 +00:00
|
|
|
int cert_verify_file(
|
2008-09-24 23:42:56 +00:00
|
|
|
CERT_SIGS* signatures, const char* origFile, const char* trustLocation
|
2008-09-04 12:17:58 +00:00
|
|
|
);
|
2002-07-05 05:33:40 +00:00
|
|
|
#endif
|