[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[or-cvs] Implement core of onion-skin-based handshake



Update of /home/or/cvsroot/src/or
In directory moria.mit.edu:/tmp/cvs-serv28904/src/or

Modified Files:
	onion.c test.c 
Log Message:
Implement core of onion-skin-based handshake

Index: onion.c
===================================================================
RCS file: /home/or/cvsroot/src/or/onion.c,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -d -r1.39 -r1.40
--- onion.c	1 May 2003 06:42:28 -0000	1.39
+++ onion.c	1 May 2003 19:42:51 -0000	1.40
@@ -833,6 +833,147 @@
     inet_ntoa(*((struct in_addr *)(src+3))), dest->expire);
 }
 
+/*----------------------------------------------------------------------*/
+
+/* Given a router's public key, generates a 208-byte encrypted DH pubkey,
+ * and stores it into onion_skin out.  Stores the DH private key into 
+ * handshake_state_out for later completion of the handshake.
+ *
+ * The encrypted pubkey is formed as follows:
+ *    16 bytes of symmetric key
+ *   192 bytes of g^x for DH.
+ * The first 128 bytes are RSA-encrypted with the server's public key,
+ * and the last 80 are encrypted with the symmetric key.
+ */
+int
+onion_skin_create(crypto_pk_env_t *router_key,
+                  crypto_dh_env_t **handshake_state_out,
+                  char *onion_skin_out) /* Must be 208 bytes long */
+{
+  char iv[16];
+  char *pubkey = NULL;
+  crypto_dh_env_t *dh = NULL;
+  crypto_cipher_env_t *cipher = NULL;
+  int dhbytes, pkbytes;
+
+  *handshake_state_out = NULL;
+  memset(onion_skin_out, 0, 208);
+  memset(iv, 0, 16); /* XXXX This can't be safe, can it? */
+
+  if (!(dh = crypto_dh_new()))
+    goto err;
+  
+  dhbytes = crypto_dh_get_bytes(dh);
+  pkbytes = crypto_pk_keysize(router_key);
+  assert(dhbytes+16 == 208);
+  if (!(pubkey = malloc(dhbytes)))
+    goto err;
+
+  if (crypto_rand(16, pubkey))
+    goto err;
+
+  if (crypto_dh_get_public(dh, pubkey+16, dhbytes))
+    goto err;
+
+  if (crypto_pk_public_encrypt(router_key, pubkey, pkbytes,
+                               onion_skin_out, RSA_NO_PADDING))
+    goto err;
+
+  cipher = crypto_create_init_cipher(CRYPTO_CIPHER_3DES, pubkey, iv, 1);
+  
+  if (crypto_cipher_encrypt(cipher, pubkey+pkbytes, dhbytes-16-pkbytes,
+                            onion_skin_out+pkbytes))
+    goto err;
+
+  free(pubkey);
+  crypto_free_cipher_env(cipher);
+  *handshake_state_out = dh;
+  
+  return 0;
+ err:
+  if (pubkey) free(pubkey);
+  if (dh) crypto_dh_free(dh);
+  if (cipher) crypto_free_cipher_env(cipher);
+  return -1;
+}
+
+/* Given an encrypted DH public key as generated by onion_skin_create,
+ * and the private key for this onion router, generate the 192-byte DH
+ * reply, and key_out_len bytes of key material, stored in key_out.
+ */
+int
+onion_skin_server_handshake(char *onion_skin, /* 208 bytes long */
+                            crypto_pk_env_t *private_key,
+                            char *handshake_reply_out, /* 192 bytes long */
+                            char *key_out,
+                            int key_out_len)
+{
+  char buf[208];
+  char iv[16];
+  crypto_dh_env_t *dh = NULL;
+  crypto_cipher_env_t *cipher = NULL;
+  int pkbytes;
+  
+  memset(iv, 0, 16);
+  pkbytes = crypto_pk_keysize(private_key);
+
+  if (crypto_pk_private_decrypt(private_key,
+                                onion_skin, pkbytes,
+                                buf, RSA_NO_PADDING))
+    goto err;
+
+  cipher = crypto_create_init_cipher(CRYPTO_CIPHER_3DES, buf, iv, 0);
+
+  if (crypto_cipher_decrypt(cipher, onion_skin+pkbytes, 208-pkbytes,
+                            buf+pkbytes))
+    goto err;
+  
+  dh = crypto_dh_new();
+  if (crypto_dh_get_public(dh, handshake_reply_out, 192))
+    goto err;
+
+  if (crypto_dh_compute_secret(dh, buf+16, 192, buf))
+    goto err;
+
+  memcpy(key_out, buf+192-key_out_len, key_out_len);
+
+  crypto_free_cipher_env(cipher);
+  crypto_dh_free(dh);
+  return 0;
+ err:
+  if (cipher) crypto_free_cipher_env(cipher);
+  if (dh) crypto_dh_free(dh);
+
+  return -1;
+}
+
+/* Finish the client side of the DH handshake.
+ * Given the 192 byte DH reply as generated by onion_skin_server_handshake
+ * and the handshake state generated by onion_skin_create, generate
+ * key_out_len bytes of shared key material and store them in key_out.
+ *
+ * After the invocation, call crypto_dh_free on handshake_state.
+ */
+int
+onion_skin_client_handshake(crypto_dh_env_t *handshake_state,
+                            char *handshake_reply,/* Must be 192 bytes long*/
+                            char *key_out,
+                            int key_out_len) 
+{
+  char key_material[192];
+  assert(crypto_dh_get_bytes(handshake_state) == 192);
+  
+  memset(key_material, 0, 192);
+
+  if (crypto_dh_compute_secret(handshake_state, handshake_reply, 192,
+                               key_material))
+    return -1;
+  
+  memcpy(key_out, key_material+192-key_out_len, key_out_len);
+
+  return 0;
+}
+
 /*
   Local Variables:
   mode:c

Index: test.c
===================================================================
RCS file: /home/or/cvsroot/src/or/test.c,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -d -r1.8 -r1.9
--- test.c	1 May 2003 00:53:46 -0000	1.8
+++ test.c	1 May 2003 19:42:51 -0000	1.9
@@ -475,7 +475,7 @@
   test_buffers();
   puts("========================== Crypto ==========================");
   test_crypto_dh();
-  test_crypto(); /* this seg faults :( */
+  test_crypto(); /* this seg faults :( */  /* Still? -NM 2003/04/30 */
   puts("\n========================== Util ============================");
   test_util();
   puts("");