123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302 |
- /**
- * Copyright (c) 2016 - 2018, Nordic Semiconductor ASA
- *
- * All rights reserved.
- *
- * Redistribution and use in source and binary forms, with or without modification,
- * are permitted provided that the following conditions are met:
- *
- * 1. Redistributions of source code must retain the above copyright notice, this
- * list of conditions and the following disclaimer.
- *
- * 2. Redistributions in binary form, except as embedded into a Nordic
- * Semiconductor ASA integrated circuit in a product or a software update for
- * such product, must reproduce the above copyright notice, this list of
- * conditions and the following disclaimer in the documentation and/or other
- * materials provided with the distribution.
- *
- * 3. Neither the name of Nordic Semiconductor ASA nor the names of its
- * contributors may be used to endorse or promote products derived from this
- * software without specific prior written permission.
- *
- * 4. This software, with or without modification, must only be used with a
- * Nordic Semiconductor ASA integrated circuit.
- *
- * 5. Any software provided in binary form under this license must not be reverse
- * engineered, decompiled, modified and/or disassembled.
- *
- * THIS SOFTWARE IS PROVIDED BY NORDIC SEMICONDUCTOR ASA "AS IS" AND ANY EXPRESS
- * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
- * OF MERCHANTABILITY, NONINFRINGEMENT, AND FITNESS FOR A PARTICULAR PURPOSE ARE
- * DISCLAIMED. IN NO EVENT SHALL NORDIC SEMICONDUCTOR ASA OR CONTRIBUTORS BE
- * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
- * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
- * GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
- * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
- * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
- * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
- *
- */
- /**@file
- * SRP is an augmented password-authenticated key agreement protocol,
- * specifically designed to work around existing patents. SRP allows the use of
- * user names and passwords over unencrypted channels and supplies a shared
- * secret at the end of the authentication sequence that can be used to generate
- * encryption keys.
- *
- * An eavesdropper or man in the middle cannot obtain enough information to be
- * able to brute force guess a password without further interactions with the
- * parties for each guess.
- *
- * The server does not store password-equivalent data. This means that an
- * attacker who steals the server data cannot masquerade as the client unless
- * they first perform a brute force search for the password.
- *
- * The specific variant implemented here is SRP-6 3072 bit SHA-512 as mandated
- * by Apple for use with HomeKit.
- *
- * @see [RFC 5054 - Using the Secure Remote Password (SRP) Protocol for TLS Authentication](https://tools.ietf.org/html/rfc5054)
- * @see [The Stanford SRP Homepage](http://srp.stanford.edu)
- *
- * **Basic protocol overview**
- *
- * *Setup*
- * 1. Server generates a username / password combination together with a salt.
- * 2. Server derives a password verifier (see #occ_srp_verifier).
- * 3. The username, salt and verifier are stored and required to open sessions.
- * The original password is no longer needed.
- *
- * *Session opening*
- * 1. Client sends a username and the public key of an ephemeral key pair to the
- * server.
- * 2. Server sends the salt and the public key of another ephemeral key pair to
- * the client (see #occ_srp_public_key).
- * 3. Client and Server both compute the session key from this information (see
- * #occ_srp_scrambling_parameter, #occ_srp_premaster_secret,
- * #occ_srp_session_key).
- * 4. Client sends proof of the session key to the server.
- * 5. Server validates proof (see #occ_srp_proof_m1), then sends proof of the
- * session key to the client (see #occ_srp_proof_m2).
- * 6. Client validates proof. Both parties know that they share the same private
- * session key.
- */
- #ifndef OCC_SRP_H
- #define OCC_SRP_H
- #include <stdint.h>
- #include <stddef.h>
- /**
- * Salt length.
- */
- #define occ_srp_SALT_BYTES (16)
- /**
- * Password verifier length.
- */
- #define occ_srp_VERIFIER_BYTES (384)
- /**
- * Secret key length.
- */
- #define occ_srp_SECRET_KEY_BYTES (32)
- /**
- * Public key length.
- */
- #define occ_srp_PUBLIC_KEY_BYTES (384)
- /**
- * Scrambling parameter length.
- */
- #define occ_srp_SCRAMBLING_PARAMETER_BYTES (64)
- /**
- * Premaster secret length.
- */
- #define occ_srp_PREMASTER_SECRET_BYTES (384)
- /**
- * Session key length.
- */
- #define occ_srp_SESSION_KEY_BYTES (64)
- /**
- * Proof length.
- */
- #define occ_srp_PROOF_BYTES (64)
- /**@name SRP-6 Password verifier generation.
- *
- * A password verifier is generated from a user name and a password. The
- * password @p pass may be discarded, as only the verifier is used during later
- * computations.
- *
- * **Example**
- * @include occ_srp_verifier.c
- */
- /**@{*/
- /**
- * SRP-6 Password Verifier.
- *
- * The verifier is generated for a given user name @p user, a password @p pass
- * and salt @p salt.
- *
- * @param[out] v Generated password verifier, must be 32 bit aligned.
- * @param salt Salt.
- * @param user User name.
- * @param user_len Length of @p user.
- * @param pass Password.
- * @param pass_len Length of @p pass.
- */
- void occ_srp_verifier(uint8_t v[occ_srp_VERIFIER_BYTES],
- const uint8_t salt[occ_srp_SALT_BYTES],
- const uint8_t *user, size_t user_len,
- const uint8_t *pass, size_t pass_len);
- /**@}*/
- /**@name SRP-6 Public key generation.
- *
- * An ephemeral keypair can be generated based on the password verifier to be
- * used when opening a new session.
- *
- * **Example**
- * @include occ_srp_public_key.c
- */
- /**@{*/
- /**
- * SRP-6 Public Key.
- *
- * The public key for a given private key @p priv_b is generated using the
- * password verifier @p v and put into @p pub_b.
- *
- * @param[out] pub_b Generated public key, must be 32 bit aligned.
- * @param priv_b Private key.
- * @param v Password verifier.
- */
- void occ_srp_public_key(uint8_t pub_b[occ_srp_PUBLIC_KEY_BYTES],
- const uint8_t priv_b[occ_srp_SECRET_KEY_BYTES],
- const uint8_t v[occ_srp_VERIFIER_BYTES]);
- /**@}*/
- /**@name SRP-6 Session key generation.
- *
- * A premaster secret can be derived from both the client's and server's public
- * keys, the server's private key and the password verifier. A shared session
- * key can be generated from this premaster secret.
- *
- * **Example**
- * @include occ_srp_session_key.c
- */
- /**@{*/
- /**
- * SRP-6 Scrambling Parameter.
- *
- * The scrambling parameter is computed from both the client's public key
- * @p pub_a and the server's public key @p pub_b. The scrambling parameter
- * is required to compute the premaster secret.
- *
- * @param[out] u Generated scrambling parameter.
- * @param pub_a Client public key.
- * @param pub_b Server public key.
- */
- void occ_srp_scrambling_parameter(uint8_t u[occ_srp_SCRAMBLING_PARAMETER_BYTES],
- const uint8_t pub_a[occ_srp_PUBLIC_KEY_BYTES],
- const uint8_t pub_b[occ_srp_PUBLIC_KEY_BYTES]);
- /**
- * SRP-6 Premaster Secret.
- *
- * The premaster secret between the client and the server is computed using the
- * client public key @p pub_a, the server private key @p priv_b, the scrambling
- * parameter @p u and the password verifier @p v. If the client public key
- * @p pub_a is valid, the premaster secret is then put into @p s. The premaster
- * secret can be used to generate encryption keys.
- *
- * @param[out] s Generated premaster secret, must be 32 bit aligned.
- * @param pub_a Client public key.
- * @param priv_b Server private key.
- * @param u Scrambling parameter; generated with @c srp_scrambling_parameter.
- * @param v Password verifier.
- *
- * @returns 0 If @p pub_a is a legal public key.
- * @returns 1 Otherwise.
- */
- int occ_srp_premaster_secret(uint8_t s[occ_srp_PREMASTER_SECRET_BYTES],
- const uint8_t pub_a[occ_srp_PUBLIC_KEY_BYTES],
- const uint8_t priv_b[occ_srp_SECRET_KEY_BYTES],
- const uint8_t u[occ_srp_SCRAMBLING_PARAMETER_BYTES],
- const uint8_t v[occ_srp_VERIFIER_BYTES]);
- /**
- * SRP-6 SRP Session Key.
- *
- * Generates the shared SRP session key from the premaster secret @p s and puts
- * it into @p k.
- *
- * @param[out] k Generated SRP session key.
- * @param s Premaster secret.
- */
- void occ_srp_session_key(uint8_t k[occ_srp_SESSION_KEY_BYTES],
- const uint8_t s[occ_srp_PREMASTER_SECRET_BYTES]);
- /**@}*/
- /**@name SRP-6 Proof exchange.
- *
- * Proofs are exchanged from client to server and vice versa to ensure that both
- * parties computed the same shared session key. The proofs only match if the
- * correct password is used by the client.
- *
- * **Example**
- * @include occ_srp_proof.c
- */
- /**@{*/
- /**
- * SRP-6 Proof M1 (client to server).
- *
- * A proof is generated by the client and sent to the server to assert that the
- * client is in possession of the shared session key @p k. The server also
- * generates the proof. Only if the proofs match, the process can continue.
- * The proof is based on the salt @p salt, the client public key @p pub_a,
- * the server public key @p pub_b and the shared session key @p k.
- *
- * @param[out] m1 Generated proof.
- * @param user User name.
- * @param user_len Length of @p user.
- * @param salt Salt.
- * @param pub_a Client public key.
- * @param pub_b Server public key.
- * @param k Session key.
- */
- void occ_srp_proof_m1(uint8_t m1[occ_srp_PROOF_BYTES],
- const uint8_t *user, size_t user_len,
- const uint8_t salt[occ_srp_SALT_BYTES],
- const uint8_t pub_a[occ_srp_PUBLIC_KEY_BYTES],
- const uint8_t pub_b[occ_srp_PUBLIC_KEY_BYTES],
- const uint8_t k[occ_srp_SESSION_KEY_BYTES]);
- /**
- * SRP-6 Proof M2 (server to client).
- *
- * A second proof is generated by the server and sent back to the client to
- * assert that the server is in possession of the shared session key @p k. The
- * client also generates the proof. If the proofs match, both parties can assume
- * that they share the same session key @p k. The second proof is based on the
- * client public key @p pub_a, the first proof @p m1 and the session key @p k.
- *
- * @param[out] m2 Generated proof.
- * @param pub_a Client public key.
- * @param m1 First proof; generated with @c srp_proof_m1.
- * @param k Session key.
- */
- void occ_srp_proof_m2(uint8_t m2[occ_srp_PROOF_BYTES],
- const uint8_t pub_a[occ_srp_PUBLIC_KEY_BYTES],
- const uint8_t m1[occ_srp_PROOF_BYTES],
- const uint8_t k[occ_srp_SESSION_KEY_BYTES]);
- /**@}*/
- #endif
|