55a4753b5cd54aadc25947038993e257d6bdecb7
3 * $Id: crypt.h,v 1.3 1997/09/26 09:14:58 mdw Exp $
5 * Cryptographic transfer of `become' requests
10 /*----- Licensing notice --------------------------------------------------*
12 * This file is part of `become'
14 * `Become' is free software; you can redistribute it and/or modify
15 * it under the terms of the GNU General Public License as published by
16 * the Free Software Foundation; either version 2 of the License, or
17 * (at your option) any later version.
19 * `Become' is distributed in the hope that it will be useful,
20 * but WITHOUT ANY WARRANTY; without even the implied warranty of
21 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
22 * GNU General Public License for more details.
24 * You should have received a copy of the GNU General Public License
25 * along with `become'; if not, write to the Free Software Foundation,
26 * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
29 /*----- Revision history --------------------------------------------------*
32 * Revision 1.3 1997/09/26 09:14:58 mdw
33 * Merged blowfish branch into trunk.
35 * Revision 1.2.2.1 1997/09/26 09:08:04 mdw
36 * Use the Blowfish encryption algorithm instead of IDEA. This is partly
37 * because I prefer Blowfish (without any particularly strong evidence) but
38 * mainly because IDEA is patented and Blowfish isn't.
40 * Revision 1.2 1997/08/04 10:24:21 mdw
41 * Sources placed under CVS control.
43 * Revision 1.1 1997/07/21 13:47:51 mdw
55 /*----- Required headers --------------------------------------------------*/
67 /*----- Type definitions and data structures ------------------------------*/
69 /* --- Encryption formats --- */
72 cryptType_blowfish
, /* Symmetric Blowfish encryption */
73 cryptType_rsa
/* Public key RSA (later project) */
76 /* --- Blowfish has a variable key size --- *
78 * Fix a key size here.
81 #define BLOWFISH_KEYSIZE (16u)
83 /* --- Encrypted buffer format --- *
85 * C structures are no good here. Time for some explicit offsets.
89 crq_cryptType
= 0, /* Encryption type (1 byte) */
90 crq_iv
= crq_cryptType
+ 1, /* Plaintext IV (8 bytes) */
91 crq_session
= crq_iv
+ 8, /* Session key (16 bytes) */
92 crq_cipher
= crq_session
+ 16, /* Where to start encrypting */
93 crq_time
= crq_cipher
, /* Time stamp (4 bytes) */
94 crq_pid
= crq_time
+ 4, /* Process ID (4 bytes) */
95 crq_from
= crq_pid
+ 4, /* From user id (4 bytes) */
96 crq_to
= crq_from
+ 4, /* To user id (4 bytes) */
97 crq_cmd
= crq_to
+ 4, /* Command string (lots of bytes) */
98 crq_check
= crq_cmd
+ CMDLEN_MAX
, /* Checksum for request (4 bytes) */
99 crq_size
= crq_check
+ 4 /* Size of encrypted request */
102 /* --- Encrypted result format --- */
105 crp_iv
= 0, /* Plaintext IV (8 bytes) */
106 crp_cipher
= crp_iv
+ 8, /* Where to start encrypting */
107 crp_time
= crp_cipher
, /* Time of request (4 bytes) */
108 crp_pid
= crp_time
+ 4, /* Process ID of client (4 bytes) */
109 crp_answer
= crp_pid
+ 4, /* Answer (1 or 0) (1 byte) */
110 crp_check
= crp_answer
+ 1, /* Checksum for reply (4 bytes) */
111 crp_size
= crp_check
+ 4 /* Size of encrypted reply */
114 /*----- Functions provided ------------------------------------------------*/
116 /* --- @crypt_packRequest@ --- *
118 * Arguments: @request *rq@ = pointer to request block
119 * @unsigned char *buff@ = pointer to a buffer
120 * @time_t t@ = the current time
121 * @pid_t pid@ = my process ID
122 * @unsigned char *k@ = pointer to 128-bit key
123 * @unsigned char *sk@ = where to put the session key
125 * Returns: The number of bytes written.
127 * Use: Packs a request block into a buffer. The buffer should have
128 * space for at least @crq_size@ bytes. The buffer comes back
129 * encrypted and ready to send.
132 extern void crypt_packRequest(request */
*rq*/
, unsigned char */
*buff*/
,
133 time_t /*t*/, pid_t
/*pid*/,
134 unsigned char */
*k*/
, unsigned char */
*sk*/
);
136 /* --- @crypt_unpackRequest@ --- *
138 * Arguments: @reqest *rq@ = pointer to destination request block
139 * @unsigned char *buff@ = pointer to source buffer
140 * @unsigned char *k@ = pointer to encryption key
141 * @unsigned char *sk@ = pointer to where to store session key
142 * @unsigned char *rpl@ = where to start building reply
146 * Use: Decrypts and unpacks a request buffer.
149 extern int crypt_unpackRequest(request */
*rq*/
, unsigned char */
*buff*/
,
150 unsigned char */
*k*/
, unsigned char */
*sk*/
,
151 unsigned char */
*rpl*/
);
153 /* --- @crypt_packReply@ --- *
155 * Arguments: @unsigned char *buff@ = pointer to reply block
156 * @unsigned char *sk@ = pointer to session key
157 * @int answer@ = yes or no
161 * Use: Packs and encrypts a reply block.
164 extern void crypt_packReply(unsigned char */
*buff*/
, unsigned char */
*sk*/
,
167 /* --- @crypt_unpackReply@ --- *
169 * Arguments: @unsigned char *buff@ = pointer to reply buffer
170 * @unsigned char *sk@ = pointer to session key
171 * @time_t t@ = time at which request was sent
172 * @pid_t pid@ = my process ID
174 * Returns: >0 if request granted, zero if denied, <0 if reply rejected
176 * Use: Unpacks a reply block, and informs the caller of the outcome.
179 extern int crypt_unpackReply(unsigned char */
*buff*/
, unsigned char */
*sk*/
,
180 time_t /*t*/, pid_t
/*pid*/);
182 /*----- That's all, folks -------------------------------------------------*/