3 * $Id: crypt.h,v 1.3 1997/09/26 09:14:58 mdw Exp $
5 * Cryptographic transfer of `become' requests
10 /*----- Licensing notice --------------------------------------------------*
12 * This file is part of `become'
14 * `Become' is free software; you can redistribute it and/or modify
15 * it under the terms of the GNU General Public License as published by
16 * the Free Software Foundation; either version 2 of the License, or
17 * (at your option) any later version.
19 * `Become' is distributed in the hope that it will be useful,
20 * but WITHOUT ANY WARRANTY; without even the implied warranty of
21 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
22 * GNU General Public License for more details.
24 * You should have received a copy of the GNU General Public License
25 * along with `become'; if not, write to the Free Software Foundation,
26 * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
29 /*----- Revision history --------------------------------------------------*
32 * Revision 1.3 1997/09/26 09:14:58 mdw
33 * Merged blowfish branch into trunk.
35 * Revision 1.2.2.1 1997/09/26 09:08:04 mdw
36 * Use the Blowfish encryption algorithm instead of IDEA. This is partly
37 * because I prefer Blowfish (without any particularly strong evidence) but
38 * mainly because IDEA is patented and Blowfish isn't.
40 * Revision 1.2 1997/08/04 10:24:21 mdw
41 * Sources placed under CVS control.
43 * Revision 1.1 1997/07/21 13:47:51 mdw
55 /*----- Required headers --------------------------------------------------*/
67 /*----- Type definitions and data structures ------------------------------*/
69 /* --- Encryption formats --- */
72 cryptType_blowfish, /* Symmetric Blowfish encryption */
73 cryptType_rsa /* Public key RSA (later project) */
76 /* --- Blowfish has a variable key size --- *
78 * Fix a key size here.
81 #define BLOWFISH_KEYSIZE (16u)
83 /* --- Encrypted buffer format --- *
85 * C structures are no good here. Time for some explicit offsets.
89 crq_cryptType = 0, /* Encryption type (1 byte) */
90 crq_iv = crq_cryptType + 1, /* Plaintext IV (8 bytes) */
91 crq_session = crq_iv + 8, /* Session key (16 bytes) */
92 crq_cipher = crq_session + 16, /* Where to start encrypting */
93 crq_time = crq_cipher, /* Time stamp (4 bytes) */
94 crq_pid = crq_time + 4, /* Process ID (4 bytes) */
95 crq_from = crq_pid + 4, /* From user id (4 bytes) */
96 crq_to = crq_from + 4, /* To user id (4 bytes) */
97 crq_cmd = crq_to + 4, /* Command string (lots of bytes) */
98 crq_check = crq_cmd + CMDLEN_MAX, /* Checksum for request (4 bytes) */
99 crq_size = crq_check + 4 /* Size of encrypted request */
102 /* --- Encrypted result format --- */
105 crp_iv = 0, /* Plaintext IV (8 bytes) */
106 crp_cipher = crp_iv + 8, /* Where to start encrypting */
107 crp_time = crp_cipher, /* Time of request (4 bytes) */
108 crp_pid = crp_time + 4, /* Process ID of client (4 bytes) */
109 crp_answer = crp_pid + 4, /* Answer (1 or 0) (1 byte) */
110 crp_check = crp_answer + 1, /* Checksum for reply (4 bytes) */
111 crp_size = crp_check + 4 /* Size of encrypted reply */
114 /*----- Functions provided ------------------------------------------------*/
116 /* --- @crypt_packRequest@ --- *
118 * Arguments: @request *rq@ = pointer to request block
119 * @unsigned char *buff@ = pointer to a buffer
120 * @time_t t@ = the current time
121 * @pid_t pid@ = my process ID
122 * @unsigned char *k@ = pointer to 128-bit key
123 * @unsigned char *sk@ = where to put the session key
125 * Returns: The number of bytes written.
127 * Use: Packs a request block into a buffer. The buffer should have
128 * space for at least @crq_size@ bytes. The buffer comes back
129 * encrypted and ready to send.
132 extern void crypt_packRequest(request */*rq*/, unsigned char */*buff*/,
133 time_t /*t*/, pid_t /*pid*/,
134 unsigned char */*k*/, unsigned char */*sk*/);
136 /* --- @crypt_unpackRequest@ --- *
138 * Arguments: @reqest *rq@ = pointer to destination request block
139 * @unsigned char *buff@ = pointer to source buffer
140 * @unsigned char *k@ = pointer to encryption key
141 * @unsigned char *sk@ = pointer to where to store session key
142 * @unsigned char *rpl@ = where to start building reply
146 * Use: Decrypts and unpacks a request buffer.
149 extern int crypt_unpackRequest(request */*rq*/, unsigned char */*buff*/,
150 unsigned char */*k*/, unsigned char */*sk*/,
151 unsigned char */*rpl*/);
153 /* --- @crypt_packReply@ --- *
155 * Arguments: @unsigned char *buff@ = pointer to reply block
156 * @unsigned char *sk@ = pointer to session key
157 * @int answer@ = yes or no
161 * Use: Packs and encrypts a reply block.
164 extern void crypt_packReply(unsigned char */*buff*/, unsigned char */*sk*/,
167 /* --- @crypt_unpackReply@ --- *
169 * Arguments: @unsigned char *buff@ = pointer to reply buffer
170 * @unsigned char *sk@ = pointer to session key
171 * @time_t t@ = time at which request was sent
172 * @pid_t pid@ = my process ID
174 * Returns: >0 if request granted, zero if denied, <0 if reply rejected
176 * Use: Unpacks a reply block, and informs the caller of the outcome.
179 extern int crypt_unpackReply(unsigned char */*buff*/, unsigned char */*sk*/,
180 time_t /*t*/, pid_t /*pid*/);
182 /*----- That's all, folks -------------------------------------------------*/