Warning: Attempt to read property "date" on null in /usr/local/www/websvn.planix.org/blame.php on line 247

Warning: Attempt to read property "msg" on null in /usr/local/www/websvn.planix.org/blame.php on line 247

Warning: Attempt to read property "date" on null in /usr/local/www/websvn.planix.org/blame.php on line 247

Warning: Attempt to read property "msg" on null in /usr/local/www/websvn.planix.org/blame.php on line 247
WebSVN – planix.SVN – Blame – /os/branches/feature_unix/sys/include/libsec.h – Rev 33

Subversion Repositories planix.SVN

Rev

Go to most recent revision | Details | Last modification | View Log | RSS feed

Rev Author Line No. Line
2 - 1
#pragma	lib	"libsec.a"
2
#pragma	src	"/sys/src/libsec"
3
 
4
 
5
#ifndef _MPINT
6
typedef struct mpint mpint;
7
#endif
8
 
9
/*
10
 * AES definitions
11
 */
12
 
13
enum
14
{
15
	AESbsize=	16,
16
	AESmaxkey=	32,
17
	AESmaxrounds=	14
18
};
19
 
20
typedef struct AESstate AESstate;
21
struct AESstate
22
{
23
	ulong	setup;
33 7u83 24
	ulong	offset;
2 - 25
	int	rounds;
26
	int	keybytes;
33 7u83 27
	void	*ekey;				/* expanded encryption round key */
28
	void	*dkey;				/* expanded decryption round key */
2 - 29
	uchar	key[AESmaxkey];			/* unexpanded key */
30
	uchar	ivec[AESbsize];			/* initialization vector */
33 7u83 31
	uchar	storage[512];			/* storage for expanded keys */
2 - 32
};
33
 
34
/* block ciphers */
33 7u83 35
extern void (*aes_encrypt)(ulong rk[], int Nr, uchar pt[16], uchar ct[16]);
36
extern void (*aes_decrypt)(ulong rk[], int Nr, uchar ct[16], uchar pt[16]);
2 - 37
 
33 7u83 38
void	setupAESstate(AESstate *s, uchar key[], int nkey, uchar *ivec);
39
 
2 - 40
void	aesCBCencrypt(uchar *p, int len, AESstate *s);
41
void	aesCBCdecrypt(uchar *p, int len, AESstate *s);
33 7u83 42
void	aesCFBencrypt(uchar *p, int len, AESstate *s);
43
void	aesCFBdecrypt(uchar *p, int len, AESstate *s);
44
void	aesOFBencrypt(uchar *p, int len, AESstate *s);
2 - 45
 
33 7u83 46
typedef struct AESGCMstate AESGCMstate;
47
struct AESGCMstate
48
{
49
	AESstate;
2 - 50
 
33 7u83 51
	ulong	H[4];
52
	ulong	M[16][256][4];
53
};
54
 
55
void	setupAESGCMstate(AESGCMstate *s, uchar *key, int keylen, uchar *iv, int ivlen);
56
void	aesgcm_setiv(AESGCMstate *s, uchar *iv, int ivlen);
57
void	aesgcm_encrypt(uchar *dat, ulong ndat, uchar *aad, ulong naad, uchar tag[16], AESGCMstate *s);
58
int	aesgcm_decrypt(uchar *dat, ulong ndat, uchar *aad, ulong naad, uchar tag[16], AESGCMstate *s);
59
 
2 - 60
/*
61
 * Blowfish Definitions
62
 */
63
 
64
enum
65
{
66
	BFbsize	= 8,
67
	BFrounds= 16
68
};
69
 
70
/* 16-round Blowfish */
71
typedef struct BFstate BFstate;
72
struct BFstate
73
{
74
	ulong	setup;
75
 
76
	uchar	key[56];
77
	uchar	ivec[8];
78
 
79
	u32int 	pbox[BFrounds+2];
80
	u32int	sbox[1024];
81
};
82
 
83
void	setupBFstate(BFstate *s, uchar key[], int keybytes, uchar *ivec);
84
void	bfCBCencrypt(uchar*, int, BFstate*);
85
void	bfCBCdecrypt(uchar*, int, BFstate*);
86
void	bfECBencrypt(uchar*, int, BFstate*);
87
void	bfECBdecrypt(uchar*, int, BFstate*);
88
 
89
/*
33 7u83 90
 * Chacha definitions
91
 */
92
 
93
enum
94
{
95
	ChachaBsize=	64,
96
	ChachaKeylen=	256/8,
97
	ChachaIVlen=	96/8,
98
	XChachaIVlen=	192/8,
99
};
100
 
101
typedef struct Chachastate Chachastate;
102
struct Chachastate
103
{
104
	union{
105
		u32int	input[16];
106
		struct {
107
			u32int	constant[4];
108
			u32int	key[8];
109
			u32int	counter;
110
			u32int	iv[3];
111
		};
112
	};
113
	u32int	xkey[8];
114
	int	rounds;
115
	int	ivwords;
116
};
117
 
118
void	setupChachastate(Chachastate*, uchar*, ulong, uchar*, ulong, int);
119
void	chacha_setiv(Chachastate *, uchar*);
120
void	chacha_setblock(Chachastate*, u64int);
121
void	chacha_encrypt(uchar*, ulong, Chachastate*);
122
void	chacha_encrypt2(uchar*, uchar*, ulong, Chachastate*);
123
 
124
void	hchacha(uchar h[32], uchar *key, ulong keylen, uchar nonce[16], int rounds);
125
 
126
void	ccpoly_encrypt(uchar *dat, ulong ndat, uchar *aad, ulong naad, uchar tag[16], Chachastate *cs);
127
int	ccpoly_decrypt(uchar *dat, ulong ndat, uchar *aad, ulong naad, uchar tag[16], Chachastate *cs);
128
 
129
/*
130
 * Salsa definitions
131
 */
132
enum
133
{
134
	SalsaBsize=	64,
135
	SalsaKeylen=	256/8,
136
	SalsaIVlen=	64/8,
137
	XSalsaIVlen=	192/8,
138
};
139
 
140
typedef struct Salsastate Salsastate;
141
struct Salsastate
142
{
143
	u32int	input[16];
144
	u32int	xkey[8];
145
	int	rounds;
146
	int	ivwords;
147
};
148
 
149
void	setupSalsastate(Salsastate*, uchar*, ulong, uchar*, ulong, int);
150
void	salsa_setiv(Salsastate*, uchar*);
151
void	salsa_setblock(Salsastate*, u64int);
152
void	salsa_encrypt(uchar*, ulong, Salsastate*);
153
void	salsa_encrypt2(uchar*, uchar*, ulong, Salsastate*);
154
 
155
void	salsa_core(u32int in[16], u32int out[16], int rounds);
156
 
157
void	hsalsa(uchar h[32], uchar *key, ulong keylen, uchar nonce[16], int rounds);
158
 
159
/*
2 - 160
 * DES definitions
161
 */
162
 
163
enum
164
{
165
	DESbsize=	8
166
};
167
 
168
/* single des */
169
typedef struct DESstate DESstate;
170
struct DESstate
171
{
172
	ulong	setup;
173
	uchar	key[8];		/* unexpanded key */
174
	ulong	expanded[32];	/* expanded key */
175
	uchar	ivec[8];	/* initialization vector */
176
};
177
 
178
void	setupDESstate(DESstate *s, uchar key[8], uchar *ivec);
179
void	des_key_setup(uchar[8], ulong[32]);
180
void	block_cipher(ulong*, uchar*, int);
181
void	desCBCencrypt(uchar*, int, DESstate*);
182
void	desCBCdecrypt(uchar*, int, DESstate*);
183
void	desECBencrypt(uchar*, int, DESstate*);
184
void	desECBdecrypt(uchar*, int, DESstate*);
185
 
186
/* for backward compatibility with 7-byte DES key format */
187
void	des56to64(uchar *k56, uchar *k64);
188
void	des64to56(uchar *k64, uchar *k56);
189
void	key_setup(uchar[7], ulong[32]);
190
 
191
/* triple des encrypt/decrypt orderings */
192
enum {
193
	DES3E=		0,
194
	DES3D=		1,
195
	DES3EEE=	0,
196
	DES3EDE=	2,
197
	DES3DED=	5,
198
	DES3DDD=	7
199
};
200
 
201
typedef struct DES3state DES3state;
202
struct DES3state
203
{
204
	ulong	setup;
205
	uchar	key[3][8];		/* unexpanded key */
206
	ulong	expanded[3][32];	/* expanded key */
207
	uchar	ivec[8];		/* initialization vector */
208
};
209
 
210
void	setupDES3state(DES3state *s, uchar key[3][8], uchar *ivec);
211
void	triple_block_cipher(ulong keys[3][32], uchar*, int);
212
void	des3CBCencrypt(uchar*, int, DES3state*);
213
void	des3CBCdecrypt(uchar*, int, DES3state*);
214
void	des3ECBencrypt(uchar*, int, DES3state*);
215
void	des3ECBdecrypt(uchar*, int, DES3state*);
216
 
217
/*
218
 * digests
219
 */
220
 
221
enum
222
{
223
	SHA1dlen=	20,	/* SHA digest length */
224
	SHA2_224dlen=	28,	/* SHA-224 digest length */
225
	SHA2_256dlen=	32,	/* SHA-256 digest length */
226
	SHA2_384dlen=	48,	/* SHA-384 digest length */
227
	SHA2_512dlen=	64,	/* SHA-512 digest length */
228
	MD4dlen=	16,	/* MD4 digest length */
229
	MD5dlen=	16,	/* MD5 digest length */
33 7u83 230
	Poly1305dlen=	16,	/* Poly1305 digest length */
2 - 231
	AESdlen=	16,	/* TODO: see rfc */
232
 
233
	Hmacblksz	= 64,	/* in bytes; from rfc2104 */
234
};
235
 
236
typedef struct DigestState DigestState;
237
struct DigestState
238
{
239
	uvlong	len;
240
	union {
33 7u83 241
		u32int	state[16];
2 - 242
		u64int	bstate[8];
243
	};
244
	uchar	buf[256];
245
	int	blen;
246
	char	malloced;
247
	char	seeded;
248
};
249
typedef struct DigestState SHAstate;	/* obsolete name */
250
typedef struct DigestState SHA1state;
251
typedef struct DigestState SHA2_224state;
252
typedef struct DigestState SHA2_256state;
253
typedef struct DigestState SHA2_384state;
254
typedef struct DigestState SHA2_512state;
255
typedef struct DigestState MD5state;
256
typedef struct DigestState MD4state;
257
typedef struct DigestState AEShstate;
258
 
33 7u83 259
 
2 - 260
DigestState*	md4(uchar*, ulong, uchar*, DigestState*);
261
DigestState*	md5(uchar*, ulong, uchar*, DigestState*);
262
DigestState*	sha1(uchar*, ulong, uchar*, DigestState*);
263
DigestState*	sha2_224(uchar*, ulong, uchar*, DigestState*);
264
DigestState*	sha2_256(uchar*, ulong, uchar*, DigestState*);
265
DigestState*	sha2_384(uchar*, ulong, uchar*, DigestState*);
266
DigestState*	sha2_512(uchar*, ulong, uchar*, DigestState*);
267
DigestState*	hmac_x(uchar *p, ulong len, uchar *key, ulong klen,
268
			uchar *digest, DigestState *s,
269
			DigestState*(*x)(uchar*, ulong, uchar*, DigestState*),
270
			int xlen);
271
DigestState*	hmac_md5(uchar*, ulong, uchar*, ulong, uchar*, DigestState*);
272
DigestState*	hmac_sha1(uchar*, ulong, uchar*, ulong, uchar*, DigestState*);
273
DigestState*	hmac_sha2_224(uchar*, ulong, uchar*, ulong, uchar*, DigestState*);
274
DigestState*	hmac_sha2_256(uchar*, ulong, uchar*, ulong, uchar*, DigestState*);
275
DigestState*	hmac_sha2_384(uchar*, ulong, uchar*, ulong, uchar*, DigestState*);
276
DigestState*	hmac_sha2_512(uchar*, ulong, uchar*, ulong, uchar*, DigestState*);
277
DigestState*	hmac_aes(uchar*, ulong, uchar*, ulong, uchar*, DigestState*);
33 7u83 278
 
2 - 279
char*		md5pickle(MD5state*);
280
MD5state*	md5unpickle(char*);
281
char*		sha1pickle(SHA1state*);
282
SHA1state*	sha1unpickle(char*);
283
 
33 7u83 284
DigestState*	poly1305(uchar*, ulong, uchar*, ulong, uchar*, DigestState*);
285
 
2 - 286
/*
287
 * random number generation
288
 */
289
void	genrandom(uchar *buf, int nbytes);
290
void	prng(uchar *buf, int nbytes);
291
ulong	fastrand(void);
292
ulong	nfastrand(ulong);
293
 
294
/*
295
 * primes
296
 */
297
void	genprime(mpint *p, int n, int accuracy); /* generate n-bit probable prime */
298
void	gensafeprime(mpint *p, mpint *alpha, int n, int accuracy); /* prime & generator */
299
void	genstrongprime(mpint *p, int n, int accuracy); /* generate n-bit strong prime */
300
void	DSAprimes(mpint *q, mpint *p, uchar seed[SHA1dlen]);
301
int	probably_prime(mpint *n, int nrep);	/* miller-rabin test */
302
int	smallprimetest(mpint *p);  /* returns -1 if not prime, 0 otherwise */
303
 
304
/*
305
 * rc4
306
 */
307
typedef struct RC4state RC4state;
308
struct RC4state
309
{
310
	 uchar	state[256];
311
	 uchar	x;
312
	 uchar	y;
313
};
314
 
315
void	setupRC4state(RC4state*, uchar*, int);
316
void	rc4(RC4state*, uchar*, int);
317
void	rc4skip(RC4state*, int);
318
void	rc4back(RC4state*, int);
319
 
320
/*
321
 * rsa
322
 */
323
typedef struct RSApub RSApub;
324
typedef struct RSApriv RSApriv;
325
typedef struct PEMChain PEMChain;
326
 
327
/* public/encryption key */
328
struct RSApub
329
{
330
	mpint	*n;	/* modulus */
331
	mpint	*ek;	/* exp (encryption key) */
332
};
333
 
334
/* private/decryption key */
335
struct RSApriv
336
{
337
	RSApub	pub;
338
 
339
	mpint	*dk;	/* exp (decryption key) */
340
 
341
	/* precomputed values to help with chinese remainder theorem calc */
342
	mpint	*p;
343
	mpint	*q;
344
	mpint	*kp;	/* dk mod p-1 */
345
	mpint	*kq;	/* dk mod q-1 */
346
	mpint	*c2;	/* (inv p) mod q */
347
};
348
 
349
struct PEMChain{
350
	PEMChain*next;
351
	uchar	*pem;
352
	int	pemlen;
353
};
354
 
355
RSApriv*	rsagen(int nlen, int elen, int rounds);
356
RSApriv*	rsafill(mpint *n, mpint *e, mpint *d, mpint *p, mpint *q);
357
mpint*		rsaencrypt(RSApub *k, mpint *in, mpint *out);
358
mpint*		rsadecrypt(RSApriv *k, mpint *in, mpint *out);
359
RSApub*		rsapuballoc(void);
360
void		rsapubfree(RSApub*);
361
RSApriv*	rsaprivalloc(void);
362
void		rsaprivfree(RSApriv*);
363
RSApub*		rsaprivtopub(RSApriv*);
364
RSApub*		X509toRSApub(uchar*, int, char*, int);
365
RSApub*		asn1toRSApub(uchar*, int);
366
RSApriv*	asn1toRSApriv(uchar*, int);
367
void		asn1dump(uchar *der, int len);
368
uchar*		decodePEM(char *s, char *type, int *len, char **new_s);
369
PEMChain*	decodepemchain(char *s, char *type);
33 7u83 370
uchar*		X509rsagen(RSApriv *priv, char *subj, ulong valid[2], int *certlen);
371
uchar*		X509rsareq(RSApriv *priv, char *subj, int *certlen);
372
char*		X509rsaverify(uchar *cert, int ncert, RSApub *pk);
373
char*		X509rsaverifydigest(uchar *sig, int siglen, uchar *edigest, int edigestlen, RSApub *pk);
374
 
375
 
376
uchar*          X509gen(RSApriv *priv, char *subj, ulong valid[2], int *certlen);
377
uchar*          X509req(RSApriv *priv, char *subj, int *certlen);
378
char*           X509verify(uchar *cert, int ncert, RSApub *pk);
2 - 379
void		X509dump(uchar *cert, int ncert);
380
 
33 7u83 381
mpint*		pkcs1padbuf(uchar *buf, int len, mpint *modulus, int blocktype);
382
int		pkcs1unpadbuf(uchar *buf, int len, mpint *modulus, int blocktype);
383
int		asn1encodeRSApub(RSApub *pk, uchar *buf, int len);
384
int		asn1encodedigest(DigestState* (*fun)(uchar*, ulong, uchar*, DigestState*),
385
			uchar *digest, uchar *buf, int len);
386
 
387
int		X509digestSPKI(uchar *, int, DigestState* (*)(uchar*, ulong, uchar*, DigestState*), uchar *);
388
 
2 - 389
/*
390
 * elgamal
391
 */
392
typedef struct EGpub EGpub;
393
typedef struct EGpriv EGpriv;
394
typedef struct EGsig EGsig;
395
 
396
/* public/encryption key */
397
struct EGpub
398
{
399
	mpint	*p;	/* modulus */
400
	mpint	*alpha;	/* generator */
401
	mpint	*key;	/* (encryption key) alpha**secret mod p */
402
};
403
 
404
/* private/decryption key */
405
struct EGpriv
406
{
407
	EGpub	pub;
408
	mpint	*secret;	/* (decryption key) */
409
};
410
 
411
/* signature */
412
struct EGsig
413
{
414
	mpint	*r, *s;
415
};
416
 
417
EGpriv*		eggen(int nlen, int rounds);
418
mpint*		egencrypt(EGpub *k, mpint *in, mpint *out);	/* deprecated */
419
mpint*		egdecrypt(EGpriv *k, mpint *in, mpint *out);
420
EGsig*		egsign(EGpriv *k, mpint *m);
421
int		egverify(EGpub *k, EGsig *sig, mpint *m);
422
EGpub*		egpuballoc(void);
423
void		egpubfree(EGpub*);
424
EGpriv*		egprivalloc(void);
425
void		egprivfree(EGpriv*);
426
EGsig*		egsigalloc(void);
427
void		egsigfree(EGsig*);
428
EGpub*		egprivtopub(EGpriv*);
429
 
430
/*
431
 * dsa
432
 */
433
typedef struct DSApub DSApub;
434
typedef struct DSApriv DSApriv;
435
typedef struct DSAsig DSAsig;
436
 
437
/* public/encryption key */
438
struct DSApub
439
{
440
	mpint	*p;	/* modulus */
441
	mpint	*q;	/* group order, q divides p-1 */
442
	mpint	*alpha;	/* group generator */
443
	mpint	*key;	/* (encryption key) alpha**secret mod p */
444
};
445
 
446
/* private/decryption key */
447
struct DSApriv
448
{
449
	DSApub	pub;
450
	mpint	*secret;	/* (decryption key) */
451
};
452
 
453
/* signature */
454
struct DSAsig
455
{
456
	mpint	*r, *s;
457
};
458
 
459
DSApriv*	dsagen(DSApub *opub);	/* opub not checked for consistency! */
460
DSAsig*		dsasign(DSApriv *k, mpint *m);
461
int		dsaverify(DSApub *k, DSAsig *sig, mpint *m);
462
DSApub*		dsapuballoc(void);
463
void		dsapubfree(DSApub*);
464
DSApriv*	dsaprivalloc(void);
465
void		dsaprivfree(DSApriv*);
466
DSAsig*		dsasigalloc(void);
467
void		dsasigfree(DSAsig*);
468
DSApub*		dsaprivtopub(DSApriv*);
33 7u83 469
DSApriv*        asn1toDSApriv(uchar*, int);
2 - 470
 
471
/*
472
 * TLS
473
 */
474
typedef struct Thumbprint{
475
	struct Thumbprint *next;
33 7u83 476
	uchar	hash[SHA2_256dlen];
477
	uchar	len;
2 - 478
} Thumbprint;
479
 
480
typedef struct TLSconn{
481
	char	dir[40];	/* connection directory */
482
	uchar	*cert;	/* certificate (local on input, remote on output) */
483
	uchar	*sessionID;
33 7u83 484
	uchar	*psk;
2 - 485
	int	certlen;
486
	int	sessionIDlen;
33 7u83 487
	int	psklen;
2 - 488
	int	(*trace)(char*fmt, ...);
489
	PEMChain*chain;	/* optional extra certificate evidence for servers to present */
490
	char	*sessionType;
491
	uchar	*sessionKey;
492
	int	sessionKeylen;
493
	char	*sessionConst;
33 7u83 494
	char	*serverName;
495
	char	*pskID;
2 - 496
} TLSconn;
497
 
498
/* tlshand.c */
499
int tlsClient(int fd, TLSconn *c);
500
int tlsServer(int fd, TLSconn *c);
501
 
502
/* thumb.c */
33 7u83 503
Thumbprint* initThumbprints(char *ok, char *crl, char *tag);
2 - 504
void	freeThumbprints(Thumbprint *ok);
33 7u83 505
int	okThumbprint(uchar *hash, int len, Thumbprint *ok);
506
int	okCertificate(uchar *cert, int len, Thumbprint *ok);
2 - 507
 
508
/* readcert.c */
509
uchar	*readcert(char *filename, int *pcertlen);
510
PEMChain*readcertchain(char *filename);
33 7u83 511
 
512
/* aes_xts.c */
513
void aes_xts_encrypt(AESstate *tweak, AESstate *ecb, uvlong sectorNumber, uchar *input, uchar *output, ulong len);
514
void aes_xts_decrypt(AESstate *tweak, AESstate *ecb, uvlong sectorNumber, uchar *input, uchar *output, ulong len);
515
 
516
typedef struct ECpoint{
517
	int inf;
518
	mpint *x;
519
	mpint *y;
520
	mpint *z;	/* nil when using affine coordinates */
521
} ECpoint;
522
 
523
typedef ECpoint ECpub;
524
typedef struct ECpriv{
525
	ECpoint;
526
	mpint *d;
527
} ECpriv;
528
 
529
typedef struct ECdomain{
530
	mpint *p;
531
	mpint *a;
532
	mpint *b;
533
	ECpoint G;
534
	mpint *n;
535
	mpint *h;
536
} ECdomain;
537
 
538
void	ecdominit(ECdomain *, void (*init)(mpint *p, mpint *a, mpint *b, mpint *x, mpint *y, mpint *n, mpint *h));
539
void	ecdomfree(ECdomain *);
540
 
541
void	ecassign(ECdomain *, ECpoint *old, ECpoint *new);
542
void	ecadd(ECdomain *, ECpoint *a, ECpoint *b, ECpoint *s);
543
void	ecmul(ECdomain *, ECpoint *a, mpint *k, ECpoint *s);
544
ECpoint*	strtoec(ECdomain *, char *, char **, ECpoint *);
545
ECpriv*	ecgen(ECdomain *, ECpriv*);
546
int	ecverify(ECdomain *, ECpoint *);
547
int	ecpubverify(ECdomain *, ECpub *);
548
void	ecdsasign(ECdomain *, ECpriv *, uchar *, int, mpint *, mpint *);
549
int	ecdsaverify(ECdomain *, ECpub *, uchar *, int, mpint *, mpint *);
550
void	base58enc(uchar *, char *, int);
551
int	base58dec(char *, uchar *, int);
552
 
553
ECpub*	ecdecodepub(ECdomain *dom, uchar *, int);
554
int	ecencodepub(ECdomain *dom, ECpub *, uchar *, int);
555
void	ecpubfree(ECpub *);
556
 
557
ECpub*	X509toECpub(uchar *cert, int ncert, char *name, int nname, ECdomain *dom);
558
char*	X509ecdsaverify(uchar *cert, int ncert, ECdomain *dom, ECpub *pub);
559
char*	X509ecdsaverifydigest(uchar *sig, int siglen, uchar *edigest, int edigestlen, ECdomain *dom, ECpub *pub);
560
 
561
/* curves */
562
void	secp256r1(mpint *p, mpint *a, mpint *b, mpint *x, mpint *y, mpint *n, mpint *h);
563
void	secp256k1(mpint *p, mpint *a, mpint *b, mpint *x, mpint *y, mpint *n, mpint *h);
564
void	secp384r1(mpint *p, mpint *a, mpint *b, mpint *x, mpint *y, mpint *n, mpint *h);
565
 
566
DigestState*	ripemd160(uchar *, ulong, uchar *, DigestState *);
567
 
568
/*
569
 * Diffie-Hellman key exchange
570
 */
571
 
572
typedef struct DHstate DHstate;
573
struct DHstate
574
{
575
	mpint	*g;	/* base g */
576
	mpint	*p;	/* large prime */
577
	mpint	*q;	/* subgroup prime */
578
	mpint	*x;	/* random secret */
579
	mpint	*y;	/* public key y = g**x % p */
580
};
581
 
582
/* generate new public key: y = g**x % p */
583
mpint* dh_new(DHstate *dh, mpint *p, mpint *q, mpint *g);
584
 
585
/* calculate shared key: k = y**x % p */
586
mpint* dh_finish(DHstate *dh, mpint *y);
587
 
588
/* Curve25519 elliptic curve, public key function */
589
void curve25519(uchar mypublic[32], uchar secret[32], uchar basepoint[32]);
590
 
591
/* Curve25519 diffie hellman */
592
void curve25519_dh_new(uchar x[32], uchar y[32]);
593
void curve25519_dh_finish(uchar x[32], uchar y[32], uchar z[32]);
594
 
595
/* password-based key derivation function 2 (rfc2898) */
596
void pbkdf2_x(uchar *p, ulong plen, uchar *s, ulong slen, ulong rounds, uchar *d, ulong dlen,
597
	DigestState* (*x)(uchar*, ulong, uchar*, ulong, uchar*, DigestState*), int xlen);
598
 
599
/* scrypt password-based key derivation function */
600
char* scrypt(uchar *p, ulong plen, uchar *s, ulong slen,
601
	ulong N, ulong R, ulong P,
602
	uchar *d, ulong dlen);
603
 
604
/* hmac-based key derivation function (rfc5869) */
605
void hkdf_x(uchar *salt, ulong nsalt, uchar *info, ulong ninfo, uchar *key, ulong nkey, uchar *d, ulong dlen,
606
	DigestState* (*x)(uchar*, ulong, uchar*, ulong, uchar*, DigestState*), int xlen);
607
 
608
/* timing safe memcmp() */
609
int tsmemcmp(void*, void*, ulong);