/* * This file Copyright (C) 2007-2014 Mnemosyne LLC * * It may be used under the GNU GPL versions 2 or 3 * or any future license endorsed by Mnemosyne LLC. * */ #ifdef __APPLE__ /* OpenSSL "deprecated" as of OS X 10.7, but we still use it */ #pragma GCC diagnostic ignored "-Wdeprecated-declarations" #endif #include #include #include #include #include #include #include #include #include #include "transmission.h" #include "crypto-utils.h" #include "log.h" #include "tr-assert.h" #include "utils.h" #define TR_CRYPTO_DH_SECRET_FALLBACK #include "crypto-utils-fallback.c" /*** **** ***/ #define MY_NAME "tr_crypto_utils" static void log_openssl_error(char const* file, int line) { unsigned long const error_code = ERR_get_error(); if (tr_logLevelIsActive(TR_LOG_ERROR)) { char buf[512]; #ifndef TR_LIGHTWEIGHT static bool strings_loaded = false; if (!strings_loaded) { #if OPENSSL_VERSION_NUMBER < 0x10100000 || (defined(LIBRESSL_VERSION_NUMBER) && LIBRESSL_VERSION_NUMBER < 0x20700000) ERR_load_crypto_strings(); #else OPENSSL_init_crypto(OPENSSL_INIT_LOAD_CRYPTO_STRINGS, NULL); #endif strings_loaded = true; } #endif ERR_error_string_n(error_code, buf, sizeof(buf)); tr_logAddMessage(file, line, TR_LOG_ERROR, MY_NAME, "OpenSSL error: %s", buf); } } #define log_error() log_openssl_error(__FILE__, __LINE__) static bool check_openssl_result(int result, int expected_result, bool expected_equal, char const* file, int line) { bool const ret = (result == expected_result) == expected_equal; if (!ret) { log_openssl_error(file, line); } return ret; } #define check_result(result) check_openssl_result((result), 1, true, __FILE__, __LINE__) #define check_result_neq(result, x_result) check_openssl_result((result), (x_result), false, __FILE__, __LINE__) static bool check_openssl_pointer(void const* pointer, char const* file, int line) { bool const ret = pointer != NULL; if (!ret) { log_openssl_error(file, line); } return ret; } #define check_pointer(pointer) check_openssl_pointer((pointer), __FILE__, __LINE__) /*** **** ***/ tr_sha1_ctx_t tr_sha1_init(void) { EVP_MD_CTX* handle = EVP_MD_CTX_create(); if (check_result(EVP_DigestInit_ex(handle, EVP_sha1(), NULL))) { return handle; } EVP_MD_CTX_destroy(handle); return NULL; } bool tr_sha1_update(tr_sha1_ctx_t handle, void const* data, size_t data_length) { TR_ASSERT(handle != NULL); if (data_length == 0) { return true; } TR_ASSERT(data != NULL); return check_result(EVP_DigestUpdate(handle, data, data_length)); } bool tr_sha1_final(tr_sha1_ctx_t handle, uint8_t* hash) { bool ret = true; if (hash != NULL) { TR_ASSERT(handle != NULL); unsigned int hash_length; ret = check_result(EVP_DigestFinal_ex(handle, hash, &hash_length)); TR_ASSERT(!ret || hash_length == SHA_DIGEST_LENGTH); } EVP_MD_CTX_destroy(handle); return ret; } /*** **** ***/ #if OPENSSL_VERSION_NUMBER < 0x0090802fL static EVP_CIPHER_CTX* openssl_evp_cipher_context_new(void) { EVP_CIPHER_CTX* handle = tr_new(EVP_CIPHER_CTX, 1); if (handle != NULL) { EVP_CIPHER_CTX_init(handle); } return handle; } static void openssl_evp_cipher_context_free(EVP_CIPHER_CTX* handle) { if (handle == NULL) { return; } EVP_CIPHER_CTX_cleanup(handle); tr_free(handle); } #define EVP_CIPHER_CTX_new() openssl_evp_cipher_context_new() #define EVP_CIPHER_CTX_free(x) openssl_evp_cipher_context_free((x)) #endif /*** **** ***/ #if OPENSSL_VERSION_NUMBER < 0x10100000 || (defined(LIBRESSL_VERSION_NUMBER) && LIBRESSL_VERSION_NUMBER < 0x20700000) static inline int DH_set0_pqg(DH* dh, BIGNUM* p, BIGNUM* q, BIGNUM* g) { /* If the fields p and g in d are NULL, the corresponding input * parameters MUST be non-NULL. q may remain NULL. */ if ((dh->p == NULL && p == NULL) || (dh->g == NULL && g == NULL)) { return 0; } if (p != NULL) { BN_free(dh->p); dh->p = p; } if (q != NULL) { BN_free(dh->q); dh->q = q; } if (g != NULL) { BN_free(dh->g); dh->g = g; } if (q != NULL) { dh->length = BN_num_bits(q); } return 1; } static inline int DH_set_length(DH* dh, long length) { dh->length = length; return 1; } static inline void DH_get0_key(DH const* dh, BIGNUM const** pub_key, BIGNUM const** priv_key) { if (pub_key != NULL) { *pub_key = dh->pub_key; } if (priv_key != NULL) { *priv_key = dh->priv_key; } } #endif tr_dh_ctx_t tr_dh_new( uint8_t const* prime_num, size_t prime_num_length, uint8_t const* generator_num, size_t generator_num_length) { TR_ASSERT(prime_num != NULL); TR_ASSERT(generator_num != NULL); DH* handle = DH_new(); BIGNUM* p; BIGNUM* g; p = BN_bin2bn(prime_num, prime_num_length, NULL); g = BN_bin2bn(generator_num, generator_num_length, NULL); if (!check_pointer(p) || !check_pointer(g) || DH_set0_pqg(handle, p, NULL, g) == 0) { BN_free(p); BN_free(g); DH_free(handle); handle = NULL; } return handle; } void tr_dh_free(tr_dh_ctx_t handle) { if (handle == NULL) { return; } DH_free(handle); } bool tr_dh_make_key(tr_dh_ctx_t raw_handle, size_t private_key_length, uint8_t* public_key, size_t* public_key_length) { TR_ASSERT(raw_handle != NULL); TR_ASSERT(public_key != NULL); DH* handle = raw_handle; int dh_size; int my_public_key_length; BIGNUM const* my_public_key; DH_set_length(handle, private_key_length * 8); if (!check_result(DH_generate_key(handle))) { return false; } DH_get0_key(handle, &my_public_key, NULL); my_public_key_length = BN_bn2bin(my_public_key, public_key); dh_size = DH_size(handle); tr_dh_align_key(public_key, my_public_key_length, dh_size); if (public_key_length != NULL) { *public_key_length = dh_size; } return true; } tr_dh_secret_t tr_dh_agree(tr_dh_ctx_t handle, uint8_t const* other_public_key, size_t other_public_key_length) { TR_ASSERT(handle != NULL); TR_ASSERT(other_public_key != NULL); struct tr_dh_secret* ret; int dh_size; int secret_key_length; BIGNUM* other_key; if (!check_pointer(other_key = BN_bin2bn(other_public_key, other_public_key_length, NULL))) { return NULL; } dh_size = DH_size(handle); ret = tr_dh_secret_new(dh_size); secret_key_length = DH_compute_key(ret->key, other_key, handle); if (check_result_neq(secret_key_length, -1)) { tr_dh_secret_align(ret, secret_key_length); } else { tr_dh_secret_free(ret); ret = NULL; } BN_free(other_key); return ret; } /*** **** ***/ tr_x509_store_t tr_ssl_get_x509_store(tr_ssl_ctx_t handle) { if (handle == NULL) { return NULL; } return SSL_CTX_get_cert_store(handle); } bool tr_x509_store_add(tr_x509_store_t handle, tr_x509_cert_t cert) { TR_ASSERT(handle != NULL); TR_ASSERT(cert != NULL); return check_result(X509_STORE_add_cert(handle, cert)); } tr_x509_cert_t tr_x509_cert_new(void const* der, size_t der_length) { TR_ASSERT(der != NULL); X509* const ret = d2i_X509(NULL, (unsigned char const**)&der, der_length); if (ret == NULL) { log_error(); } return ret; } void tr_x509_cert_free(tr_x509_cert_t handle) { if (handle == NULL) { return; } X509_free(handle); } /*** **** ***/ bool tr_rand_buffer(void* buffer, size_t length) { TR_ASSERT(buffer != NULL); return check_result(RAND_bytes(buffer, (int)length)); }