5 Author: Pekka Riikonen <priikone@silcnet.org>
7 Copyright (C) 2000 - 2001 Pekka Riikonen
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 2 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
22 #include "silcincludes.h"
24 /* Encodes Key Exchange Start Payload into a SILC Buffer to be sent
27 SilcSKEStatus silc_ske_payload_start_encode(SilcSKE ske,
28 SilcSKEStartPayload *payload,
29 SilcBuffer *return_buffer)
34 SILC_LOG_DEBUG(("Encoding KE Start Payload"));
37 return SILC_SKE_STATUS_ERROR;
39 buf = silc_buffer_alloc(payload->len);
40 silc_buffer_pull_tail(buf, SILC_BUFFER_END(buf));
42 /* Encode the payload */
43 ret = silc_buffer_format(buf,
44 SILC_STR_UI_CHAR(0), /* RESERVED field */
45 SILC_STR_UI_CHAR(payload->flags),
46 SILC_STR_UI_SHORT(payload->len),
47 SILC_STR_UI_XNSTRING(payload->cookie,
49 SILC_STR_UI_SHORT(payload->version_len),
50 SILC_STR_UI_XNSTRING(payload->version,
51 payload->version_len),
52 SILC_STR_UI_SHORT(payload->ke_grp_len),
53 SILC_STR_UI_XNSTRING(payload->ke_grp_list,
55 SILC_STR_UI_SHORT(payload->pkcs_alg_len),
56 SILC_STR_UI_XNSTRING(payload->pkcs_alg_list,
57 payload->pkcs_alg_len),
58 SILC_STR_UI_SHORT(payload->enc_alg_len),
59 SILC_STR_UI_XNSTRING(payload->enc_alg_list,
60 payload->enc_alg_len),
61 SILC_STR_UI_SHORT(payload->hash_alg_len),
62 SILC_STR_UI_XNSTRING(payload->hash_alg_list,
63 payload->hash_alg_len),
64 SILC_STR_UI_SHORT(payload->hmac_alg_len),
65 SILC_STR_UI_XNSTRING(payload->hmac_alg_list,
66 payload->hmac_alg_len),
67 SILC_STR_UI_SHORT(payload->comp_alg_len),
68 SILC_STR_UI_XNSTRING(payload->comp_alg_list,
69 payload->comp_alg_len),
72 silc_buffer_free(buf);
73 return SILC_SKE_STATUS_ERROR;
76 /* Return the encoded buffer */
79 SILC_LOG_HEXDUMP(("KE Start Payload"), buf->data, buf->len);
81 return SILC_SKE_STATUS_OK;
84 /* Parses the Key Exchange Start Payload. Parsed data is returned
85 to allocated payload structure. */
88 silc_ske_payload_start_decode(SilcSKE ske,
90 SilcSKEStartPayload **return_payload)
92 SilcSKEStartPayload *payload;
93 SilcSKEStatus status = SILC_SKE_STATUS_ERROR;
97 SILC_LOG_DEBUG(("Decoding Key Exchange Start Payload"));
99 SILC_LOG_HEXDUMP(("KE Start Payload"), buffer->data, buffer->len);
101 payload = silc_calloc(1, sizeof(*payload));
102 payload->cookie_len = SILC_SKE_COOKIE_LEN;
104 /* Parse start of the payload */
106 silc_buffer_unformat(buffer,
107 SILC_STR_UI_CHAR(&tmp), /* RESERVED Field */
108 SILC_STR_UI_CHAR(&payload->flags),
109 SILC_STR_UI_SHORT(&payload->len),
110 SILC_STR_UI_XNSTRING_ALLOC(&payload->cookie,
111 payload->cookie_len),
112 SILC_STR_UI16_NSTRING_ALLOC(&payload->version,
113 &payload->version_len),
114 SILC_STR_UI16_NSTRING_ALLOC(&payload->ke_grp_list,
115 &payload->ke_grp_len),
116 SILC_STR_UI16_NSTRING_ALLOC(&payload->pkcs_alg_list,
117 &payload->pkcs_alg_len),
118 SILC_STR_UI16_NSTRING_ALLOC(&payload->enc_alg_list,
119 &payload->enc_alg_len),
120 SILC_STR_UI16_NSTRING_ALLOC(&payload->hash_alg_list,
121 &payload->hash_alg_len),
122 SILC_STR_UI16_NSTRING_ALLOC(&payload->hmac_alg_list,
123 &payload->hmac_alg_len),
124 SILC_STR_UI16_NSTRING_ALLOC(&payload->comp_alg_list,
125 &payload->comp_alg_len),
128 status = SILC_SKE_STATUS_ERROR;
133 SILC_LOG_DEBUG(("Bad reserved field"));
134 status = SILC_SKE_STATUS_BAD_RESERVED_FIELD;
138 if (payload->len != buffer->len) {
139 SILC_LOG_DEBUG(("Bad payload length"));
140 status = SILC_SKE_STATUS_BAD_PAYLOAD_LENGTH;
144 /* Return the payload */
145 *return_payload = payload;
147 return SILC_SKE_STATUS_OK;
150 silc_ske_payload_start_free(payload);
152 ske->status = status;
156 /* Free's Start Payload */
158 void silc_ske_payload_start_free(SilcSKEStartPayload *payload)
161 silc_free(payload->cookie);
162 silc_free(payload->version);
163 silc_free(payload->ke_grp_list);
164 silc_free(payload->pkcs_alg_list);
165 silc_free(payload->enc_alg_list);
166 silc_free(payload->hash_alg_list);
167 silc_free(payload->hmac_alg_list);
168 silc_free(payload->comp_alg_list);
173 /* Encodes Key Exchange Payload into a SILC Buffer to be sent to the other
176 SilcSKEStatus silc_ske_payload_ke_encode(SilcSKE ske,
177 SilcSKEKEPayload *payload,
178 SilcBuffer *return_buffer)
181 unsigned char *x_str;
185 SILC_LOG_DEBUG(("Encoding KE Payload"));
188 return SILC_SKE_STATUS_ERROR;
190 if (ske->start_payload &&
191 ske->start_payload->flags & SILC_SKE_SP_FLAG_MUTUAL &&
192 !payload->sign_data) {
193 SILC_LOG_DEBUG(("Signature data is missing"));
194 return SILC_SKE_STATUS_ERROR;
197 /* Encode the integer into binary data */
198 x_str = silc_mp_mp2bin(&payload->x, 0, &x_len);
200 /* Allocate channel payload buffer. The length of the buffer
201 is 4 + public key + 2 + x + 2 + signature. */
202 buf = silc_buffer_alloc(4 + payload->pk_len + 2 + x_len +
203 2 + payload->sign_len);
204 silc_buffer_pull_tail(buf, SILC_BUFFER_END(buf));
206 /* Encode the payload */
207 ret = silc_buffer_format(buf,
208 SILC_STR_UI_SHORT(payload->pk_len),
209 SILC_STR_UI_SHORT(payload->pk_type),
210 SILC_STR_UI_XNSTRING(payload->pk_data,
212 SILC_STR_UI_SHORT(x_len),
213 SILC_STR_UI_XNSTRING(x_str, x_len),
214 SILC_STR_UI_SHORT(payload->sign_len),
215 SILC_STR_UI_XNSTRING(payload->sign_data,
219 memset(x_str, 'F', x_len);
221 silc_buffer_free(buf);
222 return SILC_SKE_STATUS_ERROR;
225 /* Return encoded buffer */
226 *return_buffer = buf;
228 SILC_LOG_HEXDUMP(("KE Payload"), buf->data, buf->len);
230 memset(x_str, 'F', x_len);
233 return SILC_SKE_STATUS_OK;
236 /* Parses the Key Exchange Payload. Parsed data is returned to allocated
237 payload structure. */
239 SilcSKEStatus silc_ske_payload_ke_decode(SilcSKE ske,
241 SilcSKEKEPayload **return_payload)
243 SilcSKEStatus status = SILC_SKE_STATUS_ERROR;
244 SilcSKEKEPayload *payload;
245 unsigned char *x = NULL;
247 SilcUInt32 tot_len = 0, len2;
250 SILC_LOG_DEBUG(("Decoding Key Exchange Payload"));
252 SILC_LOG_HEXDUMP(("KE Payload"), buffer->data, buffer->len);
254 payload = silc_calloc(1, sizeof(*payload));
258 /* Parse start of the payload */
259 ret = silc_buffer_unformat(buffer,
260 SILC_STR_UI_SHORT(&payload->pk_len),
261 SILC_STR_UI_SHORT(&payload->pk_type),
264 status = SILC_SKE_STATUS_ERROR;
268 if (ske->start_payload &&
269 (payload->pk_type < SILC_SKE_PK_TYPE_SILC ||
270 payload->pk_type > SILC_SKE_PK_TYPE_SPKI)) {
271 status = SILC_SKE_STATUS_BAD_PAYLOAD;
275 tot_len += payload->pk_len + 4;
277 /* Parse PK data and the signature */
278 silc_buffer_pull(buffer, 4);
279 ret = silc_buffer_unformat(buffer,
280 SILC_STR_UI_XNSTRING_ALLOC(&payload->pk_data,
282 SILC_STR_UI16_NSTRING_ALLOC(&x, &x_len),
283 SILC_STR_UI16_NSTRING_ALLOC(&payload->sign_data,
287 status = SILC_SKE_STATUS_ERROR;
291 tot_len += x_len + 2;
292 tot_len += payload->sign_len + 2;
295 status = SILC_SKE_STATUS_BAD_PAYLOAD;
299 if (ske->start_payload &&
300 (ske->start_payload->flags & SILC_SKE_SP_FLAG_MUTUAL) &&
301 (payload->sign_len < 3 || !payload->sign_data)) {
302 SILC_LOG_DEBUG(("The signature data is missing - both parties are "
303 "required to do authentication"));
304 status = SILC_SKE_STATUS_BAD_PAYLOAD;
308 if (tot_len != len2) {
309 status = SILC_SKE_STATUS_BAD_PAYLOAD_LENGTH;
313 /* Decode the binary data to integer */
314 silc_mp_init(&payload->x);
315 silc_mp_bin2mp(x, x_len, &payload->x);
316 memset(x, 0, sizeof(x_len));
319 /* Return the payload */
320 *return_payload = payload;
322 return SILC_SKE_STATUS_OK;
325 silc_free(payload->pk_data);
326 silc_free(payload->sign_data);
329 ske->status = status;
333 /* Free's KE Payload */
335 void silc_ske_payload_ke_free(SilcSKEKEPayload *payload)
338 silc_free(payload->pk_data);
339 silc_mp_uninit(&payload->x);
340 silc_free(payload->sign_data);